Parcourir la source

Picopass: one more readme fix (#42)

Co-authored-by: あく <alleteam@gmail.com>
Nikolay Minaylov il y a 2 ans
Parent
commit
bf2f50c409
1 fichiers modifiés avec 4 ajouts et 4 suppressions
  1. 4 4
      .catalog/README.md

+ 4 - 4
.catalog/README.md

@@ -11,7 +11,7 @@ The loclass attack emulates specific CSN and collects responses from the reader
 
 
 ## Online part
 ## Online part
 
 
-1. Run `loclass` from the picopass main menu
+1. Run _loclass_ from the picopass main menu
 2. Present the flipper to the reader.
 2. Present the flipper to the reader.
 3. Collect responses until the progress bar is full.
 3. Collect responses until the progress bar is full.
 
 
@@ -19,8 +19,8 @@ NOTE: If the screen says “Got std key” AND stays on 0/18, the reader is not
 
 
 ## Offline part
 ## Offline part
 
 
-1. Download the loclass log (`sdcard/apps_data/picopass/.loclass.log`) from your Flipper Zero.
+1. Download the loclass log (_sdcard/apps_data/picopass/.loclass.log_) from your Flipper Zero.
 2. Use [loclass.ericbetts.dev](https://loclass.ericbetts.dev/) or a tool of your choice to calculate the key
 2. Use [loclass.ericbetts.dev](https://loclass.ericbetts.dev/) or a tool of your choice to calculate the key
-3. Copy the key to `iclass_elite_dict_user.txt` and place in `sdcard/apps_data/picopass/`
-4. Run `Elite Dict. Attack` from the picopass main menu
+3. Copy the key to _iclass_elite_dict_user.txt_ and place in _sdcard/apps_data/picopass/_
+4. Run _Elite Dict. Attack_ from the picopass main menu
 5. Present card to the back of the Flipper Zero.
 5. Present card to the back of the Flipper Zero.