Hacking NFC with Flipper Zero

Sdílet
Vložit

Komentáře • 63

  • @NightSkater69
    @NightSkater69 Před 4 měsíci +1

    man was just thinking this guy only has 1000 subs, then figured, 'naw, prob just an old video'. and i mean big ups on 2.5k. im just amazed its not more. your videos are the only ones so far ive found that are actually informative beyond the whole,, 'this is an sd card, net let me show you how to insert it' videos... and no huge diss towards sasq, but i could do with slightly less hand holding in that area and a little more in.... well the stuff you cover. all in all, good show and keep up the good work, its deffinitly appreciated.

    • @rad_linux
      @rad_linux  Před 4 měsíci

      thank you so much for the positive feedback! This channel was intended to mirror my own journey with the Flipper. I learned more than expected from a little device I backed on kickstarter. I really appreciate what sasquach has done. He was smart about building a community and bringing new users into the ethical hacking space. I must admit I like a drier delivery as well so I'm glad to offer a different space. My biggest flop was probably not starting a discord during flippers peak. Well. better luck next time >D

  • @sshroot5565
    @sshroot5565 Před rokem +10

    I think this device can do more and it is a lot powerful . But it is software restricted because they don't want to do illegal stuff with this device :) And regarding the "detect reader " functionality : you can extract NFC keys from an NFC reader by getting nonce keys and then decoding with flipper . I did extract some NFC keys using that function .

    • @rad_linux
      @rad_linux  Před rokem

      Its true that they limit the capabilities of the device through firmware, but that's primarily for legal and regulatory reasons. Where the flipper falls short is things like repetitive brute force. It just doesn't have the computational power. There are also small hardware issues that will likely be ironed out in future iterations. Mifare classic 1k is a good example where the timing issue is best solved with a hardware revision

    • @travisrawlings4957
      @travisrawlings4957 Před rokem

      If he only knew how wrong he is in this video. If you don’t know now you know lol

    • @rad_linux
      @rad_linux  Před rokem +3

      @@travisrawlings4957 I'd love to make better content. If I'm wrong, let me know!

    • @AntonioMooreworldleaderSerious
      @AntonioMooreworldleaderSerious Před 11 měsíci

      But I'm saving missing kids with it you know what it do bruh and I get no money I do it free I guess I hate you all😂😂

  • @StellarStoic
    @StellarStoic Před rokem +4

    We want more, we want more, we want more, we want more, we want more, we want more 🙂 thanks for doing this

    • @rad_linux
      @rad_linux  Před rokem

      Its been really fun working on these! Thanks so much for sticking around

  • @user-cw4vx9in7p
    @user-cw4vx9in7p Před 8 měsíci +1

    Thanks for the great content!
    one of the fantastic video for Flipper Zero Explanation with NFC... Love from Bharat Bro 🚩

  • @JamesWilliams-qv6vc
    @JamesWilliams-qv6vc Před rokem +1

    Hay man love the videos. I just want to say that the reason I subscribe was how basic the setup is and how honest your are. What I mean about “how basic your setup is” what I mean is there not a big grand intro like Pen ace I’m not trying to hate on him but I like how you are doing videos just showing us a lot of cool stuff about the flipper zero.
    Thanks man.

    • @rad_linux
      @rad_linux  Před rokem +1

      Thanks so much! I like a bit of a straight forward "low effort" direction. It works well with my low budget and minimal equipment :) I'm just trying to be a human like the rest!

  • @wearegeek
    @wearegeek Před 8 měsíci +1

    Thanks for the great content!
    MiFare Classic emulation is possible. You need to read the chip, get as many keys as possible, save it and then do a nested attack. With the nonces gathered from that you can bruteforce to discover more keys. If you don't find all keys, repeat the process until you have all keys. I'm not sure it's possible with all MiFare Classic chips, but I've been able to read and emulate a Dutch OV-Chipcard (Dutch public transport card).

