Skip to content

Instantly share code, notes, and snippets.

@natmchugh
Last active March 31, 2024 23:21
Show Gist options
  • Star 39 You must be signed in to star a gist
  • Fork 3 You must be signed in to fork a gist
  • Save natmchugh/18e82761dbce52fa284c87c190dc926f to your computer and use it in GitHub Desktop.
Save natmchugh/18e82761dbce52fa284c87c190dc926f to your computer and use it in GitHub Desktop.
How to copy, read and write Paxton fobs and cards with an RFIDler

How to copy, read and write Paxton fobs and cards with an RFIDler

A newer version of this info is available at https://badcfe.org/how-to-paxton-with-rfidler/

Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring: Paxton Fob

Paxton readers often look like this:

Paxton Reader

This guide covers how to read the data from an existing Paxton fob or card and also how to write data to a fob or card. If the original fob or card has been authorised with the reader the new fob or card will be seen by the reader as the same tag, effectively a clone. You can copy cards to fobs and fobs to cards. Hereafter both fobs and cards will be referred to as tags.

These Paxton tags use hitag2 technology and so can be copied to any hitag2 cards, fobs or other tag form factor.

Equipment used

  • An RFIDLer, available here from one of the tools authors http://rfidiot.org/
  • Enamelled copper wire, I used 33swg or ~0.25 mm
  • Some hitag2 tags See notes here.
  • (optional) a soldering iron but you my be able to get away without one

Antennas

The RFIDler comes with a coil antenna that works well for reading cards and sniffing readers. It does not however work well with fobs. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further here.

Connecting to your RFIDler

This is done on the command line via a serial communication program. I used minicom which is available on a mac via homebrew or on Linux via a package manager. On windows PuTTY has this functionality.

You need to find out what device the RFIDler was mounted as when you plugged it in via usb. In my case it was at /dev/tty.usbmodem092426B340191 and I found it by looking for the most recent mounted device in /dev.

So to connect it I used the command

minicom -D /dev/tty.usbmodem092426B340191 -b 115200

Reading a tag

Once you have connected to your RFIDLer you need to set the config to hitag2 tags

RFIDler> set tag hitag2
OK

*HITAG2> save
OK

HITAG2>

Next you can try reading the tag serial number. This is a read only number and cannot be changed but it is not used in access identification. It can be read without knowing the password for the tag and is also known as page 0.

HITAG2> reader
12345678
12345678
12345678

Hopefully you should see the tag serial number being repeated continuously. This means there is a good strong connection between the tag and antenna. If you don't see the number adjust the tag and coil position until you do.

The next step is to login to the tag by supplying the password. There is a common password for these Paxton tags.

HITAG2> login BDF5E846
06F907C2

A response like the one above means the login was successful. It shows the config bit and tag password held on page 2 of the tag. It is the same for all Paxton tags I tested. If instead you see "Login failed!" try again with a different position or no password (which will use the default blank tag password).

Once you have logged in successfully you can now read the 8 pages of data held on the tag. But first you will need to set the VTag type to hitag2 as well for reasons I'm unclear on.

The VTag is a virtual tag representation held on the RFIDler and is where you need to load data before writing it out to a new tag.

HITAG2> read 0
VTag not compatible!

HITAG2> set vtag hitag2
OK

*HITAG2> save
OK

HITAG2> read 0
0: 12345678

*HITAG2> read 1
1: BDF5E846

HITAG2> read 2
2: 06F907C2
…

Repeat the read commands all the way up to page 7.

Once you have this data you have all the info you need to clone the tag. The important pages are 4-7 these contain the data which the reader identifies for access.

Can I Emulate a Paxton tag?

You cannot currently emulate hitag2 with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag.

Another alternative is to convert the data on a paxton tag to an 8 bit id used by the EM41x system. Most paxton readers will read EM41x tags and it can be widely emulated for instance by a flipper zero. I have written a tool for converting the data held on pages 4 and 5 of a hitag fob to the id. It is available here. There is more info on using a flipper to open Paxton doors here.

emulating em41x

Writing a Tag

Despite not being able to emulate hitag2, to write a tag you need to load your tag data into the virtual tag or VTag.

HITAG2> VWRITE 1 BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT
BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT

Where PAGE1DAT etc is the 8 hex digits you got by reading the original tag.

Once you have written to the VTag you can check the contents by issuing the vtag command

HITAG2> vtag
              Type: HITAG2
         Emulating: NONE
           Raw UID:
               UID:

     PWD Block (1): BDF5E846    ...F

     Key Block (2): PAGE2DAT    ..-.

