GitBook: [#3705] No subject
Before Width: | Height: | Size: 8.8 KiB |
Before Width: | Height: | Size: 175 KiB After Width: | Height: | Size: 8.8 KiB |
Before Width: | Height: | Size: 59 KiB |
Before Width: | Height: | Size: 220 KiB After Width: | Height: | Size: 59 KiB |
Before Width: | Height: | Size: 19 KiB |
Before Width: | Height: | Size: 344 KiB After Width: | Height: | Size: 19 KiB |
BIN
.gitbook/assets/image (666).png
Normal file
After Width: | Height: | Size: 100 KiB |
BIN
.gitbook/assets/image (667).png
Normal file
After Width: | Height: | Size: 175 KiB |
BIN
.gitbook/assets/image (668).png
Normal file
After Width: | Height: | Size: 220 KiB |
BIN
.gitbook/assets/image (669).png
Normal file
After Width: | Height: | Size: 421 KiB |
BIN
.gitbook/assets/image (670).png
Normal file
After Width: | Height: | Size: 550 KiB |
BIN
.gitbook/assets/image (671).png
Normal file
After Width: | Height: | Size: 344 KiB |
BIN
.gitbook/assets/image (672).png
Normal file
After Width: | Height: | Size: 408 KiB |
Before Width: | Height: | Size: 7.7 KiB |
Before Width: | Height: | Size: 421 KiB After Width: | Height: | Size: 7.7 KiB |
Before Width: | Height: | Size: 7.3 KiB |
Before Width: | Height: | Size: 550 KiB After Width: | Height: | Size: 7.3 KiB |
Before Width: | Height: | Size: 6.4 KiB |
Before Width: | Height: | Size: 408 KiB After Width: | Height: | Size: 6.4 KiB |
Before Width: | Height: | Size: 13 KiB |
Before Width: | Height: | Size: 100 KiB After Width: | Height: | Size: 13 KiB |
|
@ -115,7 +115,7 @@ In current Wireshark instead of `bootp` you need to search for `DHCP`
|
|||
|
||||
_edit>preference>protocol>ssl>_
|
||||
|
||||
![](<../../../.gitbook/assets/image (98) (1).png>)
|
||||
![](<../../../.gitbook/assets/image (98).png>)
|
||||
|
||||
Press _Edit_ and add all the data of the server and the private key (_IP, Port, Protocol, Key file and password_)
|
||||
|
||||
|
|
|
@ -142,7 +142,7 @@ Root:
|
|||
|
||||
Regular user:
|
||||
|
||||
![](<../.gitbook/assets/image (88) (1).png>)
|
||||
![](<../.gitbook/assets/image (88).png>)
|
||||
|
||||
One, two and three backgrounded jobs:
|
||||
|
||||
|
@ -150,7 +150,7 @@ One, two and three backgrounded jobs:
|
|||
|
||||
One background job, one stopped and last command didn't finish correctly:
|
||||
|
||||
![](<../.gitbook/assets/image (90) (1).png>)
|
||||
![](<../.gitbook/assets/image (90).png>)
|
||||
|
||||
<details>
|
||||
|
||||
|
|
|
@ -39,7 +39,7 @@ Most RFID **security controls** have mechanisms that **restrict** the **read** o
|
|||
|
||||
### Low & High frequency tags comparison
|
||||
|
||||
<figure><img src="../.gitbook/assets/image (88).png" alt=""><figcaption></figcaption></figure>
|
||||
<figure><img src="../.gitbook/assets/image (670).png" alt=""><figcaption></figcaption></figure>
|
||||
|
||||
## Low-Frequency RFID Tags (125kHz)
|
||||
|
||||
|
@ -74,7 +74,7 @@ It's usually found in bank cards, public transport, and other secure passes.
|
|||
|
||||
**High-frequency 13.56 MHz tags are a set of standards and protocols**. They are usually referred to as [NFC](https://nfc-forum.org/what-is-nfc/about-the-technology/), but that's not always correct. The basic protocol set used on the physical and logical levels is ISO 14443. High-level protocols, as well as alternative standards (like ISO 19092), are based upon it. Many people refer to this technology as **Near Field Communication (NFC)**, a term for devices operating over the 13.56 MHz frequency.
|
||||
|
||||
<figure><img src="../.gitbook/assets/image (85).png" alt=""><figcaption></figcaption></figure>
|
||||
<figure><img src="../.gitbook/assets/image (669).png" alt=""><figcaption></figcaption></figure>
|
||||
|
||||
To put it simply, NFC's architecture works like this: the transmission protocol is chosen by the company making the cards and implemented based on the low-level ISO 14443. For example, NXP invented its own high-level transmission protocol called Mifare. But on the lower level, Mifare cards are based on ISO 14443-A standard.