    • @rad_linux
      @rad_linux  Před 7 měsíci

      In earlier development of the flipper they had discussed hardware issues that led them to believe mifare classic was not possible. I think they've found a way around that since releasing this video so you are right. Some mifare classic emulation is possible,

  • @Danjovisagat
    @Danjovisagat Před rokem +1

    Just subbed, 5 more to go to 1000
    keep sharing more flipper updates! :D

    • @rad_linux
      @rad_linux  Před rokem

      Thanks so much!!! I'm so close yet so far XD. There will be plenty more to come here. Keep an eye out!

  • @xeon_one
    @xeon_one Před rokem +4

    How about doing reviews on accessories and also different types of antenna that can helps with the range. Keep up the good work.

    • @rad_linux
      @rad_linux  Před rokem +1

      I would love to do some more of that in the future. Right now this channel is put together on a shoe string (about zero dollars) budget. Hopefully in the future I can afford to throw some money into that!

    • @PLAYINSKILSSRT
      @PLAYINSKILSSRT Před rokem

      Or making bad nfcs like bad usb some real fun not like wow look at me stock basic flipper lol

    • @rad_linux
      @rad_linux  Před rokem +1

      @@PLAYINSKILSSRT my channel has generally focused on a stock experience to promote an understanding for new users so they can develop skill sets on their own. NFC files are easy to make with the tool I provided in the comments. More advanced techniques like creating webhooks to access with an nfc file are beyond that scope but I might visit that in the future.

  • @TheWesNile
    @TheWesNile Před rokem +1

    your videos are very easy to follow and understand thanks!

  • @adobo1976
    @adobo1976 Před 8 měsíci +1

    My hotel room was mifare classic and i was able to emulate it.

  • @johnnyfappleseed6098
    @johnnyfappleseed6098 Před rokem +2

    When you scan a card, it will come back with either the card issuers name, the card number and expiration date or if you don't get a clean read it will say something like "Unknown NFC Tag" and a bunch of numbers.

  • @HollyTroll
    @HollyTroll Před rokem +1

    this was very useful, thanks for the vid.. keep it up

    • @rad_linux
      @rad_linux  Před rokem

      I'm glad it was useful! Thanks for hanging out

  • @kaidenauzenne7558
    @kaidenauzenne7558 Před rokem +1

    Just stumbled upon your video! Love the information! Can you make video explaining the detect reader function a bit more in depth? I’ve been able to collect all the nonces from the reader, then use Mfkey32, and it sends the info to my phone. So what after that?

    • @rad_linux
      @rad_linux  Před rokem

      thanks so much! I've been wanting to make a video about that but sadly I havn't been able to get permission from people who own a card reader. Its relatively simple though. If you collect the nonces you can connect to your phone and go to the hub section in the flipper app. Under NFC Tools you will see mfkey32. From there you can import the nonces you collected and it will calculate keys. If those keys don't already exist then they can be added into your dictionary. This is helpful because then you will have more keys available to help brute force different NFC cards. Its not all that great though because the flipper isn't really powerful enough to produce quick brute force results. I've seen it take up to an hour or more when dictionaries are large enough.

  • @TheVengord
    @TheVengord Před rokem +2

    Can you share your NFC keys database? I have only 3,600 keys

    • @rad_linux
      @rad_linux  Před rokem +2

      I use the dictionary provided by uberguidoz over on their github. it adds a really healthy amount of keys for brute forcing against

  • @Phizy99
    @Phizy99 Před rokem +1

    Hey I just watched your gut hub video and every time I download the files it doesn’t work it just shows a file name is added on the computer but nothing on the flipper you know of any solution or problem I might be doing?

    • @rad_linux
      @rad_linux  Před rokem

      hi, so when you download the file, you should download it to your computer. Its compressed so you need to extract the files to your computer. Then you can either use the file browser in qflipper or an SD card reader to transfer files to their respective place on the flipper. IR files go in the infared folder, sub-ghz go in the subghz folder. You can have sub folders to organize the files better. They are often times come organized in folders already.

  • @lovell74
    @lovell74 Před rokem

    NEW SUB HERE
    HELP MAKE MY FLIPPER BETTER THAN IT ALREADY IS. KEEP UP THE GREAT WORK

    • @rad_linux
      @rad_linux  Před rokem +1

      Thanks for checking out my videos!

