# Cloning cards/fobs with a Proxmark3 ## Cloning a Paxton fob Basically, follow this guide: https://badcfe.org/how-to-paxton-with-proxmark/ I managed to read my fob with: ``` lf hitag read --ht2 -k BDF5E846 ``` If you're getting "Password failed!" or nothing back, move the fob around the 125KHz antenna (the top one), it should eventually work. Afterwards, [convert the fob pages to an EM4100 ID](https://static.badcfe.org/paxton-covert), and flash the ID to a T5577, emulating an EM4100 chip: ``` lf em 410x clone --id ``` Read it back to make sure: ``` lf em 410x reader ``` You should be done, but I haven't tested it as I don't have a Paxton reader handy. ## Cloning MiFare cards See [Cloning a Mifare Classic 1K](https://www.gavinjl.me/proxmark-3-cloning-a-mifare-classic-1k/). ## Card cloner password I have an AliExpress cloner which clones LF cards. Unfortunately, whenever it clones a card, it sets the password bit on it. This makes the card not respond to writes/wipes without the password (it just keeps having the same data, no matter what you write). To remove it with the Proxmark3, run: ``` lf t55 wipe -p 51243648 ``` ## Cloning T5577 cards Read the card with: ``` lf em 410x reader ``` Write with: ``` lf EM 410x clone --id ``` ## Related reading * [Iceman's Proxmark3 firmware (use this one)](https://github.com/RfidResearchGroup/proxmark3) * [How to copy Paxton fobs using an RFIDler](https://gist.github.com/natmchugh/18e82761dbce52fa284c87c190dc926f#getting-hold-of-hitag2-tags) * [ How to copy, read and write Paxton fobs and cards with a Proxmark ](https://badcfe.org/how-to-paxton-with-proxmark/) * * *

Last updated on March 04, 2024. For any questions/feedback, email me at hi@stavros.io.