Hacking NFC with Flipper Zero

Ғылым және технология

ko-fi.com/rad_linux
This is a light primer on NFC and the Flipper Zero. We can do so much with such a simple connection!
flippermaker.github.io/

Пікірлер: 63

  • @NightSkater69
    @NightSkater69Ай бұрын

    man was just thinking this guy only has 1000 subs, then figured, 'naw, prob just an old video'. and i mean big ups on 2.5k. im just amazed its not more. your videos are the only ones so far ive found that are actually informative beyond the whole,, 'this is an sd card, net let me show you how to insert it' videos... and no huge diss towards sasq, but i could do with slightly less hand holding in that area and a little more in.... well the stuff you cover. all in all, good show and keep up the good work, its deffinitly appreciated.

  • @rad_linux

    @rad_linux

    Ай бұрын

    thank you so much for the positive feedback! This channel was intended to mirror my own journey with the Flipper. I learned more than expected from a little device I backed on kickstarter. I really appreciate what sasquach has done. He was smart about building a community and bringing new users into the ethical hacking space. I must admit I like a drier delivery as well so I'm glad to offer a different space. My biggest flop was probably not starting a discord during flippers peak. Well. better luck next time >D

  • @TheWesNile
    @TheWesNile Жыл бұрын

    your videos are very easy to follow and understand thanks!

  • @rad_linux

    @rad_linux

    Жыл бұрын

    Thanks for checking them out!

  • @sshroot5565
    @sshroot5565 Жыл бұрын

    I think this device can do more and it is a lot powerful . But it is software restricted because they don't want to do illegal stuff with this device :) And regarding the "detect reader " functionality : you can extract NFC keys from an NFC reader by getting nonce keys and then decoding with flipper . I did extract some NFC keys using that function .

  • @rad_linux

    @rad_linux

    Жыл бұрын

    Its true that they limit the capabilities of the device through firmware, but that's primarily for legal and regulatory reasons. Where the flipper falls short is things like repetitive brute force. It just doesn't have the computational power. There are also small hardware issues that will likely be ironed out in future iterations. Mifare classic 1k is a good example where the timing issue is best solved with a hardware revision

  • @travisrawlings4957

    @travisrawlings4957

    Жыл бұрын

    If he only knew how wrong he is in this video. If you don’t know now you know lol

  • @rad_linux

    @rad_linux

    Жыл бұрын

    @@travisrawlings4957 I'd love to make better content. If I'm wrong, let me know!

  • @AntonioMooreworldleaderSerious

    @AntonioMooreworldleaderSerious

    8 ай бұрын

    But I'm saving missing kids with it you know what it do bruh and I get no money I do it free I guess I hate you all😂😂

  • @JamesWilliams-qv6vc
    @JamesWilliams-qv6vc Жыл бұрын

    Hay man love the videos. I just want to say that the reason I subscribe was how basic the setup is and how honest your are. What I mean about “how basic your setup is” what I mean is there not a big grand intro like Pen ace I’m not trying to hate on him but I like how you are doing videos just showing us a lot of cool stuff about the flipper zero. Thanks man.

  • @rad_linux

    @rad_linux

    Жыл бұрын

    Thanks so much! I like a bit of a straight forward "low effort" direction. It works well with my low budget and minimal equipment :) I'm just trying to be a human like the rest!

  • @Danjovisagat
    @Danjovisagat Жыл бұрын

    Just subbed, 5 more to go to 1000 keep sharing more flipper updates! :D

  • @rad_linux

    @rad_linux

    Жыл бұрын

    Thanks so much!!! I'm so close yet so far XD. There will be plenty more to come here. Keep an eye out!

  • @user-cw4vx9in7p
    @user-cw4vx9in7p5 ай бұрын

    Thanks for the great content! one of the fantastic video for Flipper Zero Explanation with NFC... Love from Bharat Bro 🚩

  • @rad_linux

    @rad_linux

    5 ай бұрын

    thanks for watching!

  • @wearegeek
    @wearegeek5 ай бұрын

    Thanks for the great content! MiFare Classic emulation is possible. You need to read the chip, get as many keys as possible, save it and then do a nested attack. With the nonces gathered from that you can bruteforce to discover more keys. If you don't find all keys, repeat the process until you have all keys. I'm not sure it's possible with all MiFare Classic chips, but I've been able to read and emulate a Dutch OV-Chipcard (Dutch public transport card).

