Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new t55xx password (002BCFCF) sniffed from cheap cloner #2399

Merged
merged 2 commits into from
Jun 7, 2024

Conversation

davidbeauchamp
Copy link
Contributor

@davidbeauchamp davidbeauchamp commented Jun 7, 2024

I have a handheld white cloner and a handful of t5577 fobs that were supposedly re-writable but would not wipe. After some sniffing with the Proxmark3 I was able to uncover the password and to wipe the fobs, subsequently using the fobs with the PM3:

[usb] pm3 --> lf t55xx sniff

[=] T55xx command detection
[+] Downlink mode           |  password  |   Data   | blk | page |  0  |  1  | raw
[+] ------------------------+------------+----------+-----+------+-----+-----+-------------------------
[+] Default pwd write       |   44B44CAE | 002BCFCF |  7  |   0  |  19 |  46 | 1001000100101101000100110010101110000000000001010111100111111001111111
[+] ---------------------------------------------------------------------------------------------------

Picture of the cloner w/firmware version, was purchased some time in 2019 from eBay:
cloner

I couldn't decide if this minor change was worth inclusion in the changelog or not so I left it out. Thank you, bot.

Copy link

github-actions bot commented Jun 7, 2024

You are welcome to add an entry to the CHANGELOG.md as well

@davidbeauchamp davidbeauchamp changed the title Add new t55xx password sniffed from cheap cloner Add new t55xx password (002BCFCF) sniffed from cheap cloner Jun 7, 2024
@iceman1001
Copy link
Collaborator

Awesome,
But the first password 44B44CAE , when was that set?

@iceman1001 iceman1001 merged commit 1c52152 into RfidResearchGroup:master Jun 7, 2024
13 checks passed
@davidbeauchamp
Copy link
Contributor Author

I snipped out a couple lines from the sniff, but it tries to write to blocks 1 and 2 with both 44B44CAE and 88661858 in a row, and then attempts to write to block 7 with the new password from here (002BCFCF). I tried a handful of various uid's and the password didn't change, unlike a few posts I read on the PM3 forums.. Those two passwords appear to be from previous versions of the cloner and already exist in the dictionary.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants