2015年8月19日星期三

EM6869 reader EMDB409

EM6869 reader EMDB409


http://www.xfpga.com/html_products/EMDB409-Reader-en-94.html

EM4450 EM4550 reader EMDB409

EM4450 EM4550 reader EMDB409


http://www.xfpga.com/html_products/EMDB409-Reader-en-94.html

proxmark3 read write block0 of uid changeable mifare card

proxmark3> hf mf rdbl 0 a ffffffffffff
--block no:0, key type:A, key:ff ff ff ff ff ff
#db# READ BLOCK FINISHED
isOk:01 data:04 89 75 c7 3f 88 04 00 c1 85 14 98 5d 30 34 12
proxmark3> hf 14a reader
ATQA : 00 04
 UID : d4 5e 63 06
 SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
Answers to chinese magic backdoor commands: YES
proxmark3> hf mf cgetblk 0
--block number: 0
block data:d4 5e 63 06 ef 08 04 00 12 13 14 15 16 17 18 19
proxmark3> hf mf csetblk 0 048975c73f880400c18514985d303412
--block number: 0 data:04 89 75 c7 3f 88 04 00 c1 85 14 98 5d 30 34 12

proxmark3> hf mf cgetblk 0
--block number: 0
block data:04 89 75 c7 3f 88 04 00 c1 85 14 98 5d 30 34 12
proxmark3>



proxmark3 read write mifare ultralight card

E:\tech\proxmark3\ProxSpace\firmware-20150321>proxmark3 COM28
proxmark3> hf 14a reader
ATQA : 00 44
 UID : 00 00 00 00 00 00 00
 SAK : 00 [2]
MANUFACTURER : no tag-info available
TYPE : NXP MIFARE Ultralight | Ultralight C
SAK incorrectly claims that card doesn't support RATS
 ATS : 0a 78 00 81 02 db a0 c1 19 40 2a b5
       -  TL : length is 10 bytes
       -  T0 : TA1 is present, TB1 is present, TC1 is present, FSCI is 8 (FSC =
256)
       - TA1 : different divisors are supported, DR: [], DS: []
       - TB1 : SFGI = 1 (SFGT = 8192/fc), FWI = 8 (FWT = 1048576/fc)
       - TC1 : NAD is NOT supported, CID is supported
       -  HB : db a0 c1 19 40
Answers to chinese magic backdoor commands: NO
proxmark3>
proxmark3> hf mfu rdbl 0
--block no:0x00 (0)
isOk: 01
Data: 00 00 00 00
proxmark3> hf mfu rdbl 4
--block no:0x04 (4)
isOk: 01
Data: 00 00 00 00
proxmark3> hf mfu wrbl 4 ffffffff
--block no:04
--data: ff ff ff ff
#db# WRITE BLOCK FINISHED
isOk:01
proxmark3> hf mfu rdbl 4
--block no:0x04 (4)
isOk: 01
Data: ff ff ff ff
proxmark3>


http://www.xfpga.com/html_products/proxmark3-20.html
http://www.xfpga.com/html_products/UID-changeable-mifare-ultralight-card-en-95.html

Answers to chinese magic backdoor commands: YES

uid changeable mifare card with backdoor, Chinese Magic card, can be recognized by proxmark3.
E:\tech\proxmark3\ProxSpace\firmware-20150321>proxmark3 COM28
proxmark3> hf 14a reader
ATQA : 00 04
UID : d4 15 45 06
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
Answers to chinese magic backdoor commands: YES
proxmark3>
Link for uid card:
http://www.xfpga.com/html_products/UID_changeable_mifare_1k_card_with_backdoor_50-154.html
http://www.xfpga.com/html_products/proxmark3-20.html

2015年8月6日星期四

uid changeable mifare card with backdoor, Chinese Magic card, can be recognized by proxmark3.

uid changeable mifare card with backdoor, Chinese Magic card, can be recognized by proxmark3.
E:\tech\proxmark3\ProxSpace\firmware-20150321>proxmark3 COM28
proxmark3> hf 14a reader
ATQA : 00 04
UID : d4 15 45 06
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
Answers to chinese magic backdoor commands: YES
proxmark3>
Link for uid card:
http://www.xfpga.com/html_products/UID_changeable_mifare_1k_card_with_backdoor_50-154.html
http://www.xfpga.com/html_products/proxmark3-20.html


2015年2月13日星期五

EM4100 ID card reader/writer

EM4100 reader write T5557
 
 
IMG_20140509_094458
 
EM4100 reader write T5557
 
 
EM4100 or TK4100 read.
 
 
Read a card:
Place the card on the reader and click the read button.
Write a card:
1. Place a blank card(T5557/T5567/T5577 EM4305card) to the reader and click the wirte button.
2. If +1 select, the number will increase 1 after every write.
3. If the lock is select then the number can not be changed any more. Or the card can not be reused.
 
Size:    
Working current    <30mA

Proxmark3 Crack mifare card without default key

Proxmark3 Crack mifare card without default key 

1. Use this R852 firmware:
http://xfpga.com/download/r852.zip



After get one key, then use hf mf nested command to crack the whole card.