When you initially tried to read the card it said it managed to read 16/20 pages - it's safe to assume that one of the 4 unread pages was the one holding the password so you would not have been able to see it in the .nfc file before the actual password-capturing step
@@techandfun7723 Cool, curious on if you done any skipass readings and had the chance to test the xtreme firmware or if you by any chance have tested the Chamelon Ultra from Lab401?
Hi Friend, love the vid, and thanks! One question, can the Flipper Zero sniff a T5577 reader and obtain access codes? (without having an original real access fob)
i guess you need fuzzing the reader, and depending of his back software it is possible or not. these T5577 means that you have wreatable tags for EM H410x systems, 125 kHz LF-RFID
Great video! I was at a hotel with Mifare Ultralight (11?) and couldn’t get it to detect reader. Are there readers that aren’t susceptible to this vulnerability or did I do something wrong? I came to the conclusion from research that MFKey32 attack only works with Mifare Classic cards but your attempt shows that it can crack the ultralight. Or did your method use something different than MFKey32?
The flipper zero is just a bunch of different tools slapped together into an easy to use and fun piece of hardware If you are super into this stuff you can try and make a lot of these things yourself (although I'm not sure on the legality of this) But this is much more difficult...
No, you only have the hidden keys for that building. You'll probably be able to read subsequent cards without having to read from the card reader again, I believe.
If that’s the case, does it mean if someone does exactly the same educational thing you did in the clip, he / she can somewhat break into the same room some time later, yeah?
@@The_Positive_Hour im trying to figure this out as well. Shenaniganz basketball top score is owned by me on one and i want the other one but dont want to spend 40 bucks to do it again lol
I have a question maybe you could help me out with. A friend of mines is a manager at ampm gas station. He allowed me to try to hack their air and water machine which is turned on with radio frequency.. I pushed the button, hit frequency analyzer and it read at 918.00mhz.. so I bumped the frequency up to 925mhz then hit read but the flipper couldn’t pick it up.. You think maybe the distance was a factor??
Im trying to Duplicate an Elevator access card (Mifare ULTRALIGHT 11 , ISO 14443-3 , NFC-A It reads the card which is password protected and asks me to approach the reader to get the password , so i scan the reader and it gets the password Successfully and asks me to read the card again to save that info on the flipper zero. But in the option i dont have 'write to Initial card' which is for duplicating that card so i only can use the Flipper zero itself to emulate that NFC Frequency into the Elevator's reader each time im going up... What if i want to write and duplicate on different cards ? The only options i have on my flipper are these : Emulate Info Restore to original Rename Delete Any suggestions???
When you initially tried to read the card it said it managed to read 16/20 pages - it's safe to assume that one of the 4 unread pages was the one holding the password so you would not have been able to see it in the .nfc file before the actual password-capturing step
I had 16/32 and it worked fine.
Do u guys even check if it works when "it doesnt find all pages" ?
Godt å se nordmenn lage videoer om slike ting :)
I love this tutorials straigth 2 da point
shouldn't it be possible to use a smartphone nfc chip, if the right app is installed?
Did you press continue after reading the reader? What did you do?
What if you don't have the key? Can I use the detect reader function to do it?
Man I really miss your videos fr ❤
Thank you. I've been too busy, but more videos are coming soon
@@techandfun7723 Cool, curious on if you done any skipass readings and had the chance to test the xtreme firmware or if you by any chance have tested the Chamelon Ultra from Lab401?
Hi Friend, love the vid, and thanks!
One question, can the Flipper Zero sniff a T5577 reader and obtain access codes? (without having an original real access fob)
i guess you need fuzzing the reader, and depending of his back software it is possible or not. these T5577 means that you have wreatable tags for EM H410x systems, 125 kHz LF-RFID
What firmware is this? Mine doesn't have "Unlock with reader" option anywhere.
Do you already know what firmware is?
I know-its not Unleashed for sure?
Extream firmware
@@blendi004 cannot find this option neither😂
Great video! I was at a hotel with Mifare Ultralight (11?) and couldn’t get it to detect reader. Are there readers that aren’t susceptible to this vulnerability or did I do something wrong? I came to the conclusion from research that MFKey32 attack only works with Mifare Classic cards but your attempt shows that it can crack the ultralight. Or did your method use something different than MFKey32?
