Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

  • Logged in as ikarus
  • Last visit: Today 11:22:42

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2009-10-16 16:19:23

Baquinjam Palas
Contributor
Registered: 2009-09-27
Posts: 17

Keys

Logging authentification process I can obtain one key.

Knowing one key, how can I obtain the other?. I don´t finish to understand it.

Thamks in advance.

Offline

#2 2009-10-16 20:47:46

elektryk
Contributor
Registered: 2009-09-10
Posts: 43

Re: Keys

Keys are independent. If you sniff loging using key a, you can recover key a only, and if you sniff logging using key b, you can recover only key b. Same rule is with breaking keys using parity method.

Offline

Quick reply

Write your message and submit

Board footer

Powered by FluxBB