Cloning cards/fobs with a Proxmark3
Cloning a Paxton fob
Basically, follow this guide:
https://badcfe.org/how-to-paxton-with-proxmark/
I managed to read my fob with:
lf hitag read --ht2 -k BDF5E846
If youβre getting βPassword failed!β or nothing back, move the fob around the 125KHz antenna (the top one), it should eventually work.
Afterwards, convert the fob pages to an EM4100 ID, and flash the ID to a T5577, emulating an EM4100 chip:
lf em 410x clone --id <your hex id>
Read it back to make sure:
lf em 410x reader
You should be done, but I havenβt tested it as I donβt have a Paxton reader handy.
Cloning MiFare cards
See Cloning a Mifare Classic 1K.
Working with T5577
Always remember to run lf t55xx det
every time you change configuration (not content) to make sure your card is detected properly.
Card cloner password
I have an AliExpress cloner which clones LF cards. Unfortunately, whenever it clones a card, it sets the password bit on it. This makes the card not respond to writes/wipes without the password (it just keeps having the same data, no matter what you write).
To remove it with the Proxmark3, run:
lf t55 wipe -p 51243648
Cloning T5577 cards
Read the card with:
lf em 410x reader
Write with:
lf EM 410x clone --id <the ID from before>
Related reading
- Icemanβs Proxmark3 firmware (use this one)
- How to copy Paxton fobs using an RFIDler
- How to copy, read and write Paxton fobs and cards with a Proxmark
Last updated on May 27, 2024. For any questions/feedback, email me at hi@stavros.io.