Last active
March 14, 2025 01:45
Revisions
-
natmchugh revised this gist
Apr 24, 2023 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,5 +1,7 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler A newer version of this info is available at https://badcfe.org/how-to-paxton-with-rfidler/ Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring:  -
natmchugh revised this gist
Nov 15, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -95,7 +95,7 @@ Once you have this data you have all the info you need to clone the tag. The imp ## Can I Emulate a Paxton tag? You cannot currently emulate hitag2 with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag. Another alternative is to convert the data on a paxton tag to an 8 bit id used by the EM41x system. Most paxton readers will read EM41x tags and it can be widely emulated for instance by a flipper zero. I have written a tool for converting the data held on pages 4 and 5 of a hitag fob to the id. It is available [here](https://badcfe.org/paxton-covert.html). There is more info on using a flipper to open Paxton doors [here](https://badcfe.org/how-to-flipper-a-paxton.html).  -
natmchugh revised this gist
Nov 15, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -95,7 +95,7 @@ Once you have this data you have all the info you need to clone the tag. The imp ## Can I Emulate a Paxton tag? You cannot currently emulate hitag2 with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag. Another alternative is to convert the data on a paxton tag to an 8 bit id used by the EM41x system. Most paxton readers will read EM41x tags and it can be widely emulated for instance by a flipper zero. I have written a tool for converting the data held on pages 4 and 5 of a hitag fob to the id. It is available [here](https://badcfe.org/paxton-covert.html). There is more info on using a flipper to open Paxton doors [here] (https://badcfe.org/how-to-flipper-a-paxton.html).  -
natmchugh revised this gist
Nov 6, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -95,7 +95,7 @@ Once you have this data you have all the info you need to clone the tag. The imp ## Can I Emulate a Paxton tag? You cannot currently emulate hitag2 with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag. Another alternative is to convert the data on a paxton tag to an 8 bit id used by the EM41x system. Most paxton readers will read EM41x tags and it can be widely emulated for instance by a flipper zero. I have written a tool for converting the data held on pages 4 and 5 of a hitag fob to the id. It is available [here](https://badcfe.org/paxton-covert.html).  -
Nathaniel McHugh revised this gist
Sep 22, 2022 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
LoadingSorry, something went wrong. Reload?Sorry, we cannot display this file.Sorry, this file is invalid so it cannot be displayed. -
natmchugh revised this gist
Sep 22, 2022 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -97,6 +97,8 @@ You cannot currently emulate hitag2 with an RFIDler. The data flow is more compl Another alternative is to convert the data on a paxton tag to an 8 bit id used by the EM41x system. Most paxton readers will read EM41x tags and it can be widely emulated for instance by a flipper zero. I have written a tool for converting the data held on pages 4 and 5 of a hitag fob to the id. It is available [here](https://htmlpreview.github.io/?https://gist.githubusercontent.com/natmchugh/e8f08350a606dc68bbffbc0f6c44017b/raw/paxton-covert.html).  ## Writing a Tag Despite not being able to emulate hitag2, to write a tag you need to load your tag data into the virtual tag or VTag. -
natmchugh revised this gist
Sep 19, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -95,7 +95,7 @@ Once you have this data you have all the info you need to clone the tag. The imp ## Can I Emulate a Paxton tag? You cannot currently emulate hitag2 with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag. Another alternative is to convert the data on a paxton tag to an 8 bit id used by the EM41x system. Most paxton readers will read EM41x tags and it can be widely emulated for instance by a flipper zero. I have written a tool for converting the data held on pages 4 and 5 of a hitag fob to the id. It is available [here](https://htmlpreview.github.io/?https://gist.githubusercontent.com/natmchugh/e8f08350a606dc68bbffbc0f6c44017b/raw/paxton-covert.html). ## Writing a Tag -
natmchugh revised this gist
Sep 19, 2022 . 1 changed file with 3 additions and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -93,7 +93,9 @@ Repeat the read commands all the way up to page 7. Once you have this data you have all the info you need to clone the tag. The important pages are 4-7 these contain the data which the reader identifies for access. ## Can I Emulate a Paxton tag? You cannot currently emulate hitag2 with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag. Another alternative is to convert the data on a paxton tag to an 8 bit id used by the EM41x system. Most paxton readers will read EM41x tags and it can be widely emulated for instance by a flipper zero. I have written a tool for converting the data held on pages 4 and 5 of a hitag fob to the id. It is available [here] (https://htmlpreview.github.io/?https://gist.githubusercontent.com/natmchugh/e8f08350a606dc68bbffbc0f6c44017b/raw/paxton-covert.html). ## Writing a Tag -
