November 2022 Add FIles
This commit is contained in:
2
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
||||
sample_rate=250000
|
||||
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/10-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:dfddb9030e3aa4cdaff8335deddbced52f04faade598622060355f6111c210d9
|
||||
size 2548720
|
2
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
||||
sample_rate=250000
|
||||
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/11-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:5120efb2b64455a30fa4855dd64767eac98bbd70014b45f748b859ed6bb42d60
|
||||
size 5274108
|
2
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
||||
sample_rate=250000
|
||||
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/12-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:3f7680e5cfdd107b3e2a0f67fab7faca190769ef91dd80ae05b727b04dc16737
|
||||
size 9578184
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
2
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
||||
sample_rate=250000
|
||||
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/4-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:d50d0d3c739b80dc87d97b8ea33e208497b83a30ba9d2b5e75621cd675639f71
|
||||
size 1069732
|
2
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.TXT
Normal file
2
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.TXT
Normal file
@ -0,0 +1,2 @@
|
||||
sample_rate=250000
|
||||
|
3
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.c16
Normal file
3
Replay_Attacks/DeBruijn/C16_De-Buijn/8-bit_De-Buijn.c16
Normal file
@ -0,0 +1,3 @@
|
||||
version https://git-lfs.github.com/spec/v1
|
||||
oid sha256:6ef14cbcbe4a978ef66a4bd041e428f677f8ee877002472d625301cdbbf1ed4e
|
||||
size 3815752
|
38
Replay_Attacks/DeBruijn/C16_De-Buijn/README.md
Normal file
38
Replay_Attacks/DeBruijn/C16_De-Buijn/README.md
Normal file
@ -0,0 +1,38 @@
|
||||
# HackRF-Portapack Files for the DeBruijn attack!
|
||||
|
||||
This is a Github repository devoted to delivering to you
|
||||
the required files to perform the DeBruijn attack from your HackRF-Portapack
|
||||
|
||||
*This is for educational purposes only.
|
||||
I am in NO WAY liable for any actions executed by means of the contents within this
|
||||
repository. PLEASE use responsibly.*
|
||||
|
||||
*If unfamiliar with the debruijn attack: this attack
|
||||
transmits a single signal that contains every possible
|
||||
combination of a specific bit-length in just seconds
|
||||
by overlapping binary sequences*
|
||||
|
||||
*This attack will NOT work on devices that utilize
|
||||
rollling codes*
|
||||
|
||||
## Prerequisites:
|
||||
|
||||
### Hardware:
|
||||
• HackRF and Portapack
|
||||
|
||||
## Getting started:
|
||||
|
||||
Transfer these files to a folder called "DeBruijn" at the
|
||||
root of your Portapack's SD card.
|
||||
|
||||
To perform the attack(s), simply use the "Replay" function
|
||||
within the "Havoc" or "Mayhem" firmware and choose one of
|
||||
these files in the "DeBruijn" folder
|
||||
|
||||
These files are labeled according to what type of key/remote
|
||||
they are calculated for based on bit-length
|
||||
|
||||
Have fun, and *USE RESPONSIBLY*
|
||||
|
||||
*If you'd like to use trinary sequences as well, click [here](https://drive.google.com/drive/folders/182GeXBpSp3klfKB5Phci-zFITLylrn1W?usp=sharing)
|
||||
for the full version*
|
Reference in New Issue
Block a user