ko-fi.com/rad_linux This is a light primer on NFC and the Flipper Zero. We can do so much with such a simple connection! flippermaker.github.io/
Жүктеу.....
Пікірлер: 63
@NightSkater69Ай бұрын
man was just thinking this guy only has 1000 subs, then figured, 'naw, prob just an old video'. and i mean big ups on 2.5k. im just amazed its not more. your videos are the only ones so far ive found that are actually informative beyond the whole,, 'this is an sd card, net let me show you how to insert it' videos... and no huge diss towards sasq, but i could do with slightly less hand holding in that area and a little more in.... well the stuff you cover. all in all, good show and keep up the good work, its deffinitly appreciated.
@rad_linux
Ай бұрын
thank you so much for the positive feedback! This channel was intended to mirror my own journey with the Flipper. I learned more than expected from a little device I backed on kickstarter. I really appreciate what sasquach has done. He was smart about building a community and bringing new users into the ethical hacking space. I must admit I like a drier delivery as well so I'm glad to offer a different space. My biggest flop was probably not starting a discord during flippers peak. Well. better luck next time >D
@TheWesNile Жыл бұрын
your videos are very easy to follow and understand thanks!
@rad_linux
Жыл бұрын
Thanks for checking them out!
@sshroot5565 Жыл бұрын
I think this device can do more and it is a lot powerful . But it is software restricted because they don't want to do illegal stuff with this device :) And regarding the "detect reader " functionality : you can extract NFC keys from an NFC reader by getting nonce keys and then decoding with flipper . I did extract some NFC keys using that function .
@rad_linux
Жыл бұрын
Its true that they limit the capabilities of the device through firmware, but that's primarily for legal and regulatory reasons. Where the flipper falls short is things like repetitive brute force. It just doesn't have the computational power. There are also small hardware issues that will likely be ironed out in future iterations. Mifare classic 1k is a good example where the timing issue is best solved with a hardware revision
@travisrawlings4957
Жыл бұрын
If he only knew how wrong he is in this video. If you don’t know now you know lol
@rad_linux
Жыл бұрын
@@travisrawlings4957 I'd love to make better content. If I'm wrong, let me know!
@AntonioMooreworldleaderSerious
8 ай бұрын
But I'm saving missing kids with it you know what it do bruh and I get no money I do it free I guess I hate you all😂😂
@JamesWilliams-qv6vc Жыл бұрын
Hay man love the videos. I just want to say that the reason I subscribe was how basic the setup is and how honest your are. What I mean about “how basic your setup is” what I mean is there not a big grand intro like Pen ace I’m not trying to hate on him but I like how you are doing videos just showing us a lot of cool stuff about the flipper zero. Thanks man.
@rad_linux
Жыл бұрын
Thanks so much! I like a bit of a straight forward "low effort" direction. It works well with my low budget and minimal equipment :) I'm just trying to be a human like the rest!
@Danjovisagat Жыл бұрын
Just subbed, 5 more to go to 1000 keep sharing more flipper updates! :D
@rad_linux
Жыл бұрын
Thanks so much!!! I'm so close yet so far XD. There will be plenty more to come here. Keep an eye out!
@user-cw4vx9in7p5 ай бұрын
Thanks for the great content! one of the fantastic video for Flipper Zero Explanation with NFC... Love from Bharat Bro 🚩
@rad_linux
5 ай бұрын
thanks for watching!
@wearegeek5 ай бұрын
Thanks for the great content! MiFare Classic emulation is possible. You need to read the chip, get as many keys as possible, save it and then do a nested attack. With the nonces gathered from that you can bruteforce to discover more keys. If you don't find all keys, repeat the process until you have all keys. I'm not sure it's possible with all MiFare Classic chips, but I've been able to read and emulate a Dutch OV-Chipcard (Dutch public transport card).
@rad_linux
4 ай бұрын
In earlier development of the flipper they had discussed hardware issues that led them to believe mifare classic was not possible. I think they've found a way around that since releasing this video so you are right. Some mifare classic emulation is possible,
@StellarStoic Жыл бұрын
We want more, we want more, we want more, we want more, we want more, we want more 🙂 thanks for doing this
@rad_linux
Жыл бұрын
Its been really fun working on these! Thanks so much for sticking around
@HollyTroll Жыл бұрын
this was very useful, thanks for the vid.. keep it up
@rad_linux
Жыл бұрын
I'm glad it was useful! Thanks for hanging out
@xeon_one Жыл бұрын
How about doing reviews on accessories and also different types of antenna that can helps with the range. Keep up the good work.
