Section 0: Introduction
0.1 What Is the Flipper Zero?
0.2 Unique Features of Flipper Zero
Section 1: Unveiling Flipper Zero
1.1 Description of the device controls
1.2 Initial Setup and first use.
Section 2: Basic Functionality and Maintenance
2.1 Exploring Basic Functions
Section 3: Hands-on with Flipper Zero
3.1 Step-by-step guides for Common Use Cases seen in the wild.
3.1.1 Capturing and replaying Sub-GHz signals such as signals from Garage Door Remotes
3.1.2 Use the Flipper Zero as a BadUSB — Emulate a keyboard
3.1.3 RFID Fuzzing with Flipper Zero
3.1.4 Exploiting Insecure NFC Cards used with Access Controls with Flipper Zero
3.1.5 Turn on/off or interact with Screens or HVAC Systems to Create distractions or meet you objectives during a Red Team Engagement
3.1.6 Read, Write and Emulate DS199A, Cyfral, and Metakom protocols for iButtons. These keys are used for access control, temperature measurements, humidity measurements, storing cryptographic keys, etc.
3.2 Video Links with Common Flipper Zero Attacks
Section 4: Extending Functionality
4.1 Customizing the Firmware of Flipper Zero
4.2 External Plugins and Resources
Section 5: Resources
5.1 References and Additional Resources
5.2 Additional Hardware for Flipper Zero
Flipper Zero is a small, handheld device that combines the features of various hardware tools into one pocket-sized gadget. It’s built primarily for interacting with digital and radio protocols, physical access systems, and various wireless devices. With its open-source nature and community-driven development, Flipper Zero stands out as a tool that evolves continuously, adapting to the latest trends and needs in the cybersecurity landscape. Flipper Zero is primarily designed for penetration testers, security researchers, and IT professionals, but its intuitive design makes it accessible even for hobbyists and tech enthusiasts.
https://docs.flipper.net/basics/control
You can control your Flipper Zero using a directional pad consisting of four buttons (UP, DOWN, LEFT, and RIGHT), the OK button located in the center of the pad, and the BACK button positioned beside the pad.
The Main Menu provides access to various features, settings, and apps. To access the Main Menu, press the OK button while on the Desktop.
The Desktop is your digital pet’s home. It’s the place to see what your dolphin pet is doing and how it’s feeling. You can view different indicators at the top of the desktop, including battery level, charging status, Bluetooth connectivity, microSD card status, and others.
In the Lock Menu, you can lock your Flipper Zero with and without a PIN code, activate Dummy Mode, and mute the device. To enter the Lock Menu, press UP while on the Desktop.
In this mode, Flipper Zero disables most of its functions. You can customize the controls by assigning quick-access apps of your choice to the LEFT, RIGHT, DOWN, and OK buttons.
The Archive app lets you quickly access and manage saved tags, keys, remotes, payloads, and other apps.
The Favorite App feature allows you to set up to 4 apps for quick access directly from the Desktop. After that, you will not need to look for them in the Main Menu whenever you want to run them.
Flipper Zero does not come with a microSD card and it also cannot operate without one. So, you’ll need to purchase one seperately.
Note: Use a high-quality microSD card.
It is important to use high-quality, branded microSD cards such as SanDisk, Kingston, Samsung, or others to ensure the proper performance of your Flipper Zero. Using low-quality microSD cards may not only result in poor performance but can also brick or even damage your device.
Before getting to know more your device more in-depth and discover your exact needs so you can may choose a custom firmware later, you may need to proceed with a stock firmware update before starting to play with the tool.
For a quick start I would recommend connecting Flipper Zero with your mobile device via Bluetooth and Update it via the Flipper Mobile App
https://docs.flipper.net/mobile-app
If your Flipper Zero freezes and fails to respond to button presses, reboot the device by pressing and holding the LEFT and BACK buttons for 5 seconds.
https://docs.flipper.net/sub-ghz
The built-in module of Flipper Zero allows it to transmit and receive radio frequencies between 300 and 928 MHz. This capability enables it to read, store, and replicate remote controls. Such functionality is crucial for interacting with various devices like gates, barriers, radio-controlled locks, remote switches, wireless doorbells, and smart lighting systems. By using Flipper Zero, you can assess the robustness of your security systems, gaining insights into potential vulnerabilities.
Flipper Zero has a built-in sub-1 GHz module based on a CC1101 transceiver and a radio antenna (the maximum range is 50 meters). Both the CC1101 chip and the antenna are designed to operate at frequencies in the 300–348 MHz, 387–464 MHz, and 779–928 MHz bands.
