The Flipper Zero – Practical Uses for Penetration Testing: NFC (2024)

Welcome back to my blog series on the offensive capabilities of the Flipper Zero! Part two of this series will be focused on NFC capabilities of the device, specifically how it may be used to copy credit card data, otherwise known as skimming attacks. One of the benefits of chip technology in modern credit cards is that due to how the cryptography works with how keys are generated, it’s not possible to listen to an NFC signal and then repeat it. So, you would not be able to use the Flipper Zero to pay for items by tapping it on a payment kiosk, as the Flipper does not have the capability of generating the cryptographic keys necessary to create a valid payment signature. However, the Flipper does have one capability that can still cause credit card fraud, the information taken from a credit card can be typed in manually in order to complete online purchases. Luckily, this isn’t a complete disaster, as the Flipper’s capabilities at reading card data via NFC includes the card number and expiration date, but does not include the CVV security number printed on the back of cards. Additionally, simply skimming a card will not give the attacker access to your valid billing address. However, since the CVV is a short number, it can be easily stored during a skimming attack, and some payment processors do not require a valid billing address while others do not fully validate them as they should.

Pavel Zhovner, the founder and CEO of Flipper Devices, Inc., stated that reading credit cards “is not a real feature and implemented just for demonstration”, and eventually they removed the credit card reading functionality from the NFC section of the Flipper in update 0.81.1 of the firmware. So, if your Flipper has been updated, you will either need to re-add the functionality back manually by editing the firmware and recompiling it, or simply download an older version of the firmware and load it onto your Flipper using the qFlipper update tool. For simplicity’s sake, I will be just loading on the oldest firmware which still supports reading bank and credit cards for this demonstration. Older firmware can be found on the Flipper’s builds page. I downloaded the latest firmware that still had card reading functionality for demonstration purposes, 0.80.1, flipper-z-f7-update-0.80.1.tgz. If you want the ability to store the card data, as later versions supported reading but not storing bank card data, you’ll have to use version 0.68.1 or earlier, which would be flipper-z-f7-update-0.68.1.tgz. Alternatively, you can modify the more recent firmware to include a save menu, which just involves copy and pasting save functionality from another part of the NFC menu into the EMV card reading section of the firmware.

Open up qFlipper and connect your Flipper Zero via USB. From there, click on “Install from file”, and be sure to choose the firmware that you downloaded. Note that Flipper recommends plugging the device directly into your computer instead of through a USB hub, as it may cause the update to fail. Wait for it to finish installing, and you will have card reading functionality back on your Flipper.

The Flipper Zero – Practical Uses for Penetration Testing: NFC (1)

From here, the process is quite simple. You go to the NFC menu, select “Read”, and place it against the card. Almost instantly, the Flipper will register the new card and you’ll be able to store it in Flipper as whatever name you wish (if your firmware version supports saving card data). The card data can then be read from the Flipper by going to “Saved” in the NFC menu and selecting the saved data. It can also be extracted to a computer and read as a text file if desired.

The Flipper Zero – Practical Uses for Penetration Testing: NFC (2)

The Payment Card Industry Security Standards Council (PCI SSC) released an informational PDF explaining how to prevent skimming attacks, and this focuses on devices that are much more stealthy than the Flipper Zero. This includes examples of terminal fraud, and the best ways for retailers to look for compromised payment terminals.

The Flipper Zero – Practical Uses for Penetration Testing: NFC (3)

The best way for an individual to protect themselves from these attacks are to be aware of skimming attacks and take a look at your payment terminal before tapping your card, and to be sure to store your card in a radio frequency blocking sleeve. There are situations where your card may end up out of sight when paying, such as when giving your card to the wait staff at a restaurant. Unfortunately, there’s nothing that you can do if a member of the wait staff is malicious and uses a skimmer to take your card data when they step away from the table. As a silver lining, for large transactions, payment processors usually require a valid billing address. So, if your data was skimmed in this way, it’s likely to be for smaller transactions, although that also makes it harder to detect if you’re just paying your bill and not inspecting your statement. So, it’s best to keep tabs on your monthly bill to ensure no fraudulent transactions are on them. Minimizing your risk exposure is best, but as of right now, it’s impossible to fully eliminate it.

The Flipper Zero – Practical Uses for Penetration Testing: NFC (2024)
Top Articles
Solana Could Be the Visa of Crypto Networks. Not So Fast, Says Visa.
DAO Masters
It's Official: Sabrina Carpenter's Bangs Are Taking Over TikTok
Did 9Anime Rebrand
Is Csl Plasma Open On 4Th Of July
Kentucky Downs Entries Today
1TamilMV.prof: Exploring the latest in Tamil entertainment - Ninewall
The Haunted Drury Hotels of San Antonio’s Riverwalk
Katie Boyle Dancer Biography
Garrick Joker'' Hastings Sentenced
Transformers Movie Wiki
What Is A Good Estimate For 380 Of 60
Craigslist Alabama Montgomery
Marion County Wv Tax Maps
Arboristsite Forum Chainsaw
Minecraft Jar Google Drive
My.tcctrack
Espn Horse Racing Results
Ou Class Nav
Committees Of Correspondence | Encyclopedia.com
Aspen Mobile Login Help
Bridge.trihealth
Hyvee Workday
Piedmont Healthstream Sign In
Ullu Coupon Code
Jailfunds Send Message
Filmy Met
35 Boba Tea & Rolled Ice Cream Of Wesley Chapel
6465319333
140000 Kilometers To Miles
Yoshidakins
Mgm Virtual Roster Login
Despacito Justin Bieber Lyrics
Craigs List Jonesboro Ar
Latest Nigerian Music (Next 2020)
Thanksgiving Point Luminaria Promo Code
How to play Yahoo Fantasy Football | Yahoo Help - SLN24152
Columbia Ms Buy Sell Trade
Joey Gentile Lpsg
Froedtert Billing Phone Number
Husker Football
This 85-year-old mom co-signed her daughter's student loan years ago. Now she fears the lender may take her house
Mid America Clinical Labs Appointments
Firestone Batteries Prices
RECAP: Resilient Football rallies to claim rollercoaster 24-21 victory over Clarion - Shippensburg University Athletics
Owa Hilton Email
Lucyave Boutique Reviews
Quest Diagnostics Mt Morris Appointment
Ark Silica Pearls Gfi
Acellus Grading Scale
Gainswave Review Forum
Varsity Competition Results 2022
Latest Posts
Article information

Author: Corie Satterfield

Last Updated:

Views: 6837

Rating: 4.1 / 5 (62 voted)

Reviews: 85% of readers found this page helpful

Author information

Name: Corie Satterfield

Birthday: 1992-08-19

Address: 850 Benjamin Bridge, Dickinsonchester, CO 68572-0542

Phone: +26813599986666

Job: Sales Manager

Hobby: Table tennis, Soapmaking, Flower arranging, amateur radio, Rock climbing, scrapbook, Horseback riding

Introduction: My name is Corie Satterfield, I am a fancy, perfect, spotless, quaint, fantastic, funny, lucky person who loves writing and wants to share my knowledge and understanding with you.