Nathaniel McHugh revised this gist
Aug 19, 2022 . 2 changed files with 1 addition and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -165,7 +165,7 @@ The new tag should be the same as the old tags as far as the reader is concerned I was able to read and write genuine Paxton fobs by creating a coil antenna that allowed the fob to be placed inside. The original coil has an inductance at 374µH.  With trial and error I created a similar inductance coil with diameter of 2.5cm roughly 140 turns. File renamed without changes -
Nathaniel McHugh revised this gist
Aug 19, 2022 . 1 changed file with 5 additions and 2 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -21,7 +21,6 @@ These Paxton tags use hitag2 technology and so can be copied to any hitag2 cards ## Antennas The RFIDler comes with a coil antenna that works well for reading cards and sniffing readers. It does not however work well with fobs. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#creating-a-diy-antenna-for-paxton-fobs). ## Connecting to your RFIDler @@ -164,7 +163,11 @@ The new tag should be the same as the old tags as far as the reader is concerned ## Creating a DIY antenna for Paxton fobs I was able to read and write genuine Paxton fobs by creating a coil antenna that allowed the fob to be placed inside. The original coil has an inductance at 374µH.  With trial and error I created a similar inductance coil with diameter of 2.5cm roughly 140 turns. My top tip / life hack for winding the antenna would be to use super glue to get the initial loops on and secure them at the correct height and then electrical insulation tape to protect the coil and keep it in place. -
Nathaniel McHugh revised this gist
Aug 19, 2022 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
Unable to render rich display
Invalid image source.
-
Nathaniel McHugh revised this gist
Aug 19, 2022 . 1 changed file with 14 additions and 10 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,26 +1,28 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring:  Paxton readers often look like this:  This guide covers how to read the data from an existing Paxton fob or card and also how to write data to a fob or card. If the original fob or card has been authorised with the reader the new fob or card will be seen by the reader as the same tag, effectively a clone. You can copy cards to fobs and fobs to cards. Hereafter both fobs and cards will be referred to as tags. These Paxton tags use hitag2 technology and so can be copied to any hitag2 cards, fobs or other tag form factor. ## Equipment used * An RFIDLer, available here from one of the tools authors http://rfidiot.org/ * Enamelled copper wire, I used 33swg or ~0.25 mm * Some hitag2 tags See notes [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#getting-hold-of-hitag2-tags). * (optional) a soldering iron but you my be able to get away without one ## Antennas The RFIDler comes with a coil antenna that works well for reading cards and sniffing readers. It does not however work well with fobs. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#creating-a-diy-antenna-for-paxton-fobs).  ## Connecting to your RFIDler This is done on the command line via a serial communication program. I used minicom which is available on a mac via homebrew or on Linux via a package manager. On windows PuTTY has this functionality. @@ -96,7 +98,7 @@ Not currently with an RFIDler. The data flow is more complicated than some other ## Writing a Tag Despite not being able to emulate hitag2, to write a tag you need to load your tag data into the virtual tag or VTag. ``` HITAG2> VWRITE 1 BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT @@ -105,7 +107,7 @@ BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT Where PAGE1DAT etc is the 8 hex digits you got by reading the original tag. Once you have written to the VTag you can check the contents by issuing the vtag command ``` HITAG2> vtag @@ -143,7 +145,7 @@ HITAG2> vtag ``` Once you are happy with the data as shown in the VTAG you can then clone it onto another tag ``` CLONE <BDF5E846|4D494B52> @@ -158,11 +160,13 @@ CLONE <BDF5E846|4D494B52> The password used to clone the tag at the end depends on where you got the tag from. A new blank hitag2 tag should have the password 4D494B52. If a tag has been set up for Paxton readers previously it will have the password BDF5E846. The new tag should be the same as the old tags as far as the reader is concerned. ## Creating a DIY antenna for Paxton fobs I was able to read and write genuine Paxton fobs by creating a coil antenna that allowed the fob to be placed inside. The original coil has an inductance at 374µH. With trial and error I created a similar inductance coil with diameter of 2.5cm roughly 140 turns. My top tip / life hack for winding the antenna would be to use super glue to get the initial loops on and secure them at the correct height and then electrical insulation tape to protect the coil and keep it in place.  @@ -187,4 +191,4 @@ This is actually one of the harder steps especially with hitag2 cards in smaller Paxton fobs can be widely picked up in packs of 10 for about £30 but this is much more than a hitag2 card should cost which is less than half that. If you want to give this guide a go I have a small quantity of genuine Paxton fobs I purchased and would be willing to sell individually for around cost price. If you would like one of these contact me via github. Also happy to clone tags for research. -
