Hitag2 Crack2 implementation working on Proxmark3

The second key recovery vector outlined in the Gone in 360 seconds paper by F Garcia et al, implemented by Kev Sheldrake in RFIDLer 2017, now work in Proxmark3.

It is a time/trade memory attack, with a online part and a secondary offline part.

We can now gather the 2048 bits of crypto key stream needed for the second part of the attack in the pm3 client.

You all need to create the 1.2tb lookup database file in order to execute the offline part of the attack.

You find all you need in tools\hitag2crack\crack2