Flipper Zero is equipped with support for low-frequency (LF) radio frequency identification (RFID) technology, commonly utilized in systems for access control, animal identification, and supply chain management. LF RFID technology, which is generally found in items like plastic cards, key fobs, tags, wristbands, and animal microchips, typically offers lower security levels compared to NFC cards. The device includes a LF RFID module, enabling it to perform functions such as reading, storing, emulating, and writing to LF RFID cards.
Flipper Zero has a built-in RFID support with a low-frequency antenna located at the back of Flipper Zero. The STM32WB55 microcontroller unit is used for the 125 kHz RFID functionality.
The low-frequency 125 kHz antenna is placed on the Dual Band RFID antenna next to the high-frequency 13.56 MHz antenna.
Flipper Zero is equipped with Near Field Communication (NFC) technology, widely used in various applications such as smart cards for public transportation, access control cards or tags, and digital business cards. These cards often involve intricate protocols and provide features like encryption, authentication, and comprehensive two-way data exchange. The device incorporates a built-in NFC module operating at 13.56 MHz, which allows it to read, store, and replicate NFC cards.
Flipper Zero has a built-in NFC module based on a ST25R3916 NFC chip and a 13.56 MHz high-frequency antenna. The chip is used for high-frequency protocols and is responsible for reading and emulation of cards.
https://docs.flipper.net/infrared
Flipper Zero is capable of interfacing with devices that communicate via infrared (IR) light, such as televisions, air conditioners, and multimedia systems. Thanks to its integrated infrared module, the device can capture and store signals from infrared remotes, enabling it to function as a universal remote to control various devices.
Flipper Zero has a built-in Infrared module consisting of an IR light transparent plastic window, three transmitting infrared LEDs, and a TSOP-75338TR infrared receiver.
https://docs.flipper.net/gpio-and-modules
Flipper Zero serves as a versatile tool for hardware exploration, firmware flashing, debugging, and fuzzing. It can be linked to other hardware through its integrated GPIO pins, allowing you to manage hardware using its buttons, execute your custom code, and display debug messages on its screen. Additionally, Flipper Zero can function as a converter for USB to UART/SPI/I2C interfaces.
Flipper Zero has 18 pins on the top side, consisting of power supply pins and I/O pins. Power supply pins can be used to power your external modules. Input/output (I/O) pins are +3.3 V tolerant for input and output. For more information, see 3.3 V and 5 V tolerance.
I/O pins connect external modules to the I/O pins of the STM32WB55 microcontroller through 51 Ohm resistors. All pins are electrostatic discharge (ESD) protected. For information on the basic functionality of Flipper Zero pins, see the picture below.
Note: If your Flipper Zero is in a silicone case, insert the module all the way in, so there is no gap in the middle between the silicone case and the module.
https://docs.flipper.net/ibutton
Flipper Zero is compatible with the 1-Wire communication protocol, often used in compact electronic keys, commonly referred to as iButton keys. These keys have a range of applications, including access control, temperature and humidity measurements, and storage of cryptographic keys.
Equipped with an integrated iButton module, Flipper Zero is adept at reading, writing, and emulating iButton access control keys. This module is versatile, supporting key protocols such as Dallas, Cyfral, and Metakom.
Note: Not all iButton devices can be detected by Flipper Zero
Various iButton devices may have the same form factor, however, only access control keys can be detected by Flipper Zero.
Flipper Zero has a built-in iButton module consisting of an iButton pad and three spring-loaded pogo pins that are located on the iButton PCB.
Two pins are assigned to data transfer and have output to the GPIO pin 17. The remaining middle pin is ground.
The flat part of the pad allows connecting an iButton key (Slave) with Flipper Zero (Master). The left data pin and the middle ground pin are used for reading and writing iButton keys.
The protruding part of the pad allows connecting Flipper Zero (Slave) with an iButton reader (Master). The right data pin and the middle ground pin are used for emulation of iButton keys.
https://docs.flipper.net/bad-usb
Flipper Zero has the capability to function as a BadUSB device, which computers identify as a Human Interface Device (HID), similar to a keyboard. As a BadUSB, it can modify system settings, open backdoors, extract data, initiate reverse shells, or perform any task achievable through physical access. This is executed through a series of commands written in Rubber Ducky Scripting Language, commonly known as DuckyScript. These specific commands are referred to as a payload.
