proxmark3/tools/hitag2crack/crack5
2020-06-22 22:34:05 +02:00
..
.gitignore ht2 common files 2020-04-04 14:32:03 +02:00
ht2crack5.c Little optimization for hitag2hell attack 2020-06-22 22:34:05 +02:00
Makefile Bring hitag2crack tools in main Makefiles 2020-05-23 13:33:32 +02:00
README.md

ht2crack5

Build

make clean
make

Run

You'll need just two nR aR pairs. These are the encrypted nonces and challenge response values. They should be in hex.

./ht2crack5 <UID> <nR1> <aR1> <nR2> <aR2>

UID is the UID of the tag that you used to gather the nR aR values.