Nathaniel McHugh revised this gist
Aug 19, 2022 . 1 changed file with 36 additions and 25 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,40 +1,40 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring. This guide should also work on other Paxton colours of fob used for the Switch2 system but I have not tested it on those.  Paxton readers often look like this  This guide covers how to read an existing tag and write data to another tag. If the original tag has been authorised with the reader the new tag will be seen by the reader as the same tag, effectively a clone. You can copy cards to fobs and fobs to cards. Hereafter both fobs and cards will be referred to as tags. ## Equipment used * An RFIDLer, available here from one of the tools authors http://rfidiot.org/ * Enamelled copper wire, I used 33swg or ~0.25 mm * Some hitag2 tags See notes [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#getting-hold-of-hitag2-tags). * (optional) a soldering iron but you my be able to get away without one These Paxton tags use hitag2 technology and so can be copied to any hitag2 cards, fobs or other tag form factor. ## Antennas The RFIDler comes with a coil antenna that works well for reading cards and sniffing readers. It does not however work well with fobs. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#creating-a-diy-antenna-for-paxton-fobs). ## Connecting to your RFIDler This is done on the command line via a serial communication program. I used minicom which is available on a mac via homebrew or on Linux via a package manager. On windows PuTTY has this functionality. You need to find out what device the RFIDler was mounted as when you plugged it in via usb. In my case it was at `/dev/tty.usbmodem092426B340191` and I found it by looking for the most recent mounted device in /dev. So to connect it I used the command ``` minicom -D /dev/tty.usbmodem092426B340191 -b 115200 ``` ## Reading a tag Once you have connected to your RFIDLer you need to set the config to hitag2 tags ``` RFIDler> set tag hitag2 OK @@ -44,25 +44,27 @@ OK HITAG2> ``` Next you can try reading the tag serial number. This is a read only number and cannot be changed but it is not used in access identification. It can be read without knowing the password for the tag and is also known as page 0. ``` HITAG2> reader 12345678 12345678 12345678 ``` Hopefully you should see the tag serial number being repeated continuously. This means there is a good strong connection between the tag and antenna. If you don't see the number adjust the tag and coil position until you do. The next step is to login to the tag by supplying the password. There is a common password for these Paxton tags. ``` HITAG2> login BDF5E846 06F907C2 ``` A response like the one above means the login was successful. It shows the config bit and tag password held on page 2 of the tag. It is the same for all Paxton tags I tested. If instead you see "Login failed!" try again with a different position or no password (which will use the default blank tag password). Once you have logged in successfully you can now read the 8 pages of data held on the tag. But first you will need to set the VTag type to hitag2 as well for reasons I'm unclear on. The VTag is a virtual tag representation held on the RFIDler and is where you need to load data before writing it out to a new tag. ``` HITAG2> read 0 @@ -81,18 +83,20 @@ HITAG2> read 0 1: BDF5E846 HITAG2> read 2 2: 06F907C2 … ``` Repeat the read commands all the way up to page 7. Once you have this data you have all the info you need to clone the tag. The important pages are 4-7 these contain the data which the reader identifies for access. ## Can I Emulate a Paxton tag? Not currently with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag. ## Writing a Tag Despite not being able to emulate a hitag to write a tag you need to load your tag data into the virtual tag or VTag. ``` HITAG2> VWRITE 1 BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT @@ -101,7 +105,7 @@ BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT Where PAGE1DAT etc is the 8 hex digits you got by reading the original tag. Then check the contents of the VTag ``` HITAG2> vtag @@ -139,7 +143,7 @@ HITAG2> vtag ``` If you are happy with the data as shown in the VTAG you can then clone it onto another tag ``` CLONE <BDF5E846|4D494B52> @@ -156,9 +160,9 @@ The password used to clone the tag at the end depends on where you got the tag f ## Creating a DIY antenna for Paxton fobs I was able to read and write genuine Paxton fobs by creating a coil antenna that allowed the fob to be placed inside. The original coil has an inductance at 374µH. With trial and error I created a similar inductance coil with diameter of 2.5cm roughly 140 turns. My top tip for winding the antenna would be to use super glue to get the initial loops on and secure them at the correct height and then electrical insulation tape to protect the coil and keep it in place.  @@ -177,3 +181,10 @@ This sets the tag type as hitag2 and then asks the tag for its serial number bef Once you start getting good pulses that can be easily distinguished from the background noise you can attempt to use the antenna to read a fob. ## Getting hold of hitag2 tags This is actually one of the harder steps especially with hitag2 cards in smaller quantities. A lot of what are advertised as hitag2 cards when they arrive turn out to be a different card type such as EM4100. In the course of this research I ended up with a load of tags of many types. Paxton fobs can be widely picked up in packs of 10 for about £30 but this is much more than a hitag2 card should cost which is less than half that. If you want to give this guide a go I have a small quantity of genuine Paxton fobs I purchased and would be willing to sell individually for around cost price. If you would like to buy one of these contact me via github. -
natmchugh revised this gist
Aug 5, 2022 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -25,7 +25,7 @@ The RFIDler comes with a coil antenna that is very good for reading cards and sn This is done on the command line via a serial communication program. I used minicom which is available on a mac via brew or on Linux package managers. On windows PuTTY apparently has this functionality. You need to find out what device the RFIDler was monuted as when you plugged it in via usb. In my case it was at `/dev/tty.usbmodem092426B340191` and I found it by looking for the most recent mounted device in /dev. So to connect it was just ``` @@ -168,7 +168,7 @@ To do this there is a python wrapper for rfidler that can call it via the api an ``` cd python python rfidler.py /dev/tty.usbmodem092426B340191 'set tag hitag2' 'uid' plot 1500 ``` This sets the tag type as hitag2 and then asks the tag for its serial number before plotting the results. -
natmchugh revised this gist
Aug 5, 2022 . 1 changed file with 11 additions and 0 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -21,6 +21,17 @@ These Paxton fobs use hitag2 technology and can be copied to hitag2 cards and fo ## Antennas The RFIDler comes with a coil antenna that is very good for reading cards and sniffing readers. It does not however do well with other tag form factors. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#creating-a-diy-antenna-for-paxton-fobs). ## Connecting to your RFIDler This is done on the command line via a serial communication program. I used minicom which is available on a mac via brew or on Linux package managers. On windows PuTTY apparently has this functionality. You need to find out what device the RFIDler was monuted as when you plugged it in via usb. In my case it was at `/dev/tty.usbmodem092426...` and I found it by looking for the most recent mounted device in /dev. So to connect it was just ``` minicom -D /dev/tty.usbmodem092426B340191 -b 115200 ``` ## Reading a tag First we need to set the RFIDLer to hitag2 cards config -
natmchugh revised this gist
Aug 5, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -19,7 +19,7 @@ This guide covers how to read an existing tag and write data to another tag. If These Paxton fobs use hitag2 technology and can be copied to hitag2 cards and fobs etc. ## Antennas The RFIDler comes with a coil antenna that is very good for reading cards and sniffing readers. It does not however do well with other tag form factors. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#creating-a-diy-antenna-for-paxton-fobs). ## Reading a tag -
natmchugh revised this gist
Aug 5, 2022 . 1 changed file with 2 additions and 5 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -8,7 +8,7 @@ Readers often look like this  This guide covers how to read an existing tag and write data to another tag. If that tag has been authorised for entry the new tag will be able to gain entry and will be seen by the reader to be the same tag, effectively a clone. You can copy cards to fobs and fobs to cards. Hereafter both fobs and cards will be referred to as tags. ## Equipment * An RFIDLer available here from one of the tools authors http://rfidiot.org/ @@ -19,7 +19,7 @@ This guide covers how to read an existing tag and write data to another tag. If These Paxton fobs use hitag2 technology and can be copied to hitag2 cards and fobs etc. ## Antennas The RFIDler comes with a coil antenna that is very good for reading cards and sniffing readers. It does not however do well with other tag form factors. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further [here](/natmchugh/18e82761dbce52fa284c87c190dc926f#reading-a-card). ## Reading a tag @@ -63,9 +63,6 @@ OK *HITAG2> save OK HITAG2> read 0 0: 12345678 -
