Table of Contents | |||||||
---|---|---|---|---|---|---|---|
Meta | General | Sub-GHz | NFC & RFID | Infrared | BadUSB | iButton | WiFi board |
Preamble 🔝
- This is a community FAQ. Please consider also reading the Official docs.
- It is written with information from the latest dev firmware, you may have to wait for a firmware (pre)release before some of the questions/answers become relevant.
- This FAQ is still being worked on, and contributions are welcome.
- If your question isn't answered here, SEARCH the Discord and check pinned messages before asking there.
Meta 🔝
It's an Awesome List that I (djsime1) created shortly after receiving Lurat, my lovely dolphin sidekick.
An Awesome List is a collection of links and resources related to some project or topic. Think of it like a central curated hub to discover interesting stuff.
Perferably, open a Pull Request with your changes, or use one of the methods in the next question to contact me.
Open a new discussion on this repo, or contact me via one of the methods listed on this page.
If there's multiple small pull requests open at the same time, I'll often merge them together as a single update. Due to the way GitHub works, I'm unable to mark them as merged when I do this. To compensate, I include the contributors as co-authors on the commit, and mention the Pull Request ID's as part of the update message.
. You can find my PATREON to donate
General 🔝
- It should be a reputable brand (Like SanDisk, Sony, etc.) because often cheaper cards don't fully support the communication protocol Flipper uses.
- The card should have a capacity between 4 and 64 GB, but an 8 GB card is MORE than enough.
- After inserting the card, use the Flipper's setting menu to format (clear) and test the card.
- Before ejecting the card, unmount it via the Settings menu to ensure data isn't corrupted.
- Note: You might need a paperclip or similar object to push the SD Card in and out of the device.
- Read the official documentation for more information!
Make sure there's a working MicroSD Card in the device first by following the steps above. Once you download the dump, you can use qFlipper or the Flipper mobile app to transfer them. If you're transfering a large file or many at once, you can also eject the SD Card from Flipper and insert it in your computer for faster transfers.
- In qFlipper: Plug your device in, go to the file browser tab, navigate into the SD Card, and drop files in their corresponding folders (The folder names are similar to the file extensions).
- For mobile apps: Make sure you're connected via Bluetooth, save the file to the app's archive, and synchronize it back to the device.
- For plugging the SD Card into your PC, drop files in their corresponding folders (The folder names are similar to the file extensions).
Assuming the application has been packaged as a
.fap
file, installing it is as easy as placing it inside theapps
directory on your Flipper's SD card. You can launch the app from theApplications
app. If the app hasn't been compiled into a.fap
, either kindly ask the author or compile it yourself.
Make sure there's a working MicroSD Card in your Flipper and head over to RM Custom Firmware. Make sure qFlipper is closed. Use the Web Installer link and you will be all set. Alternatively, look for releases and find the
.dfu
file or update package (typically a.tar
,.tar.gz
, or.zip
file, it always contains a file namedupdate.fuf
).
- If you only have a
.dfu
, it must be installed using the "Install from file" option in qFlipper. Select the file and begin the installation.- If you have an update package, you can either install it with qFlipper, or install it manually through the Micro SD card by following the steps below.
- To manually install an update package, extract and transfer the folder (not the original archive file) to the
update
folder on the SD Card (create the folder if it doesn't already exist). Once transferred, go to the desktop/idle screen of the Flipper, press down to access the file browser, then left to view all folders. From there, open theupdate
folder (typically at the bottom of the list) and find the folder you just transferred. Lastly, select the file namedupdate
and choose "Run in app" to install the firmware.If there was no pre-compiled update file/package, you'll have to build the firmware yourself. See the next question for details. For more information, read the official documentation.
Question and Answer session are held every week on Saturday, at 01:00 and 13:00 (GMT)
Time zone | Side A | Side B |
---|---|---|
GMT/UTC | 01:00 | 13:00 |
Pacific (PDT) | 6:00 PM | 6:00 AM |
Mountain (MDT) | 7:00 PM | 7:00 AM |
Central (CDT) | 8:00 PM | 8:00 AM |
Eastern (EDT) | 9:00 PM | 9:00 AM |
China Standard | 09:00 | 21:00 |
India Standard | 06:30 | 18:30 |
Archival is a community effort, so only some are available. https://github.com/flipperdevices/flipper-questions-and-answers
(The following is a summary of the official FBT docs.)
Since the introduction of Flipper Build Tool (FBT), this has become very easy! You should have a basic understanding of working on a command line before proceeding. The only prerequisite install is Git. You should also have an IDE installed, VSCode is recommended since the firmware repo has config files for it.Expand me for the rest of the steps.
(WIP, sorry to curb your enthusiasm.)
Probably not. While the firmware and schematics are mostly public, actually sourcing the components is extremely difficult. Multiple core pieces, such as the screen, were specifically produced to be used in Flipper manufacturing.
This is no longer possible*, they were Kickstarter-backer exclusives. (*No longer possible unless you're willing to shill out hundreds of dollars for one on eBay.)
These are all hardware mods, generally inaccessible to the average user. Look up/ask around on how to do them if you're really interested, r/flipperzero is a good place to start.
Technically speaking, there's going to be a very minor hardware revision in the near future. Functionally speaking, it will be identical to every other Flipper Zero already sold. The revision only replaces a few internal components and doesn't offer any new features compared to existing devices, so don't bother waiting to buy it. Besides that, there are concepts for a Flipper One, but without a timeline for release.
Currently, it only allows the Snake game to be opened when active. In the future, it will hide every app except games, in case your device is ever inspected or seized.
- To reboot the device: hold the BACK and LEFT buttons, then release simultaneously. If that didn't work, disconnect the USB cable and hold BACK for 30 seconds. This will preform a normal reboot.
- To enter DFU/Recovery mode: Hold BACK and LEFT, then release BACK while still holding LEFT after a few seconds. When the screen lights up, you can release LEFT.
- To exit DFU/Recovery mode: Follow steps for a normal reboot under the first bullet point.
If nothing works or the device is completely bricked, first make sure it's charged by plugging it in for 15-30 minutes. As a final resort, if you can't get it to turn on after charging, unplug the USB cable and hold OK plus BACK for 30 seconds. There will be no indication, but the device is now in recovery mode. Plug it in to a PC and use qFlipper to recover the firmware. Read the official docs for Control, Reboot, and Firmware recovery.
To access the Serial CLI, click one of the following based on your platform.Desktop web browser*
*Chromium browsers only, such as: Google Chrome, Microsoft Edge, Opera/Opera GX, Brave, and Vivaldi.
- Connect your Flipper via USB.
- Ensure qFlipper and any other serial terminals are closed.
- Open my.flipp.dev in one of the aforementioned browsers.
- Click CONNECT and select "USB Serial Device" from the list.
- Wait until you can see your device details on screen.
- Select the 💻 CLI item from the left sidebar.
- Done!
Windows
- Install PuTTY if it isn't already.
- Connect your Flipper via USB.
- Open qFlipper and look for the COM port next to the Flipper's name. (Should say COM followed by a number, like COM1)
- Take note of the COM port number.
- CLOSE qFlipper, otherwise the next steps won't work.
- Open PuTTY and ensure you're on the Session screen.
- Select "Serial" under connection type.
- Set serial line to the COM port. (Just COM followed by the number, like COM1)
- Set speed to
115200
- Optional: Save the session settings for easy connection later.
- Finally, click Open to enter the CLI.
- Done!
- If you get an "Access Denied" error, make sure qFlipper isn't running!
MacOS/Linux
Note: I'm a filthy Windows user without any way to verify this procedure. Let me know if it's wrong!
- Install GNU Screen if it isn't already.
- Connect your Flipper via USB.
- Open qFlipper and look for the device path next to the Flipper's name. (Starts with /dev/tty)
- Alternatively: Run
ls /dev/tty.*
in a terminal.- Take note of the full device path.
- CLOSE qFlipper, otherwise the next steps won't work.
- Open a terminal.
- Run
screen PATH 115200
, replacing PATH with the device path from earlier.- Done!
Android
- Install Serial USB Terminal if it isn't already.
- Open the app and go to the Connections screen in the hamburger menu (3 bars icon)
- Connect your Flipper via USB.
- Click the refresh icon if it doesn't automatically show up.
- Allow Serial USB Terminal to access Flipper if prompted.
- If it doesn't automatically connect, click the connect icon in the upper right. (2 plugs icon)
- Done!
- Note: To exit log mode, you'll have to disconnect and reconnect using the icon.
On the Flipper, open the settings, go to System, and set Log Level to Debug. (You can keep Debug set to off unless someone asks you to turn it on) Once you have the CLI open, typeiPhone
Unfortunately, iOS is incapable of accessing a serial terminal over USB; try one of the other methods.log
and press enter to start watching logs. PressCtrl-C
orCmd-C
to exit log mode.
From the idle screen, press right to open your Flipper's passport. Check for the Iceman logo on the left, like in this screenshot:
Sub-GHz 🔝
Short answer: You don't. That's illegal, and NOT what Flipper was designed for.
