Skip to content

sh0ckSec/ClipboardCloner

Repository files navigation

Clipboard Cloner Guide

This project guide contains an entry-level hardware design that you can build in a day and deploy in the field in order to increase your chances of cloning an RFID badge for your red team and ethical hacking engagements.

Use this build and a simple social engineering interaction with a target. "Hey, we're conducting a badge audit for our annual security audit. Can I see your badge?" Once your target gives you their badge, you can simply hover it over the clipboard and hand it back within 1 second - you instantly copied their badge without them knowing any wiser.

This is part of a full paper and talk given during DEFCON 30 in the Physical Bypass Village and Radio Frequency Village titled: Keeping Your Distance: Pwning RFID Physical Access Controls From 6FT and Beyond by myself and Twitter: @_badcharacters (https://www.youtube.com/watch?v=OLLaXOcuYfw). The content has been updated for DEFCON 31 titled: Flipping Locks: Remote Badge Cloning with the Flipper Zero.

In this tutorial, you'll learn how to build your own Clipboard Cloner and clone the badge loot quickly and easily!

Disclaimer: This guide is for educational and ethical hacking purposes ONLY. All penetration testing activities must be authorized by all relevant parties.

Let's build it.

Clipboard Cloner BOM:

Here's an example of the wire connections:

Disable Beeping Sound

To remain as stealthy as possible, it is advised to turn off the audible "beep" if the reader allows you to. In this case, we can silence the beep on the HID Prox Pro 5355AGN00 reader by pushing down dipswitch SW-1 #2.

Flip switch SW-1 #2 down to turn off the beeping sound.

Secure Parts to Clipboard

Use the 3M strips to secure it to the badge reader and the 9V inside of the clipboard so nothing jostles around while you're carrying it.

Your final build will be sleek and sneaky.

Wall Implant Wiring Guide - 3.7V 500mAh LiPo Batteries

Let's take a look at the Wall Implant Remote badge cloner setup. If you want to create a wall implant to stick on a building, use LiPo batteries listed above so you can create an enclosed, all-in-one unit.

Wall-ImplantCapture

Below is an example of the wiring guide to connect to a HID reader with screw-in terminals using the ESP RFID Tool. Use the color-coded male-to-male breadboard wires to connect the two terminal interfaces between the Wiegand system and the ESP RFID Tool, as seen below.

  • Then connect the 2x 3.7V 600mAh LiPo Batteries in a series connection to power the reader and the ESP RFID Tool. These thin batteries will allow you to enclose all parts into the unit so it is nice and flat.

Here is a picture of the wiring without the batteries connected.

Here's a picture with the batteries connected with an ESPKey Wiegand Interception Tool installed. (https://www.redteamtools.com/espkey)

Note: For various configurations, check out the official ESP RFID Tool wiring guide here: https://github.com/rfidtool/ESP-RFID-Tool/blob/master/Installation-Schematics/README.md

Cloning Low-Frequency Cards - Mobile Phone + Flipper Zero

To remain incognito while at the client site, cloning a card with a mobile phone and a Flipper Zero hidden away will keep the lowest profile rather than fiddling with a laptop when you need to copy the card data.

Mobile Cloning Gear:

Step 1 - Access RFID Loot

Once the implant is in place and a few employees have walked past the gooseneck reader, hop onto your phone and log into your RFID ESP Key SSID to look for loot. The default SSID is "ESP-RFID-Tool" but it is recommended to change the name to something that will blend into the target environment. In order to change the SSID and password to protect the ESP RFID Tool wifi (and not leak all your client's credentials to the world), jump over to the configuration page to customize the settings and change all your default passwords.

Default credentials to access the configuration page:

  • Username: admin
  • Password: rfidtool

(Full ESP RFID Tool user guide here: https://github.com/rfidtool/ESP-RFID-Tool)

Once you're on the ESP RFID Tool WiFi, access Data in the "List Exfiltrated Data" Page:

Step 2 - Copy the 2nd half of the Binary Payload and Convert to HEX

Copy the second half of the binary data: ​

  • 10001111100000101001110011 ​

REMOVE the leading and trailing parity bits:

  • ​000111110000010100111001

Take this and convert it into HEX using a Bin-HEX Converter ​on your phone:

  • 000111110000010100111001 = 1F 05 39​

Step 3 - Save your Card Data to the Flipper Zero

On your Flipper, hit the center button and navigate to > 125 hHz RFID > Add Manually image

Then Select HID H10301 > Enter the Data: 1F0539 image

Select Save > Name the card (Enter the desired name) image

Select your saved card > Info (in order to look for your FC (Facility Code) and Card Number) image

Step 4- Clone your Card!

Select your saved card > Write it to a blank T5557 card image In a few seconds... image

Boom! Happy Hunting!

image

Special Shoutouts to the Physical Security Village team for hosting this talk during DEFCON 31!

OLD METHOD - Cloning Low-Frequency Cards - Android Phone + Proxmark3 Easy

For the sake of documentation, I will leave the old method on this page. But finding the exact firmware for the Proxmark3 Easy can be tricky with now, unsupported AndProx App - it is highly recommended to use the Flipper Zero in the field for the easiest approach. You can use a Proxmark3RDV4 and use the Proxmark HEX from the ESP RFID Tool.

To remain incognito while at the client site, cloning a card via an Android phone will keep the lowest profile rather than fiddling with a laptop when you need to copy the card data.

Mobile Cloning Gear:

MobileSetup

Step 1A - Access RFID Loot

Once the implant is in place and a few employees have walked past the gooseneck reader, hop onto your phone and log into your RFID ESP Key SSID to look for loot. The default SSID is "ESP-RFID-Tool" but it is recommended to change the name to something that will blend into the target environment. In order to change the SSID and password to protect the ESP RFID Tool wifi (and not leak all your client's credentials to the world), jump over to the configuration page to customize the settings and change all your default passwords.

Default credentials to access the configuration page:

  • Username: admin
  • Password: rfidtool

(Full ESP RFID Tool user guide here: https://github.com/rfidtool/ESP-RFID-Tool)

Once you're on the ESP RFID Tool WiFi, access HEX Code Data in the "List Exfiltrated Data" Page:

Step 1B - Copy the HEX Code Payload!

Step 2 - Android Cloning Setup

  • Download and install AndProx (Root NOT required!): https://github.com/AndProx/AndProx
  • Plug in your Proxmark3 via OTG cable
  • Click Connect Via USB
  • Begin sending commands!

Step 3 - AndProx Commands

Once your Proxmark3 Easy is connected, copy your Hex Code and enter these commands:

lf hid clone [INSERT HEX CODE]

#Example:

lf hid clone 20043C0A73 

Verify your card data:

lf search

Boom! Happy Hunting!

Buy Me A Coffee

References

About

Full Build Guide for making your own Clipboard Cloner!

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published