Nathaniel McHugh revised this gist
Aug 5, 2022 . 1 changed file with 72 additions and 14 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -25,16 +25,18 @@ The RFIDler comes with a coil antenna that is very good for reading cards and sn First we need to set the RFIDLer to hitag2 cards config ``` RFIDler> set tag hitag2 OK *HITAG2> save OK HITAG2> ``` Next we need to try reading the tag serial number. This is readonly and cannot be changed but it is not used in identifying access. It can be read without knowing the password and logging into the tag and is also known as page 0. ``` HITAG2> reader 12345678 12345678 12345678 @@ -47,19 +49,34 @@ The next step is to login to the tag by supplying the password. HITAG2> login BDF5E846 06F907C2 ``` The response should be the config bit and tag password. This is held on page 2 of the tag and is the same for all Paxton tags I tested. If instead you get "Login failed!" don't give up just try again. Once you have logged in you can now read the 8 pages of data held on the tag. But first you will need to set the the VTag type to hitag2 as well. ``` HITAG2> read 0 VTag not compatible! HITAG2> set vtag hitag2 OK *HITAG2> save OK HITAG2> read 1 1: BDF5E846 HITAG2> read 0 0: 12345678 *HITAG2> read 1 1: BDF5E846 HITAG2> read 2 … ``` repeat all the way up to page 7 Once you have this data you have all the info you need to clone the tag. The important pages are 4-7 these contain the data on which the system identifies for access. ## Can I Emulate a Paxton tag? @@ -69,21 +86,62 @@ Not currently with an RFIDler. The data flow is more complicated than some other Despite not being able to emulate a hitag to write a tag you need to load your tag data into the virtual tag or vtag. ``` HITAG2> VWRITE 1 BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT BDF5E846PAGE2DATPAGE3DATPAGE4DATPAGE5DATPAGE6DATPAGE7DAT ``` Where PAGE1DAT etc is the 8 hex digits you got by reading the original tag. Then check the contents of the VTAG ``` HITAG2> vtag Type: HITAG2 Emulating: NONE Raw UID: UID: PWD Block (1): BDF5E846 ...F Key Block (2): PAGE2DAT ..-. Config Block (3): PAGE3DAT Page 1 & 2: 0 = Read / Write Page 3: 0 = Read / Write Page 4 & 5: 0 = Read / Write Page 6 & 7: 0 = Read / Write Security: 0 = Password Mode: 0 = Public Mode B Modulation: 0 = Manchester PWD Block (3): GE3DAT .=. Data: 0: 12345678 1: BDF5E846 2: PAGE2DAT 3: PAGE3DAT 4: PAGE4DAT 5: PAGE5DAT 6: PAGE6DAT 7: PAGE7DAT ``` If you are happy with the data as shown in the VTAG then you can clone onto another tag ``` CLONE <BDF5E846|4D494B52> 1: BDF5E846 2: PAGE2DAT 4: PAGE4DAT 5: PAGE5DAT 6: PAGE6DAT 7: PAGE7DAT ``` The password used to clone the tag at the end depends on where you got the tag from. A new blank hitag2 tag should have the password 4D494B52. If a tag has been set up for Paxton readers previously it will have the password BDF5E846. @@ -107,7 +165,7 @@ python rfidler.py /dev/tty.usbmodem... 'set tag hitag2' 'uid' plot 1500 This sets the tag type as hitag2 and then asks the tag for its serial number before plotting the results.  Once you start getting good pulses that can be easily distinguished from the background noise you can attempt to use the antenna to read a fob. -
Nathaniel McHugh revised this gist
Aug 5, 2022 . 3 changed files with 35 additions and 19 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -8,20 +8,20 @@ Readers often look like this  This guide covers how to read an existing tag and write data to another tag. If that tag has been authorised for entry the new tag will be able to gain entry and will be seen by the reader to be the same tag, effectively a clone. You can copy cards to fobs and fobs to cards. From now on both fobs and cards will be referred to as tags. ## Equipment * An RFIDLer available here from one of the tools authors http://rfidiot.org/ * Enamelled copper wire I used 33swg or ~0.25 mm * Some Paxton fobs or hitag2 cards * (optional) a soldering iron but you my be able to get away without one These Paxton fobs use hitag2 technology and can be copied to hitag2 cards and fobs etc. ## Antennas The RFIDler comes with a coil antenna that is very good for reading cards and sniffing readers. It does not however do well with other tag form factors. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further [here]/(natmchugh/18e82761dbce52fa284c87c190dc926f#reading-a-card). ## Reading a tag First we need to set the RFIDLer to hitag2 cards config ``` @@ -31,25 +31,25 @@ OK OK HITAG2> ``` Next we need to try reading the tag serial number. This is readonly and cannot be changed but it is not used in identifying access. It can be read without knowing the password and logging into the tag and is also known as page 0. ``` HITAG2> READER 12345678 12345678 12345678 ``` You should get the tag serial number being repeated continuously which means there is a good strong signal. If you don't then adjust the tag and coil position until you do. The next step is to login to the tag by supplying the password. ``` HITAG2> login BDF5E846 06F907C2 ``` The response is the config bit and tag password. This is held on page 2 of the tag and is the same for all Paxton tags I tested. Once you have logged in you can now read the 8 pages of data held on the tag. ``` HITAG2> read 0 @@ -60,17 +60,17 @@ HITAG2> read 1 ``` repeat up to page 7 Once you have this data you have all the info you need to clone the tag. The important pages are 4-7 these contain the data on which the system identifies for access. ## Can I Emulate a Paxton tag? Not currently with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 tags handle these commands really well. So why not just use one of those i.e. clone to a hitag2 tag. ## Writing a Tag Despite not being able to emulate a hitag to write a tag you need to load your tag data into the virtual tag or vtag. ``` set tag hitag2 VWRITE 1 BDF5E846PAGE2DATAPAGE3DATA...... ``` @@ -86,12 +86,28 @@ If you are happy with the data as shown in the VTAG then you can clone onto anot CLONE <BDF5E846|4D494B52 > ``` The password used to clone the tag at the end depends on where you got the tag from. A new blank hitag2 tag should have the password 4D494B52. If a tag has been set up for Paxton readers previously it will have the password BDF5E846. ## Creating a DIY antenna for Paxton fobs I was able to read and write genuine Paxton fobs by creating a coil antenna that allowed the fob to be placed inside. I estimated the inductance at 200µH. This suggested that with a coil diameter of 2cm roughly 120 turns would give a similar impedance. My top tip for winding the antenna would be to use super glue to get the initial loops on and secure them at the correct height and then electrical insulation tape to protect the coil.  To test your antenna, putting a tag in and viewing the data as a graph vs time can help in fine tuning your antenna design. To do this there is a python wrapper for rfidler that can call it via the api and plot the results ``` cd python python rfidler.py /dev/tty.usbmodem... 'set tag hitag2' 'uid' plot 1500 ``` This sets the tag type as hitag2 and then asks the tag for its serial number before plotting the results.  Once you start getting good pulses that can be easily distinguished from the background noise you can attempt to use the antenna to read a fob. File renamed without changesFile renamed without changes -
Nathaniel McHugh revised this gist
Aug 5, 2022 . 1 changed file with 2 additions and 2 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,11 +1,11 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring.  Readers often look like this  This how to covers how to read an exisiting tag and write data to another tag. If that tag has been authorised for entry the new tag will be able to gain entry and will be seen by the reader be the same tag effetively a clone. You can copy cards to fobs and fobs to cards. -
Nathaniel McHugh revised this gist
Aug 5, 2022 . 3 changed files with 32 additions and 1 deletion.There are no files selected for viewing
LoadingSorry, something went wrong. Reload?Sorry, we cannot display this file.Sorry, this file is invalid so it cannot be displayed.This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,10 +1,12 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring.  Readers often look like this  This how to covers how to read an exisiting tag and write data to another tag. If that tag has been authorised for entry the new tag will be able to gain entry and will be seen by the reader be the same tag effetively a clone. You can copy cards to fobs and fobs to cards. @@ -63,4 +65,33 @@ Once you have this data you have all the info you need to clone the tag. The imp ## Can I Emulate a Paxton fob? Not currently with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 cards handle these commands really well. Why not just use one of those i.e. clone to a hitag2 card. ## Writing a Fob To write a fob you need to load your fob data into the virtual tag or vtag. ``` set tag hitag2 VWRITE 1 BDF5E846...... ``` Check the contents of the VTAG ``` VTAG ``` If you are happy with the data as shown in the VTAG then you can clone onto another tag ``` CLONE <BDF5E846|4D494B52 > ``` The password used to clone the card at the end depends on where you got the card from. A new blank hitag2 card should have the password 4D494B52. If a tag has been set up for Paxton readers previously it will have the password BDF5E846. ## Creating a DIY antenna for Paxton fobs I was able to read and write genuine Paxton fobs by creating a coil antenna that allowed the fob to placed inside. I estimated the inductuctance at 200µH. This suggested that with a coil diameter of 2cm roughly 120 turns would give similar impedance. My top tip for winding the antenna would be to use super glue to get the intial loops on and secure them at the correct height.  Unable to render rich display
Invalid image source.