  • @lmoney751
    @lmoney751 Před rokem +1

    Are you using the vanilla firmware or Unleashed in this video

    • @rad_linux
      @rad_linux  Před rokem

      I stick with vanilla for the time being. I will likely move towards building my own custom versions as times goes on. A lot of the fun and more advanced stuff requires altering and then compiling your own firmware

  • @Putrakampungan
    @Putrakampungan Před 10 měsíci

    I managed to tap my flipper to card reader in hotel room for about 16 times and then I calculated on my phone. Then I read my hotel access card. From there I can open my hotel room using my flipper zero

    • @rad_linux
      @rad_linux  Před 10 měsíci

      Indeed, a lot of development has gone into mifare classic. It can still be a time consuming task and it also depends on the security put into place by the hotel

  • @yoo-12
    @yoo-12 Před rokem +1

    What firmware is the best? Rougemaster, Unleashed, Squashware, Which one should I pick?

    • @rad_linux
      @rad_linux  Před rokem

      fear not! you can change your firmware between all of those options easily so try them all out and see what you like. Unleashed and roguemaster do what they say they will do. they unlock certain features that require a lot of caution because they are very illegal and potentially dangerous. Squachware is definitely fun but isnt quite as up to date as the others. it has a ton of fun animations and a good community. i prefer the dev build of the official firmware myself. I've been playing with customizing my own firmware too! Theres a lot of options. try them all!

  • @wiktorgajecki8551
    @wiktorgajecki8551 Před rokem +1

    Nice video Man keep it up

  • @chase520az
    @chase520az Před rokem +1

    How do I get all the nfc options you have is there a download link

    • @rad_linux
      @rad_linux  Před rokem +1

      search awesome flipperzero. its a github that can point you to a ton of different resources. i got mine from uberguido's github

  • @husamothman1
    @husamothman1 Před rokem

    How do i get a larger file of keys?

    • @rad_linux
      @rad_linux  Před rokem +1

      I believe some of the custom firmware have expanded dictionaries. Some of the different github repos like UberGuidoz have expanded dictionaries you can add as well. You just replace the file on the flipper with the one from the repository

  • @Morcego538
    @Morcego538 Před rokem

    Could you do a video on how to get keys from mifare classic? And how to add them to the flipper library to then clone the card and emulate?

    • @rad_linux
      @rad_linux  Před rokem

      my understanding is that keys are derived from readers. You need to do the reader detect application on the flipper to extract nonces that are then calculated using mfkeys32. They keys are then added to your dictionary so they can be used to brute force mifare classic cards. Otherwise you can find libraries in various github repositories that you can use instead of the standard dictionary. These have keys found by people around the world.

  • @fsecofficial
    @fsecofficial Před rokem

    The reason that flipper can not do anything is because you need to load Roguemaster firmware. Mifare and lots of schemes are implemented there. It’s also open source so you can write your own in C.
    Flipper was not meant to be a canned tool. It’s an apparatus and it’s abilities depend heavily on the operators.

  • @thumbtak123
    @thumbtak123 Před rokem +1

    Are you doing drugs in the intro?

  • @juliedid
    @juliedid Před rokem

    I 0

  • @mrstark9702
    @mrstark9702 Před rokem

    hi, i needed one from last year . will u pleaee suggest me if some one got the original one.

    • @rad_linux
      @rad_linux  Před rokem

      hi! I'm not sure I understand your question. Would you mind rephrasing it?

    • @mrstark9702
      @mrstark9702 Před rokem

      well i was looking for a flipper zero sir. but the official website has stock from last year. can you suggest me where i can buy flipper zero?

    • @rad_linux
      @rad_linux  Před rokem

      @@mrstark9702 I recommend only buying from flipperzero.one or official affiliates. They are tough to get a hold of with the limited drops

    • @mrstark9702
      @mrstark9702 Před rokem

      Thank you bro

  • @lesserkey
    @lesserkey Před rokem +2

    I figured out that roguemaster/xtreme firmware already have uberguidos nfc files in it.. how do i use them?

    • @rad_linux
      @rad_linux  Před rokem

      i believe a lot of the NFC files are for use with mobile devices. you would essentially bump the flipper in the same location you would tap for apple pay or google pay. I'm not positive how things like Amiibos work