Due to legal regulations, Flipper is not allowed to transmit on certain frequencies depending on your device's provisioned location. Provisioning occurs whenever you update your firmware via qFlipper or the mobile app and is based on your rough location.
If it's a commonly used frequency, bring the device really close to the Flipper and use the Frequency analyzer. If that didn't work, check for the device's FCC ID. It's legally required to be somewhere on the device if it's sold in the US. Then, look up that ID on FCC ID.io.
You'll need to edit the
setting_user
andsetting_frequency_analyzer_user
to change the frequencies available for selection in the app. The files are located insubghz/assets
on the SD card. Note that this won't magically unlock those frequencies, you're still bound by the device's limitations.
Unless the item of interest is extremely old, it probably uses rolling codes. Read more below.
Think of it like this: Imagine your garage door was programmed to open whenever it received the code "1234" from a transponder. This would be a static code, where a replay attack (Read RAW) would be able to open the garage. Since replay attacks are so easy, most devices will shuffle the code after each use. So the first time you open your garage, the transponder sends "1234" and the second time it sends "5678." Rolling codes aren't that simple, but you get the gist.
You'll have to re-sync your old device manually, since it's now lagging behind on the rolling code.
A brute force code tries every possible code for a specific bit length, however this is inefficient. Example: 0001, 0002, 0003, 0004 ... 9998, 9999. Debruin sequences are more efficient by merging multiple codes together. Example: 365, 136, and 650 can all be found in 13650 by looking at groups of 3 digits individually.
Yes and no. You can't just attach any antenna directly via the GPIO pins, however you could use a separate processor on a protoboard and control it from Flipper, assuming you write your own code to do that. For example, you could write your own code on a NRF24 and accompanying Flipper app to control it over GPIO.
NFC & RFID 🔝
Card name/type | Read | Write | Save | Emulate | Notes |
---|---|---|---|---|---|
Mifare Classic | ✅ | ✅ | ✅ | ✅ | Emulation can be a hit or miss |
Mifare DESFire | ✅ | Can read public files | |||
Mifare Ultralight | ✅ | ✅ | ✅ | Unlock tags with various methods | |
NTAG-21X | ✅ | ✅ | ✅ | Very similar to Mifare Ultralight | |
EMV Cards | ❌ | ❌ | Read of public data was removed because it was misunderstood. Will come back as community app | ||
NFC-B | ❌ | No hardware support for emulation | |||
iClass/PicoPass | ✅ | ✅ | ✅ | ||
EM4100/EM4102 | ✅ | ❌ | ✅ | ✅ | |
H10301 | ✅ | ❌ | ✅ | ✅ | |
Indala | ✅ | ❌ | ✅ | ✅ | Some lengths not supported |
T5577 | ✅ | ✅ | ✅ | ✅ | |
EM4305 | ✅ | ✅ | ✅ | ||
Paxton Net2 | ❌ | ❌ | ❌ | ❌ | No support for Hitag2 |
Legic Prime | ❌ | ❌ | ❌ | ❌ | Proprietary protocol |
Key: Check = Already implimented as of latest official firmware. No mark = Could be implemented in the future. Cross mark = Unlikely to ever be implemented or impossible.
To determine the protocol (NFC, RFID, or iClass/PicoPass) you'll need to attempt reading in each corresponding app. If nothing works, check the tag/card for any markings or indications. As a last resort, take a picture of the card/fob and the reader and ask in the Flipper Discord server.
Run the "Read card" action in the NFC app. Only NFC-A type tags are supported (Mifare/NTAG/Some EMV). Once successfully read, the tag's type is displayed in bold at the top of the screen.
Currently, Mifare Classic's are the only NFC card that can be written to. More will be added in the future with firmware updates.
Either the read was interrupted, or the tag is actually password protected. First, try reading the tag again but make sure it stays on the back of the device until the info screen pops up. If you're still seeing the warning, Flipper can unlock legally distinct NFC-enabled figurines that are pronounced like "Ameebo" and Xaomi air filter tags, but be warned that there's a risk of bricking your tag if you use the wrong password too many times.
Mifare classics are split up into sectors, these sectors are protected by two keys. To read a Mifare Classic, Flipper uses a dictionary attack, which takes a big list currently comprised of 1241 common keys, and checks them individually against each sector on the card. If you know the keys, they can be manually added to the User Dictionary under the "Extra Actions" menu.
