HardBreak
GitHubDiscordLinkedInX
  • HardBreak - Hardware Hacking Wiki
  • Introduction
    • How to start
    • Methodology
    • Case Study (Led to a CVE Update)
      • General Case Study
  • Hardware Hacking
    • Introduction
    • Basics
      • Tools
        • Hardware Tools
          • Essential Tools
          • Soldering Tools
          • Logic Analyzer
            • Saleae Logic Analyzer
          • Open-Source Tools
            • Bus Pirate v3.6
            • Bus Pirate 5
            • GoodFET
          • Multimeters & Oscilloscopes
          • JTAG and SWD Debuggers
            • Segger JLink
            • TI CC-Debugger
          • UART-to-TTL adapter
          • Chip readers and programmers
            • Xgecu T56
        • Software Tools
          • Binwalk
          • Firmwalker
          • flashrom
          • Ghidra
          • OpenOCD
          • Mitmrouter
      • Common Hardware Components
      • Firmware Extraction Methods
      • Ethics
    • Reconnaissance
      • Closed device
        • OSINT (search the web)
        • USB Ports / SD-card
      • Opened device
        • Board Analysis
    • Interface Interaction
      • UART
        • Identify UART
        • Connect to UART
        • Extract Firmware using UART
      • I2C
      • SPI
        • Extract Firmware using SPI
      • JTAG/SWD
        • JTAG
          • Identify JTAG
        • SWD
        • Extract Firmware using JTAG/SWD
      • VE.Direct
    • Bypassing Security
      • Voltage Glitching
        • Example: LPC1768
      • Electromagnetic Fault Injection
    • Analyze Firmware
  • Network Analysis
    • Introduction
    • Reconnaissance
    • Protocols
      • WIFI
        • WEP
        • Deauthentication Attacks
      • Application Layer
        • Proprietary Protocols
          • Parrot Anafi Drone Reverse Engineering
        • MQTT
        • CoAP
        • Web Sockets
  • Radio Hacking
    • Introduction
    • Reconnaissance
    • Protocols
      • NFC
      • RFID
    • Tools
      • RF Signal Analyzers
        • RTL-SDR
        • HackRF
      • Flipper Zero
        • NFC
        • Sub-GHz
  • Contribute
    • How to contribute
    • Gitbook - Basics
      • Markdown
      • Images & media
      • Interactive blocks
  • About
    • Impressum – Legal Notice
    • Privacy Policy
    • Datenschutzerklärung
    • License
Powered by GitBook
On this page
  • Theory
  • Key Features
  • Resources

Was this helpful?

Edit on GitHub
  1. Radio Hacking
  2. Tools

Flipper Zero

Theory

The Flipper Zero is a versatile, portable, open-source multi-tool designed for pentesters, security researchers, and hardware enthusiasts. It specializes in wireless communication hacking (like RFID, NFC, and sub-GHz signals) and can also interact with various hardware interfaces such as GPIO, SPI, I2C, and UART. The Flipper Zero is small, user-friendly, and includes a variety of tools for interacting with and manipulating various types of embedded devices and wireless systems.

Key Features

  • RFID and NFC

    • Reads and emulates RFID and NFC cards, making it useful for proximity-based systems.

  • Sub-GHz Transmitter

    • Transmits and receives signals in the sub-GHz range, useful for wireless key fobs and smart home devices.

  • Infrared (IR):

    • Emulates infrared signals for controlling IR-based devices.

  • GPIO, SPI, I2C, UART

    • Provides a physical interface for working with embedded hardware, ideal for debugging, flashing chips, and communication testing.

  • Modular and Open Source

    • The community actively develops firmware, making it highly customizable.

Resources

PreviousHackRFNextNFC

Last updated 4 months ago

Was this helpful?

*

Flipper Zero