man was just thinking this guy only has 1000 subs, then figured, 'naw, prob just an old video'. and i mean big ups on 2.5k. im just amazed its not more. your videos are the only ones so far ive found that are actually informative beyond the whole,, 'this is an sd card, net let me show you how to insert it' videos... and no huge diss towards sasq, but i could do with slightly less hand holding in that area and a little more in.... well the stuff you cover. all in all, good show and keep up the good work, its deffinitly appreciated.
thank you so much for the positive feedback! This channel was intended to mirror my own journey with the Flipper. I learned more than expected from a little device I backed on kickstarter. I really appreciate what sasquach has done. He was smart about building a community and bringing new users into the ethical hacking space. I must admit I like a drier delivery as well so I'm glad to offer a different space. My biggest flop was probably not starting a discord during flippers peak. Well. better luck next time >D
I think this device can do more and it is a lot powerful . But it is software restricted because they don't want to do illegal stuff with this device :) And regarding the "detect reader " functionality : you can extract NFC keys from an NFC reader by getting nonce keys and then decoding with flipper . I did extract some NFC keys using that function .
Its true that they limit the capabilities of the device through firmware, but that's primarily for legal and regulatory reasons. Where the flipper falls short is things like repetitive brute force. It just doesn't have the computational power. There are also small hardware issues that will likely be ironed out in future iterations. Mifare classic 1k is a good example where the timing issue is best solved with a hardware revision
Hay man love the videos. I just want to say that the reason I subscribe was how basic the setup is and how honest your are. What I mean about “how basic your setup is” what I mean is there not a big grand intro like Pen ace I’m not trying to hate on him but I like how you are doing videos just showing us a lot of cool stuff about the flipper zero. Thanks man.
Thanks so much! I like a bit of a straight forward "low effort" direction. It works well with my low budget and minimal equipment :) I'm just trying to be a human like the rest!
Thanks for the great content! MiFare Classic emulation is possible. You need to read the chip, get as many keys as possible, save it and then do a nested attack. With the nonces gathered from that you can bruteforce to discover more keys. If you don't find all keys, repeat the process until you have all keys. I'm not sure it's possible with all MiFare Classic chips, but I've been able to read and emulate a Dutch OV-Chipcard (Dutch public transport card).
In earlier development of the flipper they had discussed hardware issues that led them to believe mifare classic was not possible. I think they've found a way around that since releasing this video so you are right. Some mifare classic emulation is possible,
I would love to do some more of that in the future. Right now this channel is put together on a shoe string (about zero dollars) budget. Hopefully in the future I can afford to throw some money into that!
@@PLAYINSKILSSRT my channel has generally focused on a stock experience to promote an understanding for new users so they can develop skill sets on their own. NFC files are easy to make with the tool I provided in the comments. More advanced techniques like creating webhooks to access with an nfc file are beyond that scope but I might visit that in the future.
When you scan a card, it will come back with either the card issuers name, the card number and expiration date or if you don't get a clean read it will say something like "Unknown NFC Tag" and a bunch of numbers.
Just stumbled upon your video! Love the information! Can you make video explaining the detect reader function a bit more in depth? I’ve been able to collect all the nonces from the reader, then use Mfkey32, and it sends the info to my phone. So what after that?
thanks so much! I've been wanting to make a video about that but sadly I havn't been able to get permission from people who own a card reader. Its relatively simple though. If you collect the nonces you can connect to your phone and go to the hub section in the flipper app. Under NFC Tools you will see mfkey32. From there you can import the nonces you collected and it will calculate keys. If those keys don't already exist then they can be added into your dictionary. This is helpful because then you will have more keys available to help brute force different NFC cards. Its not all that great though because the flipper isn't really powerful enough to produce quick brute force results. I've seen it take up to an hour or more when dictionaries are large enough.
Hey I just watched your gut hub video and every time I download the files it doesn’t work it just shows a file name is added on the computer but nothing on the flipper you know of any solution or problem I might be doing?
hi, so when you download the file, you should download it to your computer. Its compressed so you need to extract the files to your computer. Then you can either use the file browser in qflipper or an SD card reader to transfer files to their respective place on the flipper. IR files go in the infared folder, sub-ghz go in the subghz folder. You can have sub folders to organize the files better. They are often times come organized in folders already.
I stick with vanilla for the time being. I will likely move towards building my own custom versions as times goes on. A lot of the fun and more advanced stuff requires altering and then compiling your own firmware
I managed to tap my flipper to card reader in hotel room for about 16 times and then I calculated on my phone. Then I read my hotel access card. From there I can open my hotel room using my flipper zero
Indeed, a lot of development has gone into mifare classic. It can still be a time consuming task and it also depends on the security put into place by the hotel
fear not! you can change your firmware between all of those options easily so try them all out and see what you like. Unleashed and roguemaster do what they say they will do. they unlock certain features that require a lot of caution because they are very illegal and potentially dangerous. Squachware is definitely fun but isnt quite as up to date as the others. it has a ton of fun animations and a good community. i prefer the dev build of the official firmware myself. I've been playing with customizing my own firmware too! Theres a lot of options. try them all!
