proxmark3/tools/hitag2crack/crack4
2020-03-13 15:04:07 +01:00
..
.gitignore
HardwareProfile.h style 2020-03-09 16:44:07 +01:00
hitagcrypto.c cppchecker func name 2020-03-13 15:04:07 +01:00
hitagcrypto.h style 2020-03-09 16:44:07 +01:00
ht2crack2utils.c style 2020-03-09 16:44:07 +01:00
ht2crack2utils.h
ht2crack4.c cppchecker - format print 2020-03-13 15:03:11 +01:00
Makefile
readme.md
rfidler.h style 2020-03-09 16:44:07 +01:00
util.h
utilpart.c style 2020-03-09 16:44:07 +01:00

ht2crack4

Build

make clean make

Run

You'll need a file consisting of 16 (or more) nR aR pairs. These are the encrypted nonces and challenge response values. They should be in hex with one pair per line, e.g.: 0x12345678 0x9abcdef0

./ht2crack4 -u UID -n NRARFILE [-N nonces to use] [-t table size]

UID is the UID of the tag that you used to gather the nR aR values. NRARFILE is the file containing the nR aR values. The number of nonces to use allows you to use less than 32 nonces to increase speed. The table size can be tweaked for speed. Start with 500000 and double it each time it fails to find the key.