-
Nathaniel McHugh revised this gist
Aug 4, 2022 . 2 changed files with 0 additions and 0 deletions.There are no files selected for viewing
Unable to render rich display
Invalid image source.
Unable to render rich display
Invalid image source.
-
natmchugh revised this gist
Aug 4, 2022 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -5,6 +5,7 @@ Paxton fobs and readers are popular in the UK especially the Net2 system where t Readers often look like this This how to covers how to read an exisiting tag and write data to another tag. If that tag has been authorised for entry the new tag will be able to gain entry and will be seen by the reader be the same tag effetively a clone. You can copy cards to fobs and fobs to cards. ## Equipment -
natmchugh revised this gist
Aug 4, 2022 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,7 +1,7 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring.  Readers often look like this -
Nathaniel McHugh revised this gist
Aug 4, 2022 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,6 +1,7 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring.  Readers often look like this -
Nathaniel McHugh revised this gist
Aug 4, 2022 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
Unable to render rich display
Invalid image source.
-
natmchugh revised this gist
Aug 4, 2022 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,6 +1,7 @@ # How to copy, read and write Paxton fobs and cards with an RFIDler Paxton fobs and readers are popular in the UK especially the Net2 system where the fobs look like this with a blue ring.  Readers often look like this -
Nathaniel McHugh revised this gist
Aug 4, 2022 . 1 changed file with 0 additions and 0 deletions.There are no files selected for viewing
Unable to render rich display
Invalid image source.
-
natmchugh revised this gist
Aug 4, 2022 . 1 changed file with 24 additions and 1 deletion.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -12,7 +12,7 @@ This how to covers how to read an exisiting tag and write data to another tag. I * Some Paxton fobs or hitag2 cards * (optional) a soldering iron but you my be able to get away without one These Paxton fobs use hitag2 technology and can be copied to hitag2 cards and fobs etc. ## Antennas The RFIDler comes with a coil antenna that is very good for reading cards and sniffing readers. It does not however do well with other tag form factors. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further down. @@ -35,6 +35,29 @@ HITAG2> READER 12345678 12345678 ``` You should get the tag serial number being repeated continously which means there is a good strong signal. If you don't then adjust the tag coil position until you do. The next step is to login to the tag that is get passed the tags auth. ``` HITAG2> login BDF5E846 06F907C2 ``` The response is the config bit and tag password. This is held on page 2 of the tag and is the same for all Paxton fobs I tested. Once you have logged in you can now read the 8 pages of data. ``` HITAG2> read 0 0: 12345678 HITAG2> read 1 1: BDF5E846 … ``` repeat up to page 7 Once you have this data you have all the info you need to clone the tag. The important pages are 4-7 these contain the data on which the system identifes for access. ## Can I Emulate a Paxton fob? Not currently with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 cards handle these commands really well. Why not just use one of those i.e. clone to a hitag2 card. -
natmchugh revised this gist
Aug 4, 2022 . 1 changed file with 7 additions and 3 deletions.There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -15,22 +15,26 @@ This how to covers how to read an exisiting tag and write data to another tag. I These Paxton fobs use hitag2 technology and ## Antennas The RFIDler comes with a coil antenna that is very good for reading cards and sniffing readers. It does not however do well with other tag form factors. In order to read and write to a Paxton fob I had to wind my own antenna. This is covered further down. ## Reading a card First we need to set the RFIDLer to hitag2 cards config ``` set tag hitag2 OK *HITAG2> save OK HITAG2> ``` Next we need to try reading the tag serial number. This is readonly and cannot be changed but it is not used in identifying access. It can be read without knowing the password and logining into the tag and is also known as page 0. ``` HITAG2> READER 12345678 12345678 12345678 ``` ## Can I Emulate a Paxton fob? Not currently with an RFIDler. The data flow is more complicated than some other tags involving a back and forth of commands the reader could send. The chips in hitag2 cards handle these commands really well. Why not just use one of those i.e. clone to a hitag2 card.
NewerOlder