RfidResearchGroup / proxmark3

Iceman Fork - Proxmark3
http://www.icedev.se
GNU General Public License v3.0
3.62k stars 979 forks source link

Add new t55xx password (002BCFCF) sniffed from cheap cloner #2399

Closed davidbeauchamp closed 3 weeks ago

davidbeauchamp commented 3 weeks ago

I have a handheld white cloner and a handful of t5577 fobs that were supposedly re-writable but would not wipe. After some sniffing with the Proxmark3 I was able to uncover the password and to wipe the fobs, subsequently using the fobs with the PM3:

[usb] pm3 --> lf t55xx sniff

[=] T55xx command detection
[+] Downlink mode           |  password  |   Data   | blk | page |  0  |  1  | raw
[+] ------------------------+------------+----------+-----+------+-----+-----+-------------------------
[+] Default pwd write       |   44B44CAE | 002BCFCF |  7  |   0  |  19 |  46 | 1001000100101101000100110010101110000000000001010111100111111001111111
[+] ---------------------------------------------------------------------------------------------------

Picture of the cloner w/firmware version, was purchased some time in 2019 from eBay: cloner

I couldn't decide if this minor change was worth inclusion in the changelog or not so I left it out. Thank you, bot.

github-actions[bot] commented 3 weeks ago

You are welcome to add an entry to the CHANGELOG.md as well

iceman1001 commented 3 weeks ago

Awesome,
But the first password 44B44CAE , when was that set?

davidbeauchamp commented 3 weeks ago

I snipped out a couple lines from the sniff, but it tries to write to blocks 1 and 2 with both 44B44CAE and 88661858 in a row, and then attempts to write to block 7 with the new password from here (002BCFCF). I tried a handful of various uid's and the password didn't change, unlike a few posts I read on the PM3 forums.. Those two passwords appear to be from previous versions of the cloner and already exist in the dictionary.