• expired

Flipper Zero Hacking Multi-Tool US$175.83 / ~A$286.20 + Free Shipping @ Flipper Devices via Joom

500
ZERO

Came across this deal as ZDnet was talking about this gadget, and I have held off buying this until now. According to the official website, the only authorised store for Australia is via Joom.

Introduction
The Flipper Zero is a multi-functional tool designed for those interested in technology. It's suitable for IT professionals, electronics enthusiasts, and anyone curious about cybersecurity and digital communication.

Key Features

  • Wide Protocol Compatibility: The Flipper Zero can interact with various wireless protocols including RFID, NFC, infrared, and Bluetooth. This makes it a versatile device for different technological interactions.
  • Open-Source and Customizable: The device is built on an open-source platform, allowing users to modify its firmware and tailor it to their specific needs.
  • Simple User Interface: It features an easy-to-use interface with a touchscreen and physical buttons, making it accessible for both beginners and experienced users.
  • Durable Design: The Flipper Zero is built to be sturdy and portable, ideal for regular use in various environments.
  • Educational Value: It serves as a practical tool for learning about electronics and cybersecurity, suitable for educators, students, and hobbyists.

Use Cases

The Flipper Zero is versatile for various applications, such as:

  • Security testing by cybersecurity experts
  • Wireless communication projects for electronics hobbyists
  • Troubleshooting and diagnostics in IT
  • Educational purposes in technology-related fields

ARM Cortex-M4 32-bit 64 MHz (application processor)
ARM Cortex-M0+ 32 MHz (network processor)
Flash: 1,024KB
SRAM: 256KB
1.4-inch 128 x 64 LCD monochrome display
5-button joystick with back button
2000mAh rechargeable battery
13.56 MHz NFC
125 kHz RFID
18 GPIO connector
Infrared (TX/RX range: 800-950 nm, TX power: 300 mW)
iButton 1-Wire support (Dallas DS1990A/CYFRAL compatible)
USB 2.0 port, type C

Related Stores

Joom
Joom
Marketplace
Flipper Devices
Flipper Devices

closed Comments

  • -1

    $169 in US, why its like double in Au.

    • +17

      169 United States Dollar equals
      263.40 Australian Dollar

      • +7

        Plus 10% GST so works out about right.

        • +6

          yup im so tempted to buy it but I don't have any use for it

          • +6

            @Wiadro: Sammme. It will be sitting collecting dust after few days

            • +1

              @sedi: ditto. Thanks folks. Pass otherwise it's gonna stay on my table for a few days before disappearing into some draws + Thanks for all the peer support đź‘Ťđź‘Ť

          • @Wiadro: Hasn't stopped you before!

          • +4

            @Wiadro: Buy it! Buy it! Next month we can all have another 0.5 basis point increase.

            • +4

              @jonow83: With all the unwanted Eneloop stock most of us have, OzBargain is responsible for the RBA rate increase

          • @Wiadro: The same as most other things purchased from OzBargain…

  • +8

    Holy crap that's expensive! Maybe a deal on this hardware specifically but I can't convince myself spending $200+ on a STM32-based device.

    I wonder how many people actually buying it for their project instead of following up various online hacking tutorials.

    • +4

      Too expensive to buy as a toy to create mischief with BLE spamming… Reminds me of the old bug on iOS where you'd set up a hotspot with a special character which would crash nearby iPhones. Or even dropping a special character in a chat group with iOS users could potentially brick the phone

  • +8

    Heh. I also read that article the other day.

    Can you use it to silence those Bluetooth speaker twits?

  • +1

    Great device if you want to learn hardware hacking

  • +1

    Managed to get it for just under $300 a few months ago when the AU$ was doing a bit better, so far I've only used it to store all of my RFID passes, keen to explore more but just haven't gotten around to it. Was a bit worried that it might get banned here with some of the media attention it was receiving, so decided to bite the bullet. Fun project to support.

  • +1

    I'd recommend picking up the wifi board whilst checking out.

    • Does that support 5ghz?

      • Sadly no.

  • +11

    I wonder how many bought this thinking they'd be a real life Aiden Pearce..

  • +3

    there's a guy on Insta using name "surlydirtbag" from Canada…

    he uses one of these things to do all sorts of pentesting .. it's actually quite an interesting watch.

    • +3

      Saves me buying one, thanks!

  • +5

    I'm looking at the feature list and the cost of comparable parts from eBay or Aliexpress and… it's not worth $286??

    You could easily build something DIY from something like an ESP32-C3 for like $6 which INCLUDES wifi. Then add a display, joystick, NFC, RFID, Bluetooth modules for like $5 each.

    Maybe the ARM processor gives you more grunt; but I'm not seeing the use case.

    • +1

      Is all software open source?

    • +9

      There's surely a large markup on it, but it's a low volume product (for a consumer device). You're more than welcome to get your own PCB fabricated, solder it up, and put it into a case - but for most people that's more effort than it's worth.

    • +1

      Would yours be in as nice a form factor though? This guy's pretty small and tidy. That said, yeah, it's a very expensive Amiibo emulator and pet microchip reader for me…

      • +1

        3D printer goes whirrr

        • +4

          And how much does that cost now? :P Don't forget the time and material spent learning how to use it, and even if it's a filament instead of resin, that ain't cheap.

          • +3

            @kwchaz: At my current pay rate (under $5/hr for Centrelink fulltime carer) filament being $15/kg, and electricity being 11c/kWh offpeak…

            maybe tree-fiddy

            • +2

              @Switchblade88: Your electricity costs too much. Dont forget it's free when you plug it into a nearby park's BBQ plug! ;))

            • @Switchblade88: So your printer cost nothing?