  Config Block (3): PAGE3DAT

        Page 1 & 2: 0 = Read / Write
            Page 3: 0 = Read / Write
        Page 4 & 5: 0 = Read / Write
        Page 6 & 7: 0 = Read / Write
          Security: 0 = Password
              Mode: 0 = Public Mode B
        Modulation: 0 = Manchester

     PWD Block (3): GE3DAT      .=.

              Data:
                 0: 12345678
                 1: BDF5E846
                 2: PAGE2DAT
                 3: PAGE3DAT
                 4: PAGE4DAT
                 5: PAGE5DAT
                 6: PAGE6DAT
                 7: PAGE7DAT


Once you are happy with the data as shown in the VTAG you can then clone it onto another tag

CLONE <BDF5E846|4D494B52>
1: BDF5E846
2: PAGE2DAT
4: PAGE4DAT
5: PAGE5DAT
6: PAGE6DAT
7: PAGE7DAT

The password used to clone the tag at the end depends on where you got the tag from. A new blank hitag2 tag should have the password 4D494B52. If a tag has been set up for Paxton readers previously it will have the password BDF5E846.

The new tag should be the same as the old tags as far as the reader is concerned.

Creating a DIY antenna for Paxton fobs

I was able to read and write genuine Paxton fobs by creating a coil antenna that allowed the fob to be placed inside. The original coil has an inductance at 374µH.

Original Coil

With trial and error I created a similar inductance coil with diameter of 2.5cm roughly 140 turns.

My top tip / life hack for winding the antenna would be to use super glue to get the initial loops on and secure them at the correct height and then electrical insulation tape to protect the coil and keep it in place.

Antenna

To test your antenna, putting a tag in and viewing the data as a graph vs time can help in fine tuning your antenna design.

To do this there is a python wrapper for rfidler that can call it via the api and plot the results

cd python
python rfidler.py /dev/tty.usbmodem092426B340191 'set tag hitag2' 'uid' plot 1500

This sets the tag type as hitag2 and then asks the tag for its serial number before plotting the results.

Plot

Once you start getting good pulses that can be easily distinguished from the background noise you can attempt to use the antenna to read a fob.

Getting hold of hitag2 tags

This is actually one of the harder steps especially with hitag2 cards in smaller quantities. A lot of what are advertised as hitag2 cards when they arrive turn out to be a different card type such as EM4100. In the course of this research I ended up with a load of tags of many types.

Paxton fobs can be widely picked up in packs of 10 for about £30 but this is much more than a hitag2 card should cost which is less than half that.

If you want to give this guide a go I have a small quantity of genuine Paxton fobs I purchased and would be willing to sell individually for around cost price. If you would like one of these contact me via github. Also happy to clone tags for research.

@avsmithy
Copy link

Worked for me with proxmark 3 and T5577 - fantastic, thank you!

@kbtang88
Copy link

Hi there. I want to know clone paxton key fob and could tell me what to get the coils and how to make that tube of coils . i ready order the OmniKey Cardman 5321. what is the best to use windows or mac and how to install or use the RFIDLer? and do i need to purchase the hitag2 card/tag for me to clone it to my flipper? thanks.

@hiranuk1979
Copy link

hiranuk1979 commented Apr 15, 2023

Hi

i am having trouble cloning my paxton ID card to a magic ring T5577 found here

https://dangerousthings.com/product/magic-ring/

this is what i have done so far, i have tried to downgrade the id card and then copy it to the ring, but as you can see from the video the ring does not work.

Do i need to buy a hitag2 duplicator?
2023-04-15 10_09_14-Paxton Net 2 card not reading - Dangerous Things Forum
2023-04-15 10_08_40-Paxton Net 2 card not reading - Dangerous Things Forum

IMG_3188_MOV_AdobeExpress.mp4

@avsmithy
Copy link

avsmithy commented Apr 16, 2023

@hiranuk1979 You might need to use the lf hitag reader to end up with something like this from the paxton card:

[=] Hitag2 tag information 
[=] ------------------------------------
[+] Config byte : 0x06 [ 00000110 ]
[+] Encoding    : Manchester
[+] Version     : Hitag2
[+] Coding in HITAG 2 operation: manchester
[+] Tag is in   : Password mode
[+] Page 6,7    : RW
[+] Page 4,5    : RW
[+] Page 3      : RW
[+] Page 1,2    : RW
[=] ------------------------------------
[=] 00 | XX XX XX XX | ..8.
[=] 01 | YY YY YY YY | ...F
...
...
...

