You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This guide assumes that you have already installed the app.
31
-
32
-
To recover keys from card you first need to collect nonces.
33
-
34
-
That's what this app was created for. App can't recover keys on Flipper Zero (yet). You need to use external device (PC) to recover keys. You can't use Mfkey32 on your phone with this app.
35
-
36
-
1. Save tag after scanning (you must have found at least one key). This action will create key cache that app will use for authorization on tag.
37
-
38
-
2. Run "Nested attack" from app menu
39
-
40
-
3. Wait until calibration complete
41
-
42
-
If the calibration passed and nonce collection began, you are very lucky and the tag is vulnerable. If not, you cannot use this app to recover keys from this tag.
43
-
44
-
Calibration can take a lot of time. If the calibration takes longer than 10 minutes, it is better to see the logs. Some static encrypted nonce tags may lead to inifnity calibration loop.
45
-
46
-
4. Wait until "Nonces collected!"
47
-
48
-
5. Recover keys via [desktop script](https://github.com/AloneLiberty/FlipperNestedRecovery)
49
-
50
-
6. Run "Check found keys" in app menu
51
-
52
-
When all keys are checked, they will be added to your user key dictonary. You can rescan your tag now.
For frequently asked questions, please refer to the [FAQ.md](./FAQ.md) file.
34
+
For frequently asked questions, please refer to the FAQ: [EN](https://github.com/AloneLiberty/FlipperNested/wiki/FAQ)[RU](https://github.com/AloneLiberty/FlipperNested/wiki/%D0%A7%D0%90%D0%92%D0%9E).
0 commit comments