|
||||
|
||||
|
|
|
@ -40,7 +40,7 @@ The **Read** option **listens on the configured frequency** on the indicated mod
|
|||
While Read is in use, it's possible to press the **left button** and **configure it**.\
|
||||
At this moment it has **4 modulations** (AM270, AM650, FM328 and FM476), and **several relevant frequencies** stored:
|
||||
|
||||
<figure><img src="../../../.gitbook/assets/image (98).png" alt=""><figcaption></figcaption></figure>
|
||||
<figure><img src="../../../.gitbook/assets/image (666).png" alt=""><figcaption></figcaption></figure>
|
||||
|
||||
You can set **any that interests you**, however, if you are **not sure which frequency** could be the one used by the remote you have, **set Hopping to ON** (Off by default), and press the button several times until Flipper captures it and give you the info you need to set the frequency.
|
||||
|
||||
|
|
|
@ -37,13 +37,13 @@ Some times, when you get a card you will find the ID (or part) of it written in
|
|||
For example in this EM-Marin card in the physical card is possible to **read the last 3 of 5 bytes in clear**.\
|
||||
The other 2 can be brute-forced if you cannot read them from the card.
|
||||
|
||||
<figure><img src="../../../.gitbook/assets/image (106).png" alt=""><figcaption></figcaption></figure>
|
||||
<figure><img src="../../../.gitbook/assets/image (667).png" alt=""><figcaption></figcaption></figure>
|
||||
|
||||
* **HID**
|
||||
|
||||
Same happens in this HID card where only 2 out of 3 bytes can be found printed in the card
|
||||
|
||||
<figure><img src="../../../.gitbook/assets/image (116).png" alt=""><figcaption></figcaption></figure>
|
||||
<figure><img src="../../../.gitbook/assets/image (668).png" alt=""><figcaption></figcaption></figure>
|
||||
|
||||
### Emulate/Write
|
||||
|
||||
|
|
|
@ -12,7 +12,7 @@
|
|||
|
||||
</details>
|
||||
|
||||
### IR Signal Receiver in Flipper Zero <a href="#ir-signal-receiver-in-flipper-zero" id="ir-signal-receiver-in-flipper-zero"></a>
|
||||
## IR Signal Receiver in Flipper Zero <a href="#ir-signal-receiver-in-flipper-zero" id="ir-signal-receiver-in-flipper-zero"></a>
|
||||
|
||||
Flipper uses a digital IR signal receiver TSOP, which **allows intercepting signals from IR remotes**. There are some **smartphones** like Xiaomi, which also have an IR port, but keep in mind that **most of them can only transmit** signals and are **unable to receive** them.
|
||||
|
||||
|
@ -20,6 +20,21 @@ The Flipper infrared **receiver is quite sensitive**. You can even **catch the s
|
|||
|
||||
As the **decoding of the infrared** signal happens on the **software** side, Flipper Zero potentially supports the **reception and transmission of any IR remote codes**. In the case of **unknown** protocols which could not be recognized - it **records and plays back** the raw signal exactly as received.
|
||||
|
||||
## Actions
|
||||
|
||||
### Universal Remotes
|
||||
|
||||
Flipper Zero can be used as a **universal remote to control any TV, air conditioner, or media center**. In this mode, Flipper **bruteforces** all **known codes** of all supported manufacturers **according to the dictionary from the SD card**. You don't need to choose a particular remote to turn of a restaurant TV.
|
||||
|
||||
It is enough to press the power button in the Universal Remote mode, and Flipper will **sequentially send "Power Off"** commands of all the TVs it knows: Sony, Samsung, Panasonic... and so on. When the TV receives its signal, it will react and turn off.
|
||||
|
||||
Such brute-force takes time. The larger the dictionary, the longer it will take to finish. It is impossible to find out which signal exactly the TV recognized since there is no feedback from the TV.
|
||||
|
||||
### Learn New Remote
|
||||
|
||||
It's possible to **capture an infrared signal** with Flipper Zero. If it **finds the signal in the database** Flipper will automatically **know which device this is** and will let you interact with it.\
|
||||
If it doesn't, Flipper can **store** the **signal** and will allow you to **replay it**.
|
||||
|
||||
## References
|
||||
|
||||
* [https://blog.flipperzero.one/infrared/](https://blog.flipperzero.one/infrared/)
|
||||
|
|
|
@ -59,7 +59,7 @@ Flipper Zero can **read NFC cards**, however, it **doesn't understand all the pr
|
|||
|
||||
#### Reading the UID VS Reading the Data Inside <a href="#reading-the-uid-vs-reading-the-data-inside" id="reading-the-uid-vs-reading-the-data-inside"></a>
|
||||
|
||||
<figure><img src="../../../.gitbook/assets/image (90).png" alt=""><figcaption></figcaption></figure>
|
||||
<figure><img src="../../../.gitbook/assets/image (672).png" alt=""><figcaption></figcaption></figure>
|
||||
|
||||
In Flipper, reading 13.56 MHz tags can be divided into two parts:
|
||||
|
||||
|
|