proxmark3/tools/hitag2crack/crack5
2021-09-05 23:42:14 +02:00
..
.gitignore
ht2crack5.c cppcheck reduce variable scopes 2021-09-05 23:42:14 +02:00
Makefile
README.md

ht2crack5

Build

make clean
make

Run

You'll need just two nR aR pairs. These are the encrypted nonces and challenge response values. They should be in hex.

./ht2crack5 <UID> <nR1> <aR1> <nR2> <aR2>

UID is the UID of the tag that you used to gather the nR aR values.