Script recovers keys from collected authorization attempts (nonces). You can collect nonces on Flipper Zero with FlipperNested
Flipper Zero should be connected with USB cable and not used by ANY other software (./fbt log, qFlipper, lab.flipper.net)
pip install --upgrade FlipperNested
or, install from sources:
pip install --upgrade pyserial protobuf wheel setuptools
python setup.py sdist bdist_wheel
pip install --user --upgrade --find-links=./dist FlipperNested
$ FlipperNested
[?] Checking 12345678.nonces
Recovering key type A, sector 0
Found 1 key(s): ['ffffffffffff']
...
[+] Found potential 32 keys, use "Check found keys" in app
$ FlipperNested --help
usage: FlipperNested [-h] [--uid UID] [--progress] [--save] [--preserve] [--file FILE]
Recover keys after Nested attack
options:
-h, --help show this help message and exit
--uid UID Recover only for this UID
--port PORT Port to connect
--progress Show key recovery progress bar
--save Debug: Save nonces/keys from Flipper
--preserve Debug: Don't remove nonces after recovery
--file FILE Debug: Recover keys from local .nonces file