Skip to content

Commit 26bb92b

Browse files
author
Astra
authored
Fix markdown headings in the picopass README (#93)
1 parent 1d1083f commit 26bb92b

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

.catalog/README.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,39 +3,39 @@
33

44
This application allows you to read, write, save, and emulate legacy HID iClass cards and fobs (based on the picopass chipset). Also supports saving the credential to the Flipper Zero LFRFID data format, changing the keys on the card, performing dictionary attack, and performing the 'online' part of the loclass attack.
55

6-
## Loclass
6+
# Loclass
77

88
The loclass attack emulates specific CSN and collects responses from the reader which can be used to calculate the elite or (some) custom key configured for that reader. This key is then used to read data on the cards used with that reader.
99

10-
### Online part
10+
## Online part
1111

1212
1. Run _loclass_ from the picopass main menu
1313
2. Present the flipper to the reader. Holding flipper directly to reader may not work, vary distance by a few inches.
1414
3. Collect responses until the progress bar is full.
1515

1616
NOTE: If the screen says “Got std key” AND stays on 0/18, then loclass isn't needed.
1717

18-
### Offline part
18+
## Offline part
1919

2020
1. Download the loclass log (_sdcard/apps_data/picopass/.loclass.log_) from your Flipper Zero.
2121
2. Use [loclass.ericbetts.dev](https://loclass.ericbetts.dev/) or a tool of your choice to calculate the key
2222
3. Copy the key to _iclass_elite_dict_user.txt_ and place in _sdcard/apps_data/picopass/assets/_
2323
4. Run _Elite Dict. Attack_ from the picopass main menu
2424
5. Present card to the back of the Flipper Zero.
2525

26-
### Failure
26+
## Failure
2727

2828
There are some situations when the offline loclass may not find a key, such as:
2929
* iClass SE
3030
* Readers configured with Standard-2 keyset
3131
* Custom keyed readers using Standard KDF
3232
* Custom keyed readers using SE KDF
3333

34-
## NR-MAC read
34+
# NR-MAC read
3535

3636
Due to the nature of how secure picopass works, it is possible to emulate some public fields from a card and capture the reader's response, which can be used to authenticate. Two of the pieces involved in this are the NR and MAC.
3737

38-
### Card Part 1
38+
## Card Part 1
3939

4040
1. Place card against Flipper Zero
4141
2. Run _Read_ from the picopass main menu
@@ -44,15 +44,15 @@ Due to the nature of how secure picopass works, it is possible to emulate some p
4444
5. Select "Save Partial"
4545
6. Name file something you'll remember
4646

47-
### Reader Part
47+
## Reader Part
4848

4949
1. Select _Saved_ from the picopass main menu
5050
2. Select the file name you saved in last step of Card Part 1
5151
3. Select _Emulate_
5252
4. Expose Flipper Zero to reader (It may work better a few inches from the reader, as opposed to physically touching)
5353
5. Flipper will buzz and screen will say "NR-MAC Saved!"
5454

55-
### Card Part 2
55+
## Card Part 2
5656

5757
1. Place card against Flipper Zero
5858
2. Run _Read_ from the picopass main menu

0 commit comments

Comments
 (0)