Flipper Zero NRF24
注意:所有模块均在第三方固件中测试,推荐使用unleashed固件,链接:[https://github.com/DarkFlippers/unleashed-firmware]
Author: mothball187(作者:mothball187)
How to use 使用方法
- Connect NRF24 to flipper using provided pinouts
将NRF24模块插入到Flipper Zero - Open NRF24: Sniffer, and scan channels, switch between modes/channels using buttons
打开APP->GPIO->[NRF24]sniffer,扫描频道,可以使用按钮在模式/频道间切换 - When you got address -> Open NRF24: Mouse Jacker
扫描到地址之后,打开APP->GPIO->[NRF24]Mouse Jacker - Select Address and open badusb file
选择地址并打开BadUSB文件(关于badUSB的使用请自行学习) - Done
结束
Demo (YouTube)
Mouse Jack affected devices
just for reference
https://www.bastille.net/research/vulnerabilities/mousejack/affected-devices
Warning
These apps are for educational purposes only. Please use this code responsibly and only use these apps on your own equipment.
本模块和软件只能用作教育和学习用途,一切使用责任请自负,请仅在您拥有的设备上使用
Acknowledgments
The NRF24 sniffing technique was discovered and shared by Travis Goodspeed in his blog.
The mousejack vulnerabilities were discovered and reported by Marc Newlin, see the blog for technical details.
Much of the driver code was inspired by RadioHead’s Arduino library. Much of the mousejack code was inspired by the Jackit project.