wiki folder removed, move to github wiki

This commit is contained in:
Pavel Zhovner 2020-08-07 03:28:08 +03:00
parent fb9511e84c
commit aa1cfd44b1
13 changed files with 0 additions and 188 deletions

View File

@ -1,12 +0,0 @@
# 125 kHz RFID
Low-frequency proximity cards are widely used in access control systems around the world. It's pretty dumb, keeps only a short few-byte ID, and has no authentication mechanism, allowing it to be easily read, cloned, and emulated by anyone. A 125 kHz antenna is located on the bottom of Flipper's body — it can read the EM-4100 and HID Prox cards, save them to the memory and emulate any of the saved cards by choosing one from the menu.
You can also emulate the card by entering its ID manually, so you can easily send it to your friend in a text format. Thus, Flipper owners can exchange card dumps with each other remotely without ever touching a physical card.
## Links
* https://scanlime.org/2008/09/using-an-avr-as-an-rfid-tag/
* [ESP8266 em4100 emulator](https://github.com/Crypter/ESP-RFID)
* https://www.kickstarter.com/projects/1708444109/rfidler-a-software-defined-rfid-reader-writer-emul
* https://github.com/AlexMalov/EasyKeyDublicatorRFID

View File

@ -1,3 +0,0 @@
# Bluetooth module
Bluetooth module will allow you to interact with Flipper using your smartphone, as well as transfer interfaces like UART and SPI to your computer wirelessly.

Binary file not shown.

View File

@ -1,5 +0,0 @@
# GPIO and hardware interfaces
Flipper Zero can be used as a versatile tool for hardware hacking. Its 12 built-in GPIO pins are 5V tolerant and allow you to connect it to any piece of hardware while running your own code, controlling it with buttons and printing debug messages to the LCD display.
You can use it as a handy firmware flashing, debugging, and fuzzing device, as well as USB to UART/SPI/I2C/etc adapter connected to the PC.

View File

@ -1,22 +0,0 @@
# Hardware version 1.0
[device schematic](flipper_zero_rev_1_0.pdf)
## Errata
* NAND reset IC drive reset net by push-pull output may cause MCU fault and disable internal MCU reset feature.
* System going to boot-loop state when reset by reset circuit
* No series resistors on external gpio for protecting MCU
* Wrong value LED series resistor
* Wrong footprint for CMOS transistors
* Wrong value IR TX series resistor
* No need capacitor on IR RX
* Wrong value IR RX pullup resistor
* 125 kHz RFID + iButton wrong schematic
* It seems bad to place main VCC on external GPIO pins. Overcurrent can damage main regulator and cause device broken. User can apply wrong voltage on this pin.
## New RFID + iButton schematic
after many experiments we found good schematic solution for work with RFID and auxiliary follow iButton level (for non-TTL protocol like Cyphral)
![new RFID + iButton schematic](new-rfid-ibutton-sch.png)

View File

@ -1,92 +0,0 @@
### Display
* Monochrome LCD
* Resolution: 128х64px
* Diagonal: 1.4”
* Orange LED backlight
### LED
RGB LED
### Control
* 5-button joystick
* Back button
* Reboot — Back+Left buttons for 2 seconds
### MCU
* ARM® Cortex®-M4
* 80MHz
* 1MB (1M x 8) FLASH
### Sub-1 GHz Range
* TX/RX
* Frequency: 433/434/315/868 Mhz
* Modulation: FM/AM
* Operate modes: Sniffer/Jammer/Emulator
### USB
* 1x USB 2.0 port
* Charging
* Firmware flashing
* User Arduino sketches flashing (must not break normal system behaviour)
### GPIO
* 0.65mm Female Header Connectors with 2.54 pitch
* x12+ — Data pins / 5V tolerant
* 2x — GND
* 1x — 3.3V
* 1x — 5V
### 125 khz RFID
* Supported protocols: EM-4100, HID Prox
* Operate modes: Reader/Writer/Emulator
### iButton 1-Wire
* Supported protocols: Dallas DS1990A, Cyphral, Metakom
* Operate modes: Reader/Writer/Emulator
### InfraRed
* Supported frequency: 36-40 kHz
* Operate modes: Reader/Emulator
### Bluetooth
* Bluetooth Low Energy 4.0+
* Firmware flashing
* Data transfer from/to the app
### NFC
* Supported protocols: Mifare
* Operate modes: Reader/Emulator/Sniffer
### Vibro
* Type: Coin motor
* RPM: ≥10000
### Speaker
* Type: Coin
### Power and battery
* Built-in not removable lithiumion battery 2000mAh
* USB charging 5V, 500-2000mA
* ≥10 days standby
### Physical
* Materials: PC
* Weight: <200g
* Size: ~98х40х22mm
* Operating temperature: 0 ~ 50 °C