(edit: see this post)

Then you take values of Page 4 and 5 (XX XX XX XX) and put them into Nathan's converter tool: https://badcfe.org/paxton-covert

Click convert and take the Hex value (e.g. 123ab51) that the tool spits out. Add 0F (or maybe 0F0) to the beginning of that Hex value, and you will have the EM410x ID.

Then clone to the T5577 (e.g. lf em 410x clone --id 0F0123ab51).

@hiranuk1979
Copy link

Is the method called "downgrading", if so i have done this with the help from someone on another forum.

i followed his steps, but the magic ring did not open the door. i could give it another try in case he may have created the wrong code.

Otherwise i think he is mentioning to do a complete like for like clone using a Hitag2 reader/writer that writes in password mode, but i cant find one to buy on the internet.

Her is the forum link

Paxton Net 2 card not reading

https://forum.dangerousthings.com/t/paxton-net-2-card-not-reading/18395/5

@jareckib
Copy link

jareckib commented May 15, 2023

https://www.youtube.com/watch?v=ZtJkhM59mz8 ....A simple device ... reads and writes PAXTON fob without any problems ....£60 price.... You don't need to buy ... PX1 Paxton Fob Cloner or TDF1 - Paxton Fob Cloner (PCF7936)

@jareckib
Copy link

In the new version PM3 of iceman, hitag2 has been fixed

@jareckib
Copy link

jareckib commented Jun 5, 2023

No need for page 4 and page 5 converters. The command used in proxmark3 -- lf hitag reader --21 -k bdf5e846 --- gives ---Paxton ID ---0x17bae---so we give --lf em 410x clone - -id 017bae. Unfortunately, this will not work with most PAXTON readers.

@natmchugh
Copy link
Author

Yes i added the code from the converter to the command on the proxmark on the iceman fork.

@hiranuk1979
Copy link

hiranuk1979 commented Jun 27, 2023 via email

@mitchelp
Copy link

mitchelp commented Sep 28, 2023

Just trying really hard to figure out what kind of card or key fob I would need to clone a existing Paxton Fob (with the blue ring) on.
Is there anybody that can give me a link or exact card type. I ordered a few T5577 cards, but I don't think this will work.

Please advise! (The real Paxton fobs are way to expensive and hard to get)

@jareckib
Copy link

jareckib commented Sep 28, 2023

Paxton is hitag2 ---chip PCF7936...Blocks 4, 5, 6, 7 must be saved in the fob copy....A single fob PCF7936 costs around £5....

@avsmithy
Copy link

@mitchelp I got paxton (blue ring) cloning working with T5577 cards (multiple brands) - see my comment above if you're using proxmark.

@mitchelp
Copy link

mitchelp commented Sep 28, 2023

@avsmithy thanks! Can you share where you bought your card or fob? Or an example of a working one?

@avsmithy
Copy link

@mitchelp KSEC T5577 125khz - and a couple of different cards from ebay and aliexpress.

@jareckib
Copy link

ebay --- paxton net2 fobs

@mitchelp
Copy link

mitchelp commented Sep 29, 2023

Do you need to make the coil from this how to when you use the proxmark3 easy? Or will it work without

@avsmithy
Copy link

I didn't need to make a coil with the pm3-easy, but it was very fiddly/intermittent reading from the paxton fob - but you only need it to work once to read. Then writing to regular T5577's was easy and worked every time.

@jareckib
Copy link

jareckib commented Sep 29, 2023

Iceman fixed hitag 2 copying. No coils needed... just the latest version. Pages 4, 5, 6, 7 you have to copy.

@jareckib
Copy link

jareckib commented Sep 29, 2023

lf hitag read --ht2 -k BDF5E846
lf hitag wrbl --ht2 -k bdf5e846 -p 4 -d 12345678 (12345678=your Page 4 - hex data )
lf hitag wrbl --ht2 -k bdf5e846 -p 5 -d 12345678 (12345678=your Page 5)
lf hitag wrbl --ht2 -k bdf5e846 -p 6 -d 12345678 ---- Page 6
lf hitag wrbl --ht2 -k bdf5e846 -p 7 -d 12345678 ---- Page 7

p

@mitchelp
Copy link

Awesome thanks guys!! Need to wait for my pm3 and then I can try it!!

@jareckib
Copy link

regular T5577 working if you have only Page 4 and 5!!!!

@vbxa
Copy link

vbxa commented Dec 27, 2023

Probably a stupid question, but how do I plug the DIY antenna into my laptop? What adapter should I get?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment