Comment by A4ET8a8uTh0
Comment by A4ET8a8uTh0 9 hours ago
Hah, talk about good timing. I just got my flipper:D
I have a weird related question and I am not looking for a full answer, but rather on what/where would be a good resource to find that information as what I have found so far was not super useful.
In short, for the newer employee badges, are there some secret handshake pieces that flipper can't copy? Stuff around the house worked flawlessly, but the moment I tried to play with employee card, I got, um, mixed results.
Step 1 of reverse engineering anything: Figure out the make and model of the thing. ;)
"Employee badges" can be implemented in a number of ways, from simple broadcasted rfids down to having secret challenge responses that aren't breakable without going down the jlsca route since the secret is on the device and never leaves it.
So, step 1: figure out what exactly the model your 'employee badge' is using and what protocol it uses. There's probably some marking on it that should give you the manufactuerer at least.