I am having the same issue!
What firmware are you running?
Some readers have anti-copy tech. Don’t know how to differentiate but, you may be able to emulate with flipper, but actual key is no longer usable
After getting the password from the reader what option did you clicked in "continue" for the flipper to ask you to "apply the target card"?
Im confused about this part too
@@axxelgannon9146I will try this wen I have a chance and I will find out. I will get back to you to help out.
helpful video, thanks!
I’ve read about 5 rfid cards and never seen a password protection issue on them.. Is that because of a weaker security?
This is nfc not rfid
Not avalaible in many country,lucky you!
That sucks :/ i just got mine in the mail today ;p
@@GM_O happy for you ;)
Which countries?
The flipper zero is just a bunch of different tools slapped together into an easy to use and fun piece of hardware
If you are super into this stuff you can try and make a lot of these things yourself (although I'm not sure on the legality of this)
But this is much more difficult...
Is the song on your outro Josh Martinez?
Picopass is NFC or RFID?
Does it mean you have access to this room even after they deactivate your card when you check out?
No, you only have the hidden keys for that building.
You'll probably be able to read subsequent cards without having to read from the card reader again, I believe.
What are you using to read a NFC file?
Does this work for RFID
I mean this is still using the key card though right? How can you crack a NFC reader without having the actual key
Crowbar I guess
If that’s the case, does it mean if someone does exactly the same educational thing you did in the clip, he / she can somewhat break into the same room some time later, yeah?
That depends on if the hotel uses the same key card and same nfc data for the card instead of changing it after each guest
As long as the hotel doesn't change the required nfc data for the scanner after each guest (which some do) then yes you could educationally trespass
does this work with the default firmware (adding passwords with reader) ?
Guys how can i add keys to my flipper ?
Please say how to do that with a NFC phone and a script
Nice
Andreas Spiess here on youtube did a good video on this without a flipper
Can the flipper zero clone or copy a game card?
Yea
@@hayleyoram2647 could you show how to do that? I’ve tried but it never finishes the last part of the DL.
@@The_Positive_Hour im trying to figure this out as well. Shenaniganz basketball top score is owned by me on one and i want the other one but dont want to spend 40 bucks to do it again lol
Just ordered mine last night mahahaha
It copies does all,but when i try try to emulate,does nothing,anyone knows why?
I have a question maybe you could help me out with. A friend of mines is a manager at ampm gas station. He allowed me to try to hack their air and water machine which is turned on with radio frequency.. I pushed the button, hit frequency analyzer and it read at 918.00mhz.. so I bumped the frequency up to 925mhz then hit read but the flipper couldn’t pick it up.. You think maybe the distance was a factor??
Wrong frequency bro
What do you mean “bump up” the frequency, why?!
Im trying to Duplicate an Elevator access card (Mifare ULTRALIGHT 11 , ISO 14443-3 , NFC-A
It reads the card which is password protected and asks me to approach the reader to get the password , so i scan the reader and it gets the password Successfully and asks me to read the card again to save that info on the flipper zero. But in the option i dont have 'write to Initial card' which is for duplicating that card so i only can use the Flipper zero itself to emulate that NFC Frequency into the Elevator's reader each time im going up... What if i want to write and duplicate on different cards ? The only options i have on my flipper are these :
Emulate
Info
Restore to original
Rename
Delete
Any suggestions???
you ever figure anything out?
@@johngarnica2114 not yet 🥺
Can I use flipperzero to hack biometric face recognition attendance
Dumb?
soo where can i pick one up??
Google it bro.
They were in stock last time I looked.
doesnt work with mifare ultra..only classic
Why the name of this device looks like Флиппер ?)))
iirc, it is only present on the orange cover (made to protect the device) and it translates to flipper or something not entirely sure
@@battlebman, _Might because the inventors are from Moscow (MOCBA) ?_
_or people like to play with these cyrillic letters._
Anti-copy card reader?? Ad!
I’ve got a card without password (it’s nfc) but when I go to emulate it, door remains locked
*Tapn @LITTWEBB*
On tele
me too, did u figure out why
Didn't know you own this card.
Joke
KHAZAKSTAN
Send meg en mld, kanskje vi kan lære noe sammen :)
How can i contact you ?
data_gov?
So can you top up card then from flipper your say 🤷♂️🫡