Skip to content

Commit

Permalink
revamp picopass readme and add loclass (#39)
Browse files Browse the repository at this point in the history
Co-authored-by: あく <[email protected]>
  • Loading branch information
bettse and skotopes authored Sep 16, 2023
1 parent c28bbee commit 37e316f
Showing 1 changed file with 24 additions and 1 deletion.
25 changes: 24 additions & 1 deletion .catalog/README.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,26 @@
# Picopass

This application allows you to read the data from Picopass cards, save it (as either picopass of LFRFID data for multiprotocol readers), change the card keys, and perform key dictionary attacks.

This application allows you to read, write, save, and emulate legacy HID iClass cards and fobs (based on the picopass chipset). Also supports saving the credential to the Flipper Zero LFRFID data format, changing the keys on the card, performing dictionary attack, and performing the 'online' part of the loclass attack.

NOTE: Does not support iClass SE

## Loclass

The loclass attack emulates specific CSN and collects responses from the reader which can be used to calculate the elite or custom key configured for that reader. This key is then used to read data on the cards used with that reader.

### Online part

1. Run `loclass` from the picopass main menu
2. Present the flipper to the reader.
3. Collect responses until the progress bar is full.

NOTE: If the screen says “Got std key” AND stays on 0/18, the reader is not elite or custom keyed.

### Offline part

1. Download the loclass log (`sdcard/apps_data/picopass/.loclass.log`) from your Flipper Zero.
2. Use [loclass.ericbetts.dev](https://loclass.ericbetts.dev/) or a tool of your choice to calculate the key
3. Copy the key to `iclass_elite_dict_user.txt` and place in `sdcard/apps_data/picopass/`
4. Run `Elite Dict. Attack` from the picopass main menu
5. Present card to the back of the Flipper Zero.

0 comments on commit 37e316f

Please sign in to comment.