Update hid_downgrade.md

Signed-off-by: Xavier <90627943+kitsunehunter@users.noreply.github.com>
This commit is contained in:
Xavier 2025-04-28 19:03:58 -04:00 committed by GitHub
commit bf6d9f3531
No known key found for this signature in database
GPG key ID: B5690EEEBB952194

View file

@ -24,6 +24,7 @@ This document targets both Proxmark3 and Flipper Zero devices.
- [Simulate a standard keyed iCLASS legacy credential](#simulate-a-standard-keyed-iclass-legacy-credential)
- [Write a downgraded iCLASS legacy credential](#write-a-downgraded-iclass-legacy-credential)
- [Using Omnikey Reader 5427CK Gen2 and Proxmark3](#using-omnikey-reader-5427ck-gen2-and-proxmark3)
- [Using Elatec TWN4 or TWN4 mini (USB front reader)](#using-omnikey-reader-5427ck-gen2-and-proxmark3)
- [Using Flipper Zero with NARD](#using-flipper-zero-with-nard)
- [Using Weaponized HID Reader](#using-weaponized-hid-reader)
- [Write ProxII credential to a T5577](#write-proxii-credential-to-a-t5577)
@ -191,6 +192,19 @@ drop iclass-flipper.picopass file here and simulate on Flipper
7. Launch PM3 client, place iCLASS/Picopass card on HF antenna and read your original card on the Omnikey reader
8. Press enter
## Using Elatec TWN4 or TWN4 mini (USB front reader)
^[Top](#top)
OBS!
The reader must have the `PI` designation on the label for it to have a embedded HID SAM. If the reader is any other configuration as per the label, a HID SAM will have to be installed in the SAM slot.
1. Launch `appblaster.exe`
2. Click on "program firmware image"
3. Select `encoder.bix` as the reader firmware
4. Click program image
5. Launch PM3 client, place iCLASS/Picopass card on HF antenna and read your original card on the Elatec reader
8. Press enter
## Using Flipper Zero with NARD
^[Top](#top)