@rad_linux
Жыл бұрын
I would love to do some more of that in the future. Right now this channel is put together on a shoe string (about zero dollars) budget. Hopefully in the future I can afford to throw some money into that!
@PLAYINSKILSSRT
Жыл бұрын
Or making bad nfcs like bad usb some real fun not like wow look at me stock basic flipper lol
@rad_linux
Жыл бұрын
@@PLAYINSKILSSRT my channel has generally focused on a stock experience to promote an understanding for new users so they can develop skill sets on their own. NFC files are easy to make with the tool I provided in the comments. More advanced techniques like creating webhooks to access with an nfc file are beyond that scope but I might visit that in the future.
@kaidenauzenne755811 ай бұрын
Just stumbled upon your video! Love the information! Can you make video explaining the detect reader function a bit more in depth? I’ve been able to collect all the nonces from the reader, then use Mfkey32, and it sends the info to my phone. So what after that?
@rad_linux
11 ай бұрын
thanks so much! I've been wanting to make a video about that but sadly I havn't been able to get permission from people who own a card reader. Its relatively simple though. If you collect the nonces you can connect to your phone and go to the hub section in the flipper app. Under NFC Tools you will see mfkey32. From there you can import the nonces you collected and it will calculate keys. If those keys don't already exist then they can be added into your dictionary. This is helpful because then you will have more keys available to help brute force different NFC cards. Its not all that great though because the flipper isn't really powerful enough to produce quick brute force results. I've seen it take up to an hour or more when dictionaries are large enough.
@Putrakampungan7 ай бұрын
I managed to tap my flipper to card reader in hotel room for about 16 times and then I calculated on my phone. Then I read my hotel access card. From there I can open my hotel room using my flipper zero
@rad_linux
7 ай бұрын
Indeed, a lot of development has gone into mifare classic. It can still be a time consuming task and it also depends on the security put into place by the hotel
@wiktorgajecki8551 Жыл бұрын
Nice video Man keep it up
@rad_linux
Жыл бұрын
Thanks so much!
@lmoney751 Жыл бұрын
Are you using the vanilla firmware or Unleashed in this video
@rad_linux
Жыл бұрын
I stick with vanilla for the time being. I will likely move towards building my own custom versions as times goes on. A lot of the fun and more advanced stuff requires altering and then compiling your own firmware
@adobo19766 ай бұрын
My hotel room was mifare classic and i was able to emulate it.
@Phizy99 Жыл бұрын
Hey I just watched your gut hub video and every time I download the files it doesn’t work it just shows a file name is added on the computer but nothing on the flipper you know of any solution or problem I might be doing?
@rad_linux
Жыл бұрын
hi, so when you download the file, you should download it to your computer. Its compressed so you need to extract the files to your computer. Then you can either use the file browser in qflipper or an SD card reader to transfer files to their respective place on the flipper. IR files go in the infared folder, sub-ghz go in the subghz folder. You can have sub folders to organize the files better. They are often times come organized in folders already.
@yoo-12 Жыл бұрын
What firmware is the best? Rougemaster, Unleashed, Squashware, Which one should I pick?
@rad_linux
Жыл бұрын
fear not! you can change your firmware between all of those options easily so try them all out and see what you like. Unleashed and roguemaster do what they say they will do. they unlock certain features that require a lot of caution because they are very illegal and potentially dangerous. Squachware is definitely fun but isnt quite as up to date as the others. it has a ton of fun animations and a good community. i prefer the dev build of the official firmware myself. I've been playing with customizing my own firmware too! Theres a lot of options. try them all!
@lovell74 Жыл бұрын
NEW SUB HERE HELP MAKE MY FLIPPER BETTER THAN IT ALREADY IS. KEEP UP THE GREAT WORK
@rad_linux
Жыл бұрын
Thanks for checking out my videos!
@johnnyfappleseed6098 Жыл бұрын
When you scan a card, it will come back with either the card issuers name, the card number and expiration date or if you don't get a clean read it will say something like "Unknown NFC Tag" and a bunch of numbers.