  • @rad_linux

    @rad_linux

    4 ай бұрын

    In earlier development of the flipper they had discussed hardware issues that led them to believe mifare classic was not possible. I think they've found a way around that since releasing this video so you are right. Some mifare classic emulation is possible,

  • @StellarStoic
    @StellarStoic Жыл бұрын

    We want more, we want more, we want more, we want more, we want more, we want more 🙂 thanks for doing this

  • @rad_linux

    @rad_linux

    Жыл бұрын

    Its been really fun working on these! Thanks so much for sticking around

  • @HollyTroll
    @HollyTroll Жыл бұрын

    this was very useful, thanks for the vid.. keep it up

  • @rad_linux

    @rad_linux

    Жыл бұрын

    I'm glad it was useful! Thanks for hanging out

  • @xeon_one
    @xeon_one Жыл бұрын

    How about doing reviews on accessories and also different types of antenna that can helps with the range. Keep up the good work.

  • @rad_linux

    @rad_linux

    Жыл бұрын

    I would love to do some more of that in the future. Right now this channel is put together on a shoe string (about zero dollars) budget. Hopefully in the future I can afford to throw some money into that!

  • @PLAYINSKILSSRT

    @PLAYINSKILSSRT

    Жыл бұрын

    Or making bad nfcs like bad usb some real fun not like wow look at me stock basic flipper lol

  • @rad_linux

    @rad_linux

    Жыл бұрын

    @@PLAYINSKILSSRT my channel has generally focused on a stock experience to promote an understanding for new users so they can develop skill sets on their own. NFC files are easy to make with the tool I provided in the comments. More advanced techniques like creating webhooks to access with an nfc file are beyond that scope but I might visit that in the future.

  • @kaidenauzenne7558
    @kaidenauzenne755811 ай бұрын

    Just stumbled upon your video! Love the information! Can you make video explaining the detect reader function a bit more in depth? I’ve been able to collect all the nonces from the reader, then use Mfkey32, and it sends the info to my phone. So what after that?

  • @rad_linux

    @rad_linux

    11 ай бұрын

    thanks so much! I've been wanting to make a video about that but sadly I havn't been able to get permission from people who own a card reader. Its relatively simple though. If you collect the nonces you can connect to your phone and go to the hub section in the flipper app. Under NFC Tools you will see mfkey32. From there you can import the nonces you collected and it will calculate keys. If those keys don't already exist then they can be added into your dictionary. This is helpful because then you will have more keys available to help brute force different NFC cards. Its not all that great though because the flipper isn't really powerful enough to produce quick brute force results. I've seen it take up to an hour or more when dictionaries are large enough.

  • @Putrakampungan
    @Putrakampungan7 ай бұрын

    I managed to tap my flipper to card reader in hotel room for about 16 times and then I calculated on my phone. Then I read my hotel access card. From there I can open my hotel room using my flipper zero

  • @rad_linux

    @rad_linux

    7 ай бұрын

    Indeed, a lot of development has gone into mifare classic. It can still be a time consuming task and it also depends on the security put into place by the hotel

  • @wiktorgajecki8551
    @wiktorgajecki8551 Жыл бұрын

    Nice video Man keep it up

  • @rad_linux

    @rad_linux

    Жыл бұрын

    Thanks so much!

  • @lmoney751
    @lmoney751 Жыл бұрын

    Are you using the vanilla firmware or Unleashed in this video

  • @rad_linux

    @rad_linux

    Жыл бұрын

    I stick with vanilla for the time being. I will likely move towards building my own custom versions as times goes on. A lot of the fun and more advanced stuff requires altering and then compiling your own firmware

  • @adobo1976
    @adobo19766 ай бұрын

    My hotel room was mifare classic and i was able to emulate it.

  • @Phizy99
    @Phizy99 Жыл бұрын

    Hey I just watched your gut hub video and every time I download the files it doesn’t work it just shows a file name is added on the computer but nothing on the flipper you know of any solution or problem I might be doing?

  • @rad_linux

    @rad_linux

    Жыл бұрын

    hi, so when you download the file, you should download it to your computer. Its compressed so you need to extract the files to your computer. Then you can either use the file browser in qflipper or an SD card reader to transfer files to their respective place on the flipper. IR files go in the infared folder, sub-ghz go in the subghz folder. You can have sub folders to organize the files better. They are often times come organized in folders already.

  • @yoo-12
    @yoo-12 Жыл бұрын

    What firmware is the best? Rougemaster, Unleashed, Squashware, Which one should I pick?

