You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Only specific remotes that are using dip switches, we already have this in the app
or you can use your file via BF Existing dump
then you can select two or 4 bytes to bruteforce
but not 24!
24 bit bruteforce will take 800+ hours, do you want to wait ~800 hours?
I'm new, I wanted to try to brute force my house bell. I know the security
protocol but I didn't know the BF application. Thank you for your help
anyway. Isn't there a way to reduce the possibilities?
Le ven. 28 avr. 2023 à 20:11, MX ***@***.***> a écrit :
Only specific remotes that are using dip switches, we already have this in
the app
or you can use your file via BF Existing dump
then you can select two or 4 bytes to bruteforce
but not 24!
24 bit bruteforce will take 800+ hours, do you want to wait ~800 hours?
—
Reply to this email directly, view it on GitHub
<#19 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/A7O3QJ7DBQJOC5NFEXZ3THLXDQB6LANCNFSM6AAAAAAXPRO2CA>
.
You are receiving this because you authored the thread.Message ID:
***@***.***>
Brute forcing princeton 24 bits
433mhz is it possible ? And how ? 🤔
The text was updated successfully, but these errors were encountered: