Cloning cards/fobs with a Proxmark3

Cloning a Paxton fob

Basically, follow this guide:

https://badcfe.org/how-to-paxton-with-proxmark/

I managed to read my fob with:

lf hitag read --ht2 -k BDF5E846

If you’re getting β€œPassword failed!” or nothing back, move the fob around the 125KHz antenna (the top one), it should eventually work.

Afterwards, convert the fob pages to an EM4100 ID, and flash the ID to a T5577, emulating an EM4100 chip:

lf em 410x clone --id <your hex id>

Read it back to make sure:

lf em 410x reader

You should be done, but I haven’t tested it as I don’t have a Paxton reader handy.

Cloning MiFare cards

See Cloning a Mifare Classic 1K.

Working with T5577

Always remember to run lf t55xx det every time you change configuration (not content) to make sure your card is detected properly.

Card cloner password

I have an AliExpress cloner which clones LF cards. Unfortunately, whenever it clones a card, it sets the password bit on it. This makes the card not respond to writes/wipes without the password (it just keeps having the same data, no matter what you write).

To remove it with the Proxmark3, run:

lf t55 wipe -p 51243648

Cloning T5577 cards

Read the card with:

lf em 410x reader

Write with:

lf EM 410x clone --id <the ID from before>

Last updated on May 27, 2024. For any questions/feedback, email me at hi@stavros.io.