@chase520az Жыл бұрын
How do I get all the nfc options you have is there a download link
@rad_linux
Жыл бұрын
search awesome flipperzero. its a github that can point you to a ton of different resources. i got mine from uberguido's github
@TheVengord Жыл бұрын
Can you share your NFC keys database? I have only 3,600 keys
@rad_linux
Жыл бұрын
I use the dictionary provided by uberguidoz over on their github. it adds a really healthy amount of keys for brute forcing against
@Morcego53810 ай бұрын
Could you do a video on how to get keys from mifare classic? And how to add them to the flipper library to then clone the card and emulate?
@rad_linux
10 ай бұрын
my understanding is that keys are derived from readers. You need to do the reader detect application on the flipper to extract nonces that are then calculated using mfkeys32. They keys are then added to your dictionary so they can be used to brute force mifare classic cards. Otherwise you can find libraries in various github repositories that you can use instead of the standard dictionary. These have keys found by people around the world.
@husamothman19 ай бұрын
How do i get a larger file of keys?
@rad_linux
9 ай бұрын
I believe some of the custom firmware have expanded dictionaries. Some of the different github repos like UberGuidoz have expanded dictionaries you can add as well. You just replace the file on the flipper with the one from the repository
@tmatheson Жыл бұрын
The reason that flipper can not do anything is because you need to load Roguemaster firmware. Mifare and lots of schemes are implemented there. It’s also open source so you can write your own in C. Flipper was not meant to be a canned tool. It’s an apparatus and it’s abilities depend heavily on the operators.
@thumbtak123 Жыл бұрын
Are you doing drugs in the intro?
@rad_linux
Жыл бұрын
drugs are bad, mmmmkay?
@juliedid Жыл бұрын
I 0
@rad_linux
Жыл бұрын
I YOOOOOO
@mrstark9702 Жыл бұрын
hi, i needed one from last year . will u pleaee suggest me if some one got the original one.
@rad_linux
Жыл бұрын
hi! I'm not sure I understand your question. Would you mind rephrasing it?
@mrstark9702
Жыл бұрын
well i was looking for a flipper zero sir. but the official website has stock from last year. can you suggest me where i can buy flipper zero?
@rad_linux
Жыл бұрын
@@mrstark9702 I recommend only buying from flipperzero.one or official affiliates. They are tough to get a hold of with the limited drops
@mrstark9702
Жыл бұрын
Thank you bro
@lesserkey Жыл бұрын
I figured out that roguemaster/xtreme firmware already have uberguidos nfc files in it.. how do i use them?
@rad_linux
Жыл бұрын
i believe a lot of the NFC files are for use with mobile devices. you would essentially bump the flipper in the same location you would tap for apple pay or google pay. I'm not positive how things like Amiibos work
Пікірлер: 63
man was just thinking this guy only has 1000 subs, then figured, 'naw, prob just an old video'. and i mean big ups on 2.5k. im just amazed its not more. your videos are the only ones so far ive found that are actually informative beyond the whole,, 'this is an sd card, net let me show you how to insert it' videos... and no huge diss towards sasq, but i could do with slightly less hand holding in that area and a little more in.... well the stuff you cover. all in all, good show and keep up the good work, its deffinitly appreciated.
@rad_linux
Ай бұрын
thank you so much for the positive feedback! This channel was intended to mirror my own journey with the Flipper. I learned more than expected from a little device I backed on kickstarter. I really appreciate what sasquach has done. He was smart about building a community and bringing new users into the ethical hacking space. I must admit I like a drier delivery as well so I'm glad to offer a different space. My biggest flop was probably not starting a discord during flippers peak. Well. better luck next time >D
your videos are very easy to follow and understand thanks!
@rad_linux
Жыл бұрын
Thanks for checking them out!
I think this device can do more and it is a lot powerful . But it is software restricted because they don't want to do illegal stuff with this device :) And regarding the "detect reader " functionality : you can extract NFC keys from an NFC reader by getting nonce keys and then decoding with flipper . I did extract some NFC keys using that function .
