proxmark3/tools/hitag2crack/crack5
2020-04-04 14:03:21 +02:00
..
HardwareProfile.h add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
hitagcrypto.c add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
hitagcrypto.h add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
ht2crack2utils.c add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
ht2crack2utils.h add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
ht2crack5.c add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
Makefile add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
README.md add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
rfidler.h add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
util.h add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00
utilpart.c add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00

ht2crack5

Build

make clean
make

Run

You'll need just two nR aR pairs. These are the encrypted nonces and challenge response values. They should be in hex.

./ht2crack5 <UID> <nR1> <aR1> <nR2> <aR2>

UID is the UID of the tag that you used to gather the nR aR values.