View File

@ -1,3 +0,0 @@
# iButton contact keys
Flipper Zero has a built-in 1-Wire pad to read iButton (DS1990A) keys, also known as TouchMemory or Dallas keys. This technology is quite old but still widely used around the world. It's based on 1-Wire protocol and doesn't have any authentication, so Flipper can easily read these keys, save IDs into the memory, write IDs to blank keys, and emulate the key itself.

View File

@ -1,11 +0,0 @@
# Infrared transmitter
The infrared transmitter can send any signal to control electronics such as TV, air conditioners, stereo systems, and others.
Flipper contains a built-in library of common remote commands like switching on/off, changing volume or adjusting temperature, and so on. This library is constantly updated by Flipper community users that upload new signals to Flipper's IR remote database.
# Infrared learning feature
At the same time, the IR receiver can catch signals and save them to the memory, so you can store any of your personal remotes and transmit it later, as well as upload it to the public database to share with other Flipper users.
Flipper's infrared eye can automatically detect baud rate, frequency, and modulation of the IR signals it captures without any configuration. That allows you to easily capture and store signals from all your remotes and other IR appliances.

Binary file not shown.

Before

Width:  |  Height:  |  Size: 148 KiB

View File

@ -1,3 +0,0 @@
# NFC module
The NFC standard (ISO-14443) operates at 13.56MHz. We are going to use the TI TRF7970A chip, the same chip as used in the HydraNFC project.

View File

@ -1,7 +0,0 @@
# Security token
Flipper Zero can act as a fully functional U2F key, that works with any U2F-enabled services such as Google, Twitter, Facebook, Dropbox, LastPass, Amazon AWS, and many others.
Universal 2nd Factor (U2F) protocol is an open standard for hardware security tokens used for secure authentication. Developed by Google, Yubico, and NXP, U2F acts as a universal key that is designed to add another layer to the traditional login+password authentication method.
Even if your password gets compromised, an attacker will not be able to log in to your account. This method is much stronger than the usual SMS 2nd-factor method, as it doesnt involve any third-parties like a cell phone operator.

View File

@ -1,27 +0,0 @@
# Sub-1 GHz Radio
To communicate with the real world systems, Flipper Zero has a built-in radio module based on TI CC1101 chip. It supports both transmitting and receiving digital signals within the 300-928 MHz frequency range. This is the operating range for a wide class of devices and access control systems such as garage doors remotes, boom barriers, IoT sensors, and remote keyless systems.
Out of the box, Flipper Zero can emulate remotes for popular garage doors and barriers. You can keep hundreds of remotes in Flipper's memory as well as create a blank remote for the new wireless gate. Just select the right brand of the system in the Flipper menu, register a new key in your garage/barrier receiver, and give it a unique name for easy navigation between your remotes.
CC1101 is well known universal transceiver designed for low-power wireless applications. And with a ready-to-use open-source library, developers can interact with the radio subsystem without limitations. You can write any wireless application, like custom protocol or decoder, as well as use it for connecting with IoT devices and access systems.
## Signal Analyzer
* Works on 315/433/868 MHz
Flipper Zero has an integrated decoder for popular remote control algorithms such as Keeloq and others, so you can analyze an unknown radio system to figure out the protocol under the hood.
Furthermore, Flipper can record the samples of radio signals to analyze it later with more sophisticated tools on the computer, as well as replay the saved samples. Many remotes and IoT devices such as doorbells, sensors, and radio sockets don't use any encryption at all — in this case, Flipper can replay the signal, even if the protocol wasn't recognized.
### Remote Analyzer demo
https://www.youtube.com/watch?v=AeCGLFKsxCU
* Detect protocol and parse it
* Analyze if it's secure on not
## Common Dummy Remote
User can use flipper as normal dummy remote for their own reciever like garage door.
For this flipper should have library of popular remotes brands.

View File

@ -1,3 +0,0 @@
# USB
As we all know, computers completely trust connected input devices like mouse and keyboard. Flipper Zero can emulate a USB slave device, allowing it to be recognized by the computer as a regular input device, such as HID keyboard or Ethernet adapter, just as USB Rubber Ducky. You can write your own keyboard payloads to type any key sequence, as well as fuzzing USB stack on a target device.