The data on Mifare Classic cards is split up into sectors, and each sector is protected by two keys. If no sectors were read, then Flipper's dictionary attack has failed to find any valid keys. If you know the keys, you can manually input them under the "Extra Actions" menu of the NFC app. Otherwise, try attacking the reader with mfkey32v2 as described a few questions down.
The data on Mifare Classic cards is split up into sectors, and each sector is protected by two keys. The read wasn't successful, but it didn't fail either. Some of the card's data was read and saved, but not all. Even if not all sectors were read, you should inspect the dump with the mobile app to see if the missing data is necessary or not. In a few rare cases, semi-read cards can be emulated in place of the original without issue. If you still need the rest of the keys, read the next question.
How to I get Mifare Classic keys from a reader with mfkey32v2?
(WIP, Note to self: https://regex101.com/r/iXmE2N/2)
Flipper emulates Mifare Classics according to official specification docs (at 13.56 mhz), however certain card readers operate at slightly different frequencies (such as 13.50 mhz). Since Flipper is unable to detect the frequency (like a real card does), it also can't correct for these minor errors. As a result, data transmission doesn't always occur when the reader expects it, and thus emulation is imperfect. There are a few theoretical ways to fix this with software, but the best option would require a new hardware revision.
DESFire is a very complicated and much more secure chipset. There are no known attacks against it yet.
These are shadow files, and they're created whenever an emulated tag is written to. They store a copy of the original file with whatever was written. This way, the original file remains untouched.
You'll need to use a NFC-enabled smartphone with an app that can write tags. One of the easiest to use apps is called NFC Tools, available for both Android and iOS. Due to Mifare Classic emulation quirks, you can only edit the data of saved NTAG and Mifare Ultralight tags. Create an empty NTAG216 with the "Add Manually" action in the NFC app if you don't have one already. Save that tag, then open it from the list. Once you start emulating the tag, you can use the NFC Tools smartphone app to write information on to the emulated tag. This is saved to a .shd file with the same name as the emulated tag. If you need a quick way to generate a tag containing a URL, you can use Flipper Maker's NFC Creator tool online.
EMV Credit/Debit cards are mostly encrypted. The information Flipper reads is the unencrypted portion of the card. This alone is not enough to emulate and complete a transaction. It is impossible to read the encrypted parts.
No, as explained in the previous question.
Most NFC-enabled bank cards expose their card number unencrypted. The expiration date, CVV, and ZIP code are not revealed. The card number alone is not enough to create a transaction, thus there's no reason to add a save option.
No. Are you starting to see a pattern here?
Where is the "USB/LibNFC NFC Reader" feature mentioned in the September blog post?
This was scrapped due to timing issues, more details in this GitHub issue.
- Introduction to both Low Frequency and High Frequency: https://blog.flipperzero.one/rfid/
- Types of NFC https://www.rfwireless-world.com/Tutorials/NFC-Type1-Tag-vs-NFC-Type2-Tag-vs-NFC-Type3-Tag-NFC-Type4-Tag-Types.html
- Mifare Classic: https://learn.adafruit.com/adafruit-pn532-rfid-nfc/mifare
- The Mifare Family: https://en.wikipedia.org/wiki/MIFARE
- Datasheets: http://www.proxmark.org/files/Documents/
- Common RFID Standards and protocols: https://www.asiarfid.com/common-rfid-standards-and-protocols.html
- RFID Standards: ISO, IEC, EPCglobal: https://www.electronics-notes.com/articles/connectivity/rfid-radio-frequency-identification/standards-iec-iso-epcglobal.php
Infrared 🔝
While it isn't possible to add new items under the universal menu, there exist plenty of repositories containing many dumps of IR remotes. The most popular is Flipper-IRDB. (Note: When downloading, it's highly recommended to unmount the SD Card from your Flipper and directly plug it in to your computer.) If you only need a remote for one device, you can use Flipper Maker's IR Device tool to create and transfer it on the go.
The stock universal tv remote database mostly contains power codes, and very few of everything else. This file (Located at
infrared/assets/tv.ir
on the SD Card) be manually replaced with one containing extra codes for all buttons. To do so, download this file and use qFlipper to transfer it into the path from the previous sentence.
All three are different formats of infrared databases. They are not natively compatible with Flipper, but repositories exist that hold converted and compatible versions, such as Flipper-IRDB.
BadUSB 🔝
Until a solution is put into the firmware, your best choice is trying one of the following converters:
- http://helppox.com/badusbconvert.html
- https://flippermaker.github.io/ (BadUSB String To Alt Code)
iButton 🔝
(WIP)
WiFi board 🔝
(WIP)