  • @rad_linux

    @rad_linux

    Жыл бұрын

    fear not! you can change your firmware between all of those options easily so try them all out and see what you like. Unleashed and roguemaster do what they say they will do. they unlock certain features that require a lot of caution because they are very illegal and potentially dangerous. Squachware is definitely fun but isnt quite as up to date as the others. it has a ton of fun animations and a good community. i prefer the dev build of the official firmware myself. I've been playing with customizing my own firmware too! Theres a lot of options. try them all!

  • @lovell74
    @lovell74 Жыл бұрын

    NEW SUB HERE HELP MAKE MY FLIPPER BETTER THAN IT ALREADY IS. KEEP UP THE GREAT WORK

  • @rad_linux

    @rad_linux

    Жыл бұрын

    Thanks for checking out my videos!

  • @johnnyfappleseed6098
    @johnnyfappleseed6098 Жыл бұрын

    When you scan a card, it will come back with either the card issuers name, the card number and expiration date or if you don't get a clean read it will say something like "Unknown NFC Tag" and a bunch of numbers.

  • @chase520az
    @chase520az Жыл бұрын

    How do I get all the nfc options you have is there a download link

  • @rad_linux

    @rad_linux

    Жыл бұрын

    search awesome flipperzero. its a github that can point you to a ton of different resources. i got mine from uberguido's github

  • @TheVengord
    @TheVengord Жыл бұрын

    Can you share your NFC keys database? I have only 3,600 keys

  • @rad_linux

    @rad_linux

    Жыл бұрын

    I use the dictionary provided by uberguidoz over on their github. it adds a really healthy amount of keys for brute forcing against

  • @Morcego538
    @Morcego53810 ай бұрын

    Could you do a video on how to get keys from mifare classic? And how to add them to the flipper library to then clone the card and emulate?

  • @rad_linux

    @rad_linux

    10 ай бұрын

    my understanding is that keys are derived from readers. You need to do the reader detect application on the flipper to extract nonces that are then calculated using mfkeys32. They keys are then added to your dictionary so they can be used to brute force mifare classic cards. Otherwise you can find libraries in various github repositories that you can use instead of the standard dictionary. These have keys found by people around the world.

  • @husamothman1
    @husamothman19 ай бұрын

    How do i get a larger file of keys?

  • @rad_linux

    @rad_linux

    9 ай бұрын

    I believe some of the custom firmware have expanded dictionaries. Some of the different github repos like UberGuidoz have expanded dictionaries you can add as well. You just replace the file on the flipper with the one from the repository

  • @tmatheson
    @tmatheson Жыл бұрын

    The reason that flipper can not do anything is because you need to load Roguemaster firmware. Mifare and lots of schemes are implemented there. It’s also open source so you can write your own in C. Flipper was not meant to be a canned tool. It’s an apparatus and it’s abilities depend heavily on the operators.

  • @thumbtak123
    @thumbtak123 Жыл бұрын

    Are you doing drugs in the intro?

  • @rad_linux

    @rad_linux

    Жыл бұрын

    drugs are bad, mmmmkay?

  • @juliedid
    @juliedid Жыл бұрын

    I 0

  • @rad_linux

    @rad_linux

    Жыл бұрын

    I YOOOOOO

  • @mrstark9702
    @mrstark9702 Жыл бұрын

    hi, i needed one from last year . will u pleaee suggest me if some one got the original one.

  • @rad_linux

    @rad_linux

    Жыл бұрын

    hi! I'm not sure I understand your question. Would you mind rephrasing it?

  • @mrstark9702

    @mrstark9702

    Жыл бұрын

    well i was looking for a flipper zero sir. but the official website has stock from last year. can you suggest me where i can buy flipper zero?

  • @rad_linux

    @rad_linux

    Жыл бұрын

    @@mrstark9702 I recommend only buying from flipperzero.one or official affiliates. They are tough to get a hold of with the limited drops

  • @mrstark9702

    @mrstark9702

    Жыл бұрын

    Thank you bro

  • @lesserkey
    @lesserkey Жыл бұрын

    I figured out that roguemaster/xtreme firmware already have uberguidos nfc files in it.. how do i use them?

  • @rad_linux

    @rad_linux

    Жыл бұрын

    i believe a lot of the NFC files are for use with mobile devices. you would essentially bump the flipper in the same location you would tap for apple pay or google pay. I'm not positive how things like Amiibos work

Келесі