proxmark3/tools/hitag2crack/crack5
2020-04-26 22:41:41 +02:00
..
.gitignore
ht2crack5.c Avoid printing size_t in ht2crack5 for Mingw 2020-04-26 22:36:02 +02:00
Makefile hitag2crack compile flags 2020-04-26 22:41:41 +02:00
README.md

ht2crack5

Build

make clean
make

Run

You'll need just two nR aR pairs. These are the encrypted nonces and challenge response values. They should be in hex.

./ht2crack5 <UID> <nR1> <aR1> <nR2> <aR2>

UID is the UID of the tag that you used to gather the nR aR values.