Is your transponder blocked by a license and therefore cannot be taught to locking systems or check-in devices? We would like to show you how you could still copy transponders with copy protection or license keys for test purposes.
Installing the prerequisites:apt-get install pcscd pcsc-tools libpcsclite-dev libpcsclite1 libusb-dev git
Edit block list for drivers:nano /etc/modprobe.d/blacklist-libnfc.confblacklist pn533-usbblacklist pn533blacklist nfc
Restart the computer or execute the following commands:modprobe -r pn533-usbmodprobe -r pn533modprobe -r nfcMust always be done without reboot if NFC Device is displayed as Busy
https://stackoverflow.com/questions/31131569/unable-to-claim-usb-interface-device-or-resource-busy – Help if USB Device Busy
Install standard NFC driver:apt-get install libnfc-bin libnfc-dev libnfc5
Check whether the reader is recognized:nfc-scan-device
Install miLazyCrackercd ~mkdir nfccd nfccd miLazyCracker./miLazyCrackerFreshInstall.sh
Change to the working directory and start miLazyCrackercd ~cd nfcmkdir mydumpscd mydumpsmiLazyCracker
Do not wait too long. Press Enter at 2000-3000 nonces (or wait for the process to start by itself).
The yellow marked cracking took about 5h with 16 CPU cores.
The whole thing repeats with the key B [lasted min. 20min].
All sectors are output
Place the target tag on the NFC reader (e.g. X3 Elite) and press Y+Enter.
Data is written