Sub-GHz/Gates/Bruteforcing/SMC5326_UNILARM_PT2260/ReadMe.md
Brute force gate remote for SMC5326, UNILARM and PT2260 using Flipper Zero, inspired by Breaking Protocol and flipperzero-bruteforce
Only works on UNILARM, SMC5326, PT2260 and others remote that using the same protocol.
Also can read my blog post on how I investigate the gate remote protocol
[ 16bits of DIP switch combinations ][ 9bits of Instruction base ]
Example in Pulse Plotter:
[ 16bits of DIP switch combinations ][ 8bits of Instruction base ]
Example in Pulse Plotter:
Both protocol is similar to the PT-2262 Format (Princeton). More info here in russian
0, 550μs high 250μs low represent 10, 900μs high 300μs low represent 10, 850μs high 300μs low represent 1| Switch | UNILARM | SMC5326 | PT2260 |
|---|---|---|---|
+ | 11 | 11 | 11 |
o | 10 | 10 | 01 |
- | 00 | 00 | 00 |
Using generate.py you can generate all the .sub files to brute force, or you can directly copy the generated .sub files into the flipper's SD card under the /subghz folder
Under 6561 folder got 1 file contains all 6561 combinations of DIP switch, 2187 contains 3 sub files that contains 2187 combinations, and 729 contains 9 sub files etc. (The less the combinations the more the sub files)
To brute force all combinations of DIP switch, simply run the 0_0.sub in the 6561 folder
To narrow down the brute force time, you need to run multiple times (Something like binary search)
For example:
SMC5326 and frequency is 330MHzSMC5326_330 into flipper's sdcard subghz folder2187/0_0.sub file and the gate opens729 folder, play the sub starts with 0: 0_0,1,2.sub and see which files opens the gate0_1.sub works, then play the sub starts with 1: 1_3,4,5.sub under 243 folderPS: Please test on your own gate or get permission before you test!