DarkFlippers / flipperzero-subbrute

SubGHz key checker
MIT License
578 stars 47 forks source link

Protocole princeton #19

Closed jamesboss112233 closed 1 year ago

jamesboss112233 commented 1 year ago

Brute forcing princeton 24 bits 433mhz is it possible ? And how ? 🤔

xMasterX commented 1 year ago

Only specific remotes that are using dip switches, we already have this in the app

or you can use your file via BF Existing dump then you can select two or 4 bytes to bruteforce but not 24! 24 bit bruteforce will take 800+ hours, do you want to wait ~800 hours?

jamesboss112233 commented 1 year ago

I'm new, I wanted to try to brute force my house bell. I know the security protocol but I didn't know the BF application. Thank you for your help anyway. Isn't there a way to reduce the possibilities?

Le ven. 28 avr. 2023 à 20:11, MX @.***> a écrit :

Only specific remotes that are using dip switches, we already have this in the app

or you can use your file via BF Existing dump then you can select two or 4 bytes to bruteforce but not 24! 24 bit bruteforce will take 800+ hours, do you want to wait ~800 hours?

— Reply to this email directly, view it on GitHub https://github.com/DarkFlippers/flipperzero-subbrute/issues/19#issuecomment-1527922080, or unsubscribe https://github.com/notifications/unsubscribe-auth/A7O3QJ7DBQJOC5NFEXZ3THLXDQB6LANCNFSM6AAAAAAXPRO2CA . You are receiving this because you authored the thread.Message ID: @.***>