nfc-tools / miLazyCracker

Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
313 stars 61 forks source link

Flipped knownKey #1

Closed indocomsoft closed 6 years ago

indocomsoft commented 6 years ago

When miLazyCracker.sh calls libnfc_crypto1_crack, it passes a flipped around $knownKey, e.g. if the key is b0b1b2b3b4b5, it was parsed as b5b4b3b2b1b0.

My PR fixed that.

rapperskull commented 6 years ago

I can confirm that by using @indocomsoft 's fork I retrieved some keys with success, while I was getting errors with current revision.

alvgalrus commented 6 years ago

I think this should have been fixed by my PR in mfoc ( https://github.com/nfc-tools/mfoc/pull/44 ) instead of this dirty hack here.