              • @kwchaz: If I amortised it over 200kg of filament, then it's $1/kg. That means it's probably 2c of cost for a project like this.

                Never mind I could buy a printer JUST for this project for less than $286…

    • +1

      Is it worth doing that when there's devices like the HackRF One and the Portapack H2?
      Obviously more expensive hardware, but would your skills be wasted recreating an inferior device?

    • I think ive got everything to make a half dozen of them right here lol.

      I dont like this product though as it is irresponsible imo

      • +1

        I dont like this product though as it is irresponsible

        The same way kitchen knives are dangerous in the hands of murderers? Or cars are used for delivering meth?

        I can do more illicit pen-testing with a laptop in a hospital, this device isn't anything special.

  • I saw the articles about Bluetooth recently, but wow this is way more expensive than I thought the device would be.

  • Except for those states that have already implemented student phone bans on class, someone should let teachers know about this device. Lol

    • Teacher here. What´s the danger if you don´t have your BT on?

      • +2

        Kid at our local high school cloned one of the teachers fobs and got into areas he wasn’t meant to but that was about it. Would have been no different if he had stolen the fob. I guess if they were smart and wanted a criminal record they could have come back at night and stole stuff.

        • +3

          In stock form the flipper can only clone unencrypted RFID cards. Plenty of places use those - but they shouldn't. If you want to clone anything encrypted (like the popular iClass) then you need to add bits on and hope that they're using the standard encryption module.

      • +1

        Honestly the kids will cause more mischief with a pack of textas or whatever else is in their pencil case.

        BT - low risk:
        Bluetooth scriptkiddie pentest payloads tend to need BT on to work and any that are commonly available for this are going to be POC demos to prove the target is vulnerable. After finding a vulnerability the kid is still going to need to know how to exploit it to muck with the victim device.
        College level expertise and in-depth understanding bluetooth protocol and stack along with extensive knowledge of victim device design is likely required for more than crashing the victim device.

        IR - low/trivial risk:
        IR transciever means this thing should be able to function as a universal IR remote control and thus control televisions etc.
        But a ten dollar univeral remote often comes with a feature quickly set itself up - they cycle through common remote codesets until it hits the correct vendor for the power button code to match, at which point the user presses some button and the remote knows which set of button codes to use for the intended device.

        RFID/NFC transcievers - low risk:
        It's as if they nicked your building access card and you didn't know it's gone.
        MIFARE (e.g. bus passes) has been widely used for a good decade at least now and while there are weaknesses to it they take time to break into (because under the hood they have passwords the authorized reader device knows).
        Newer contactless cards than that (e.g. bank cards) are not at meaningful risk from this device, even in the hands of the kinds of experts who do it for a living and regularly attend DEFCON. (The only attack I know of that works against those is essentially just making the victim talk to an attacker-controlled payment terminal over a longer range.)

        1wire/smartbutton - low risk:
        This is just not commonly encountered by the public, and when it's used it tends to need a key to get at.
        Fire alarm panels sometimes have a smartbutton pad behind the locked front glass cover for maintenance/admin use.

        General low-frequency radio - low risk:
        Wireless garage doors and gates would be vulnerable to this; old car remote locks in principle maybe; various cheap radio based remote control gadgets would be similar difficulty range to a garage door opener; they could listen in on your wireless weather station gadget.

        I'm suprised they didn't chuck in a cheap wifi module, but wifi deauth attacks are very 2000's and much modern wifi kit is wise to such trickery, just shrugging off the deauth messages.

        • Honestly the kids will cause more mischief with a pack of textas or whatever else is in their pencil case.

          You really believe that.. dont you..

      • +1

        I would not lose any sleep. It's an overpriced fad.

        As an example - any kid could go to the reject shop and buy an IR blaster. Turn off the TV during a video. After the second time of it occuring you'll know someone is doing it and punish the entire class or go back to paper based work.

        I think it's way more likely a kid just takes your keys (or deliberately leaves a window unlocked) than replicates a very old RFID standard.

        If I saw a kid who had one, I'd tell him to take it home immediately before it gets stolen or confiscated. Not because of the threat to your security

  • Can I clone college RFID access card with this or is it outdated apart from garage doors

    • Depends on the type of card, and how much effort you want to put in. If it's an unencrypted RFID card (old school HID card, or other unsecured card) then you might be able to in stock form. If it's a secured card then you probably can, but you'll need to buy an addon for SAM cards (the thing that does the encryption for the encrypted cards) and have the right SAM card module. I think most brands just use a standard module - but I don't know.

      If you just want to clone insecure cards then you can buy a cheaper card cloner from ebay/ali. If you're interested in learning then the flipper is a good way to play with this sort of thing without having to built your own dev board.

      edit: see this product https://www.redteamtools.com/nard-sam-expansion-board-for-fl…

      • Thanks for your insight it does sound like a lot of fun so I'm tempted

  • -1

    I've been following these devices on tiktok, and the hacks seems to be

    • triggering Teslas power flap when it's parked
    • cloning some unencrypted cards for really basic devices like a very very old wireless parking gate
    • turning off tvs (which many phones have a built in IR blaster)
    • doing something with the real remote behind the camera. (Like pressing unlock on your car key while holding the flipper)

    I don't think this will meet expectations

  • +2

    Given the great security of Optus, I wouldn’t be surprised if this device is found to be responsible for taking down the network.

  • +1

    While waiting to be delivered I've been researching this device. There's is an active community, heaps of 3rd party apps, apps store, mobile app, custom firmware that really pushes this little device far.

  • +1

    Deal still active, albeit a slight change in price.
    Subtotal A$323
    Discount -A$32.30
    Total A$290.70

Login or Join to leave a comment