@rad_linux
Жыл бұрын
Its true that they limit the capabilities of the device through firmware, but that's primarily for legal and regulatory reasons. Where the flipper falls short is things like repetitive brute force. It just doesn't have the computational power. There are also small hardware issues that will likely be ironed out in future iterations. Mifare classic 1k is a good example where the timing issue is best solved with a hardware revision
@travisrawlings4957
Жыл бұрын
If he only knew how wrong he is in this video. If you don’t know now you know lol
@rad_linux
Жыл бұрын
@@travisrawlings4957 I'd love to make better content. If I'm wrong, let me know!
@AntonioMooreworldleaderSerious
8 ай бұрын
But I'm saving missing kids with it you know what it do bruh and I get no money I do it free I guess I hate you all😂😂
Hay man love the videos. I just want to say that the reason I subscribe was how basic the setup is and how honest your are. What I mean about “how basic your setup is” what I mean is there not a big grand intro like Pen ace I’m not trying to hate on him but I like how you are doing videos just showing us a lot of cool stuff about the flipper zero. Thanks man.
@rad_linux
Жыл бұрын
Thanks so much! I like a bit of a straight forward "low effort" direction. It works well with my low budget and minimal equipment :) I'm just trying to be a human like the rest!
Just subbed, 5 more to go to 1000 keep sharing more flipper updates! :D
@rad_linux
Жыл бұрын
Thanks so much!!! I'm so close yet so far XD. There will be plenty more to come here. Keep an eye out!
Thanks for the great content! one of the fantastic video for Flipper Zero Explanation with NFC... Love from Bharat Bro 🚩
@rad_linux
5 ай бұрын
thanks for watching!
Thanks for the great content! MiFare Classic emulation is possible. You need to read the chip, get as many keys as possible, save it and then do a nested attack. With the nonces gathered from that you can bruteforce to discover more keys. If you don't find all keys, repeat the process until you have all keys. I'm not sure it's possible with all MiFare Classic chips, but I've been able to read and emulate a Dutch OV-Chipcard (Dutch public transport card).
@rad_linux
4 ай бұрын
In earlier development of the flipper they had discussed hardware issues that led them to believe mifare classic was not possible. I think they've found a way around that since releasing this video so you are right. Some mifare classic emulation is possible,
We want more, we want more, we want more, we want more, we want more, we want more 🙂 thanks for doing this
@rad_linux
Жыл бұрын
Its been really fun working on these! Thanks so much for sticking around
this was very useful, thanks for the vid.. keep it up
@rad_linux
Жыл бұрын
I'm glad it was useful! Thanks for hanging out
How about doing reviews on accessories and also different types of antenna that can helps with the range. Keep up the good work.
@rad_linux
Жыл бұрын
I would love to do some more of that in the future. Right now this channel is put together on a shoe string (about zero dollars) budget. Hopefully in the future I can afford to throw some money into that!
@PLAYINSKILSSRT
Жыл бұрын
Or making bad nfcs like bad usb some real fun not like wow look at me stock basic flipper lol
@rad_linux
Жыл бұрын
@@PLAYINSKILSSRT my channel has generally focused on a stock experience to promote an understanding for new users so they can develop skill sets on their own. NFC files are easy to make with the tool I provided in the comments. More advanced techniques like creating webhooks to access with an nfc file are beyond that scope but I might visit that in the future.
Just stumbled upon your video! Love the information! Can you make video explaining the detect reader function a bit more in depth? I’ve been able to collect all the nonces from the reader, then use Mfkey32, and it sends the info to my phone. So what after that?
@rad_linux
11 ай бұрын
thanks so much! I've been wanting to make a video about that but sadly I havn't been able to get permission from people who own a card reader. Its relatively simple though. If you collect the nonces you can connect to your phone and go to the hub section in the flipper app. Under NFC Tools you will see mfkey32. From there you can import the nonces you collected and it will calculate keys. If those keys don't already exist then they can be added into your dictionary. This is helpful because then you will have more keys available to help brute force different NFC cards. Its not all that great though because the flipper isn't really powerful enough to produce quick brute force results. I've seen it take up to an hour or more when dictionaries are large enough.
I managed to tap my flipper to card reader in hotel room for about 16 times and then I calculated on my phone. Then I read my hotel access card. From there I can open my hotel room using my flipper zero
@rad_linux
7 ай бұрын
Indeed, a lot of development has gone into mifare classic. It can still be a time consuming task and it also depends on the security put into place by the hotel
Nice video Man keep it up
@rad_linux
Жыл бұрын
Thanks so much!
