proxmark3/tools/hitag2crack/crack5
2020-04-28 13:29:16 +02:00
..
.gitignore ht2 common files 2020-04-04 14:32:03 +02:00
ht2crack5.c cppchecker fix 2020-04-28 13:29:16 +02:00
Makefile hitag2crack compile flags 2020-04-26 22:41:41 +02:00
README.md

ht2crack5

Build

make clean
make

Run

You'll need just two nR aR pairs. These are the encrypted nonces and challenge response values. They should be in hex.

./ht2crack5 <UID> <nR1> <aR1> <nR2> <aR2>

UID is the UID of the tag that you used to gather the nR aR values.