added a trace file for looking at a genuine Hitag2 read out when card is configured in Crypto mode

This commit is contained in:
iceman1001 2024-04-25 07:37:26 +02:00
parent 36603818d1
commit 641b8f3f57
3 changed files with 8 additions and 0 deletions

View file

@ -3,6 +3,7 @@ All notable changes to this project will be documented in this file.
This project uses the changelog in accordance with [keepchangelog](http://keepachangelog.com/). Please use this to write notable changes, which is not the same as git commit log...
## [unreleased][unreleased]
- Added `lf_hitag_crypto.trace` - trace file of a complete read out of a Hitag2 in crypto mode (@iceman1001)
- Fix `lf cmdread` - uninitialised memory usage (@iceman1001)
- Changed `hf st info` - now tries to check signature if available (@iceman1001)
- Added `hf 14b mobib` - try to read out all data from a MOBIB card (@iceman1001)

View file

@ -104,3 +104,10 @@
|hf_mfdes_sniff.trace |Sniff of HID reader reading a MIFARE DESFire SIO card|
|hf_iclass_sniff.trace |Sniff of HID reader reading a Picopass 2k card|
|hf_mf_hid_sio_sim.trace |Simulation of a HID SIO MFC 1K card|
## LF demodulated traces
|filename|description|
|--------|-----------|
|lf_hitag_crypto_dump.trace |Execution of `lf hitag dump --crypto` against Hitag2 card in crypto mode|

Binary file not shown.