Are you using the vanilla firmware or Unleashed in this video
@rad_linux
Жыл бұрын
I stick with vanilla for the time being. I will likely move towards building my own custom versions as times goes on. A lot of the fun and more advanced stuff requires altering and then compiling your own firmware
My hotel room was mifare classic and i was able to emulate it.
Hey I just watched your gut hub video and every time I download the files it doesn’t work it just shows a file name is added on the computer but nothing on the flipper you know of any solution or problem I might be doing?
@rad_linux
Жыл бұрын
hi, so when you download the file, you should download it to your computer. Its compressed so you need to extract the files to your computer. Then you can either use the file browser in qflipper or an SD card reader to transfer files to their respective place on the flipper. IR files go in the infared folder, sub-ghz go in the subghz folder. You can have sub folders to organize the files better. They are often times come organized in folders already.
What firmware is the best? Rougemaster, Unleashed, Squashware, Which one should I pick?
@rad_linux
Жыл бұрын
fear not! you can change your firmware between all of those options easily so try them all out and see what you like. Unleashed and roguemaster do what they say they will do. they unlock certain features that require a lot of caution because they are very illegal and potentially dangerous. Squachware is definitely fun but isnt quite as up to date as the others. it has a ton of fun animations and a good community. i prefer the dev build of the official firmware myself. I've been playing with customizing my own firmware too! Theres a lot of options. try them all!
NEW SUB HERE HELP MAKE MY FLIPPER BETTER THAN IT ALREADY IS. KEEP UP THE GREAT WORK
@rad_linux
Жыл бұрын
Thanks for checking out my videos!
When you scan a card, it will come back with either the card issuers name, the card number and expiration date or if you don't get a clean read it will say something like "Unknown NFC Tag" and a bunch of numbers.
How do I get all the nfc options you have is there a download link
@rad_linux
Жыл бұрын
search awesome flipperzero. its a github that can point you to a ton of different resources. i got mine from uberguido's github
Can you share your NFC keys database? I have only 3,600 keys
@rad_linux
Жыл бұрын
I use the dictionary provided by uberguidoz over on their github. it adds a really healthy amount of keys for brute forcing against
Could you do a video on how to get keys from mifare classic? And how to add them to the flipper library to then clone the card and emulate?
@rad_linux
10 ай бұрын
my understanding is that keys are derived from readers. You need to do the reader detect application on the flipper to extract nonces that are then calculated using mfkeys32. They keys are then added to your dictionary so they can be used to brute force mifare classic cards. Otherwise you can find libraries in various github repositories that you can use instead of the standard dictionary. These have keys found by people around the world.
How do i get a larger file of keys?
@rad_linux
9 ай бұрын
I believe some of the custom firmware have expanded dictionaries. Some of the different github repos like UberGuidoz have expanded dictionaries you can add as well. You just replace the file on the flipper with the one from the repository
The reason that flipper can not do anything is because you need to load Roguemaster firmware. Mifare and lots of schemes are implemented there. It’s also open source so you can write your own in C. Flipper was not meant to be a canned tool. It’s an apparatus and it’s abilities depend heavily on the operators.
Are you doing drugs in the intro?
@rad_linux
Жыл бұрын
drugs are bad, mmmmkay?
I 0
@rad_linux
Жыл бұрын
I YOOOOOO
hi, i needed one from last year . will u pleaee suggest me if some one got the original one.
@rad_linux
Жыл бұрын
hi! I'm not sure I understand your question. Would you mind rephrasing it?
@mrstark9702
Жыл бұрын
well i was looking for a flipper zero sir. but the official website has stock from last year. can you suggest me where i can buy flipper zero?
@rad_linux
Жыл бұрын
@@mrstark9702 I recommend only buying from flipperzero.one or official affiliates. They are tough to get a hold of with the limited drops
@mrstark9702
Жыл бұрын
Thank you bro
I figured out that roguemaster/xtreme firmware already have uberguidos nfc files in it.. how do i use them?
@rad_linux
Жыл бұрын
i believe a lot of the NFC files are for use with mobile devices. you would essentially bump the flipper in the same location you would tap for apple pay or google pay. I'm not positive how things like Amiibos work