Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi Guys,
Does anyone have a good site/tool for analyzing potential XORs by entering the 1 byte output and having a generated list of potential 1 byte inputs that XOR to equal that output? I've been fooling around with just entering multiple 1 byte inputs into https://onlinehextools.com/xor-hex-numbers and looking at the output but if possible I'd like to have the reverse, enter an output and see the various 2 inputs, 3 inputs etc that could generate that output.
This is for fooling around with potential card algorithms derived from UIDs, as an example if I have:
Input (8 byte UID) E0 04 01 00 A4 66 76 B4 = Output 80 A9
Input (8 byte UID) E0 04 01 00 A4 66 4A ED = Output 80 DD
Input (8 byte UID) E0 04 01 00 A4 66 64 91 = Output 80 28
I'm just looking to learn better ways to analyze things like this and discover how the A9 or DD etc. could be generated from the 8 bytes of the UID.
Thanks!
Offline
in iceman fork / RRG Repo you find stuff like that in the client under "analyze" command.
Offline
Pages: 1