I believe some of the custom firmware have expanded dictionaries. Some of the different github repos like UberGuidoz have expanded dictionaries you can add as well. You just replace the file on the flipper with the one from the repository
my understanding is that keys are derived from readers. You need to do the reader detect application on the flipper to extract nonces that are then calculated using mfkeys32. They keys are then added to your dictionary so they can be used to brute force mifare classic cards. Otherwise you can find libraries in various github repositories that you can use instead of the standard dictionary. These have keys found by people around the world.
The reason that flipper can not do anything is because you need to load Roguemaster firmware. Mifare and lots of schemes are implemented there. It’s also open source so you can write your own in C. Flipper was not meant to be a canned tool. It’s an apparatus and it’s abilities depend heavily on the operators.
i believe a lot of the NFC files are for use with mobile devices. you would essentially bump the flipper in the same location you would tap for apple pay or google pay. I'm not positive how things like Amiibos work
man was just thinking this guy only has 1000 subs, then figured, 'naw, prob just an old video'. and i mean big ups on 2.5k. im just amazed its not more. your videos are the only ones so far ive found that are actually informative beyond the whole,, 'this is an sd card, net let me show you how to insert it' videos... and no huge diss towards sasq, but i could do with slightly less hand holding in that area and a little more in.... well the stuff you cover. all in all, good show and keep up the good work, its deffinitly appreciated.
thank you so much for the positive feedback! This channel was intended to mirror my own journey with the Flipper. I learned more than expected from a little device I backed on kickstarter. I really appreciate what sasquach has done. He was smart about building a community and bringing new users into the ethical hacking space. I must admit I like a drier delivery as well so I'm glad to offer a different space. My biggest flop was probably not starting a discord during flippers peak. Well. better luck next time >D
I think this device can do more and it is a lot powerful . But it is software restricted because they don't want to do illegal stuff with this device :) And regarding the "detect reader " functionality : you can extract NFC keys from an NFC reader by getting nonce keys and then decoding with flipper . I did extract some NFC keys using that function .
Its true that they limit the capabilities of the device through firmware, but that's primarily for legal and regulatory reasons. Where the flipper falls short is things like repetitive brute force. It just doesn't have the computational power. There are also small hardware issues that will likely be ironed out in future iterations. Mifare classic 1k is a good example where the timing issue is best solved with a hardware revision
If he only knew how wrong he is in this video. If you don’t know now you know lol
@@travisrawlings4957 I'd love to make better content. If I'm wrong, let me know!
But I'm saving missing kids with it you know what it do bruh and I get no money I do it free I guess I hate you all😂😂
We want more, we want more, we want more, we want more, we want more, we want more 🙂 thanks for doing this
Its been really fun working on these! Thanks so much for sticking around
Thanks for the great content!
one of the fantastic video for Flipper Zero Explanation with NFC... Love from Bharat Bro 🚩
thanks for watching!
Hay man love the videos. I just want to say that the reason I subscribe was how basic the setup is and how honest your are. What I mean about “how basic your setup is” what I mean is there not a big grand intro like Pen ace I’m not trying to hate on him but I like how you are doing videos just showing us a lot of cool stuff about the flipper zero.
Thanks man.
Thanks so much! I like a bit of a straight forward "low effort" direction. It works well with my low budget and minimal equipment :) I'm just trying to be a human like the rest!
Thanks for the great content!
MiFare Classic emulation is possible. You need to read the chip, get as many keys as possible, save it and then do a nested attack. With the nonces gathered from that you can bruteforce to discover more keys. If you don't find all keys, repeat the process until you have all keys. I'm not sure it's possible with all MiFare Classic chips, but I've been able to read and emulate a Dutch OV-Chipcard (Dutch public transport card).
In earlier development of the flipper they had discussed hardware issues that led them to believe mifare classic was not possible. I think they've found a way around that since releasing this video so you are right. Some mifare classic emulation is possible,
Just subbed, 5 more to go to 1000
keep sharing more flipper updates! :D
Thanks so much!!! I'm so close yet so far XD. There will be plenty more to come here. Keep an eye out!
How about doing reviews on accessories and also different types of antenna that can helps with the range. Keep up the good work.
I would love to do some more of that in the future. Right now this channel is put together on a shoe string (about zero dollars) budget. Hopefully in the future I can afford to throw some money into that!
Or making bad nfcs like bad usb some real fun not like wow look at me stock basic flipper lol
@@PLAYINSKILSSRT my channel has generally focused on a stock experience to promote an understanding for new users so they can develop skill sets on their own. NFC files are easy to make with the tool I provided in the comments. More advanced techniques like creating webhooks to access with an nfc file are beyond that scope but I might visit that in the future.
your videos are very easy to follow and understand thanks!
