diff --git a/picopass/.catalog/README.md b/picopass/.catalog/README.md index 2e709b773bd..f719eaa6731 100644 --- a/picopass/.catalog/README.md +++ b/picopass/.catalog/README.md @@ -1,3 +1,26 @@ # Picopass -This application allows you to read the data from Picopass cards, save it (as either picopass of LFRFID data for multiprotocol readers), change the card keys, and perform key dictionary attacks. + +This application allows you to read, write, save, and emulate legacy HID iClass cards and fobs (based on the picopass chipset). Also supports saving the credential to the Flipper Zero LFRFID data format, changing the keys on the card, performing dictionary attack, and performing the 'online' part of the loclass attack. + +NOTE: Does not support iClass SE + +## Loclass + +The loclass attack emulates specific CSN and collects responses from the reader which can be used to calculate the elite or custom key configured for that reader. This key is then used to read data on the cards used with that reader. + +### Online part + +1. Run `loclass` from the picopass main menu +2. Present the flipper to the reader. +3. Collect responses until the progress bar is full. + +NOTE: If the screen says “Got std key” AND stays on 0/18, the reader is not elite or custom keyed. + +### Offline part + +1. Download the loclass log (`sdcard/apps_data/picopass/.loclass.log`) from your Flipper Zero. +2. Use [loclass.ericbetts.dev](https://loclass.ericbetts.dev/) or a tool of your choice to calculate the key +3. Copy the key to `iclass_elite_dict_user.txt` and place in `sdcard/apps_data/picopass/` +4. Run `Elite Dict. Attack` from the picopass main menu +5. Present card to the back of the Flipper Zero.