This is a unique hacking and pen-testing RFID credential and one of the finest cards that it's been our pleasure to source for you all. This is a single card with the same thickness of our other RFID credentials (the same thickness of a conventional credit card or driver's license) but internally it contains two separate antennas and two separate chips: one low frequency and one high frequency.
The ISO14443A "Magic MIFARE" chip in this card is a High Frequency RFID credential with some notable features
- Designed to mimic the functionality of a Mifare 1K card
- UID Changeable Card
- Operating frequency: 13.56 MHz
- 16-bit CRC, parity, bit anti-collision coding, bit counting
- Data transfer of 106 kbit/s
The Atmel/Microchip T5557 chip in this card is a low frequency 125KHz read/writable credential which can be programmed to emulate many popular access control system cards. The T5577 chip is capable emulating the following access control credential cards:
- HID Prox
- Indala Flexpass
- Kantech ioProx
- Swatch EM41xx
- Applied Wireless AWID
- Farpointe Data Systems
- Honeywell NexWatch
- eTag SecuraKey
... and more.
Most field teams opt to interact with these credentials using a tool such as the Proxmark3, but it is also possible to program and configure T5577 and "Magic" MIFARE chips with smaller tools like the Flipper Zero, "Cloner Guns", etc.
Red Team Tools hybrid dual-frequency RFID cards are of "composite" construction, meaning they include layers of PET to protect and reinforce the conventional PVC layer which contains the antenna and silicon. The added PET, being more resistant to heat and bending, makes these cards particularly well-suited to all types of card printers including direct-to-card, retransfer, and more.