Thanks for checking them out!
My hotel room was mifare classic and i was able to emulate it.
When you scan a card, it will come back with either the card issuers name, the card number and expiration date or if you don't get a clean read it will say something like "Unknown NFC Tag" and a bunch of numbers.
this was very useful, thanks for the vid.. keep it up
I'm glad it was useful! Thanks for hanging out
Just stumbled upon your video! Love the information! Can you make video explaining the detect reader function a bit more in depth? I’ve been able to collect all the nonces from the reader, then use Mfkey32, and it sends the info to my phone. So what after that?
thanks so much! I've been wanting to make a video about that but sadly I havn't been able to get permission from people who own a card reader. Its relatively simple though. If you collect the nonces you can connect to your phone and go to the hub section in the flipper app. Under NFC Tools you will see mfkey32. From there you can import the nonces you collected and it will calculate keys. If those keys don't already exist then they can be added into your dictionary. This is helpful because then you will have more keys available to help brute force different NFC cards. Its not all that great though because the flipper isn't really powerful enough to produce quick brute force results. I've seen it take up to an hour or more when dictionaries are large enough.
Can you share your NFC keys database? I have only 3,600 keys
I use the dictionary provided by uberguidoz over on their github. it adds a really healthy amount of keys for brute forcing against
Hey I just watched your gut hub video and every time I download the files it doesn’t work it just shows a file name is added on the computer but nothing on the flipper you know of any solution or problem I might be doing?
hi, so when you download the file, you should download it to your computer. Its compressed so you need to extract the files to your computer. Then you can either use the file browser in qflipper or an SD card reader to transfer files to their respective place on the flipper. IR files go in the infared folder, sub-ghz go in the subghz folder. You can have sub folders to organize the files better. They are often times come organized in folders already.
NEW SUB HERE
HELP MAKE MY FLIPPER BETTER THAN IT ALREADY IS. KEEP UP THE GREAT WORK
Thanks for checking out my videos!
Are you using the vanilla firmware or Unleashed in this video
I stick with vanilla for the time being. I will likely move towards building my own custom versions as times goes on. A lot of the fun and more advanced stuff requires altering and then compiling your own firmware
I managed to tap my flipper to card reader in hotel room for about 16 times and then I calculated on my phone. Then I read my hotel access card. From there I can open my hotel room using my flipper zero
Indeed, a lot of development has gone into mifare classic. It can still be a time consuming task and it also depends on the security put into place by the hotel
What firmware is the best? Rougemaster, Unleashed, Squashware, Which one should I pick?
fear not! you can change your firmware between all of those options easily so try them all out and see what you like. Unleashed and roguemaster do what they say they will do. they unlock certain features that require a lot of caution because they are very illegal and potentially dangerous. Squachware is definitely fun but isnt quite as up to date as the others. it has a ton of fun animations and a good community. i prefer the dev build of the official firmware myself. I've been playing with customizing my own firmware too! Theres a lot of options. try them all!
Nice video Man keep it up
Thanks so much!
How do I get all the nfc options you have is there a download link
search awesome flipperzero. its a github that can point you to a ton of different resources. i got mine from uberguido's github
How do i get a larger file of keys?
I believe some of the custom firmware have expanded dictionaries. Some of the different github repos like UberGuidoz have expanded dictionaries you can add as well. You just replace the file on the flipper with the one from the repository
Could you do a video on how to get keys from mifare classic? And how to add them to the flipper library to then clone the card and emulate?
my understanding is that keys are derived from readers. You need to do the reader detect application on the flipper to extract nonces that are then calculated using mfkeys32. They keys are then added to your dictionary so they can be used to brute force mifare classic cards. Otherwise you can find libraries in various github repositories that you can use instead of the standard dictionary. These have keys found by people around the world.
The reason that flipper can not do anything is because you need to load Roguemaster firmware. Mifare and lots of schemes are implemented there. It’s also open source so you can write your own in C.
Flipper was not meant to be a canned tool. It’s an apparatus and it’s abilities depend heavily on the operators.
Are you doing drugs in the intro?
drugs are bad, mmmmkay?
I 0
I YOOOOOO
hi, i needed one from last year . will u pleaee suggest me if some one got the original one.
hi! I'm not sure I understand your question. Would you mind rephrasing it?
well i was looking for a flipper zero sir. but the official website has stock from last year. can you suggest me where i can buy flipper zero?
@@mrstark9702 I recommend only buying from flipperzero.one or official affiliates. They are tough to get a hold of with the limited drops
Thank you bro
I figured out that roguemaster/xtreme firmware already have uberguidos nfc files in it.. how do i use them?
i believe a lot of the NFC files are for use with mobile devices. you would essentially bump the flipper in the same location you would tap for apple pay or google pay. I'm not positive how things like Amiibos work