Before using your Flipper Zero as a BadUSB device, you need to write a payload in the .txt format in any common ASCII text editor using the scripting language. Flipper Zero can execute extended Rubber Ducky script syntax. The syntax is compatible with the classic Rubber Ducky Scripting Language 1.0 but provides additional commands and features, such as the ALT+Numpad input method, SysRq command, and more.
Both \n and \r\n line endings are supported. Empty lines are allowed, as well as spaces or tabs for line indentation. The Bad USB application can execute only scripts in the .txt format. No compilation is required.
Once the payload is created, you can upload it to your Flipper Zero via qFlipper or Flipper Mobile App to the SD Card/badusb/ folder. The new payloads will be available in the Bad USB application.
Note: When uploading, files with the same names will be overwritten without warning.
Flipper Zero can act as a USB universal 2nd-factor (U2F) authentication token or security key that can be used as the second authentication factor when signing in to web accounts. A security key is a small device that helps computers verify that it is you when signing in to an account. The use of this feature increases the security of your accounts.
Note: Do not delete, edit, or move U2F files to another Flipper Zero
Each Flipper Zero has a unique cryptographic key that generates unique encrypted U2F files. If you reinsert your microSD card with U2F files into another Flipper Zero, you’ll not be able to sign in to your web accounts with the new device.
If you delete U2F files, edit U2F files, or insert a new microSD card into your Flipper Zero, the device will generate a new set of U2F files. In this case, you’ll be required to re-register Flipper Zero as a security key in all of your web accounts.
If you delete the
u2f/assets
folder or theu2f
folder entirely, your Flipper Zero will not be able to use the U2F application, as the assets folder contains the cryptographic certificate that is used for registration and authentication. You can restore this folder by updating your Flipper Zero’s firmware.
The Apps catalog is a collection of tools and games created by the Flipper Zero community. This diverse range of apps enhances the functionality of Flipper Zero, making the user experience with the device even more gamified and enjoyable.
Access to the Apps catalog is available through the Flipper Mobile App and Flipper Lab, which are compatible with Google Chrome, Microsoft Edge, and other Chromium-based browsers that support the Web Serial API.
Reference: Derek Jamison’s YouTube Channel — https://www.youtube.com/@MrDerekJamison
IMPORTANT DISCLAIMER:
- These guides are for EDUCATIONAL PURPOSES ONLY.
- Never bypass an access control or unlock anything you do not own or have not given permission from the owner to access or unlock.
- Never try to fuzz or replay signals to devices that are in use or that you rely on.
- Please don’t try this guide on car keyfobs that you rely on because you risk desynchronizing your key, or damaging the receiver and ending up paying a lot of money to restore it.
There are many products selling online currently that are susceptible to replay attacks and don’t even offer basic protection mechanisms such as rolling codes. Being able to assess your own hardware before actually using it as a home appliance can dramatically improve you home security posture.
Recommended resources for this type of attack:
Reference: https://www.youtube.com/watch?v=EcWTFZovNTE
Recognize the limitations of RFID fuzzing, including time consumption, potential for not finding all vulnerabilities, expertise needed, false positives, hardware/software limitations, and the necessity of physical proximity.
Reference: https://www.youtube.com/watch?v=hZMU4kPJ_zQ
Gear:
Gather different types of NFC cards/tags: an official UniFi Access NFC card, a UV key, and a cheap NTAG 215 tag.
Process:
Objective:
The primary goal in a red team exercise might be to test the physical security measures, response protocols, and the overall resilience of an organization against intrusion or security breaches. By interacting with screens or HVAC systems, a red team can assess how staff respond to unexpected changes or distractions, and how quickly they can identify and rectify such situations.
How Flipper Zero Comes into Play:
2. Manipulating HVAC Systems:
Scenario Execution:
Reference: https://www.youtube.com/watch?v=q8CFM4_mgS0
Step 1: Reading an iButton
Step 2: Saving iButton Data
Step 3: Emulating an iButton
Step 4: Writing to an iButton
Step 5: Adding iButton Data Manually
Step 6: Managing Saved iButton Data
Basic Flipper Zero iButton Workflow Examples
Advanced iButton Use Case Scenario — Emulate and Bruteforce Dallas iButton DS1990A
Two of the most popular and feature-rich firmware are the following:
Official Documentation, https://docs.flipper.net/
HackTricks, https://book.hacktricks.xyz/todo/radio-hacking/flipper-zero
Reddit, https://www.reddit.com/r/flipperzero/
Discord, https://discord.com/invite/y5E5m8jbgb
Official Flipper Forum, https://forum.flipper.net/