mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-21 13:53:55 -07:00
added a trace file for looking at a genuine Hitag2 read out when card is configured in Crypto mode
This commit is contained in:
parent
36603818d1
commit
641b8f3f57
3 changed files with 8 additions and 0 deletions
|
@ -104,3 +104,10 @@
|
|||
|hf_mfdes_sniff.trace |Sniff of HID reader reading a MIFARE DESFire SIO card|
|
||||
|hf_iclass_sniff.trace |Sniff of HID reader reading a Picopass 2k card|
|
||||
|hf_mf_hid_sio_sim.trace |Simulation of a HID SIO MFC 1K card|
|
||||
|
||||
## LF demodulated traces
|
||||
|
||||
|filename|description|
|
||||
|--------|-----------|
|
||||
|lf_hitag_crypto_dump.trace |Execution of `lf hitag dump --crypto` against Hitag2 card in crypto mode|
|
||||
|
||||
|
|
BIN
traces/lf_hitag_crypto_dump.trace
Normal file
BIN
traces/lf_hitag_crypto_dump.trace
Normal file
Binary file not shown.
Loading…
Add table
Add a link
Reference in a new issue