Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Logging authentification process I can obtain one key.
Knowing one key, how can I obtain the other?. I don´t finish to understand it.
Thamks in advance.
Offline
Keys are independent. If you sniff loging using key a, you can recover key a only, and if you sniff logging using key b, you can recover only key b. Same rule is with breaking keys using parity method.
Offline
Pages: 1