[55-5] Virtual Physical Penetration Test - Part 5: Access Controlled
HTML-код
- Опубликовано: 23 ноя 2020
- After successfully translating the binary Wiegand data to hex and cloning the credential you make your way further into the facility only to meet another roadblock.
Finally one I might know. The tool would be the plastic shim. This is a fun series thanks for all the work you have put in. Cheers
You got it! Thank you for the kind words, I’m glad people are having fun with it!
Some kind of shim such as a piece of plastic from a milk jug or a credit card or a flyswatter part. Hopefully I am thinking of the door opening away in the right way.
This was pretty cool. I dont know a damn thing about badge readers. Wish I did. Still enjoyed the vid
I guess I would try a thin plastic shim, since I could push and just slip it.
A mica shim
Ok, I've been grappling with this for a few minutes trying to follow. Firstly would it be correct to let the ProxMark software do this for you using the lf hid weigand 0 42 1337 then copying the hex value out of the 26 bit return, as you demonstrated in your video #12?
Secondly, when I use the weigand calculator located at www.ccdesignworks.com/wiegand_calc.htm to convert the facility code 42 and the card number 1337 to hex, I get 2540A73. When I convert that back to binary (it's a perfect 26 bits) and add the 12 bit HID identifier 100000000001 to the front of the string, then convert that back to hex, I get 2006540A73 which is one bit flipped from your result. What am I missing?
That's a great question. I took a look and it seems the calculator at the link assigns the wrong parity bit on the end, not your fault at all! The tail end parity bit should be a zero not a one, and that would then give you the right result. I'm not sure why the website is giving you the wrong tail end parity bit.
Lol completely lost I am
Carolina roller
Ah, but the door opens away from you! 😉
A piece of plastic