
In this article, you will take a deep dive into the capabilities of the NFC module: UID reading, card emulation, MIFARE Classic cryptanalysis, MFKey32 attacks, and configuring advanced interaction scenarios with 13.56 MHz cards.
Disclaimer: The information provided in this article is for educational and informational purposes only. The author is not responsible for any misuse or incorrect use of the Flipper Zero device.
NFC (Near Field Communication) is a short-range wireless data transmission technology (up to 10 cm), widely used in public transport smart cards, office passes, access systems, bank cards, digital badges, tags, etc.
Flipper Zero has a built-in NFC module that allows you to read, store and emulate such cards. This makes the device a versatile tool for:
Contactless infrastructure analysis;
Penetration testing;
Building custom emulation solutions;
Educational protocol learning.
To use the NFC app, you need to insert a microSD card — that’s where Flipper saves the read data. You also need to update the device’s firmware to access full functionality.
At the heart of the Flipper Zero NFC module is the ST25R3916 high-frequency chip from STMicroelectronics. This chip supports all popular NFC protocols (ISO 14443A/B, ISO 15693, FeliCa) and is capable of operating in both read and emulation modes.
Its advantages:
High signal sensitivity;
Stable operation even in the presence of electromagnetic interference;
Support for advanced energy-saving algorithms.
Flipper is equipped with a dual-band antenna:
13.56 MHz for NFC/ISO cards;
125 kHz for low frequency RFID cards.
This design allows Flipper to work with two major contactless identification standards: NFC (high-frequency, encrypted cards) and RFID (simpler systems, often without encryption).
Flipper Zero has a convenient and logical NFC application menu, which is divided into several main sections. The application is accessed from the main menu of the device.
Read (Read NFC Card’s Data). This item allows you to read the UID (unique identifier), card type, SAK parameters, ATQA and other open fields. The data can be saved immediately to a microSD card.
Extract MF Keys (Extract MF Keys). One of the most powerful tools is card emulation using the nonces (one-time numbers) collection mechanism that is required to calculate MIFARE Classic cryptographic keys. This actually allows you to carry out authentication attacks, including MFKey32.
Saved cards (Saved NFC Cards). All cards that you have previously read are stored here. You can view, rename or emulate them from this list.
Extra Actions (Extra Actions). This item opens up advanced functionality: running scripts, adding plugins, running emulation, using custom keys or advanced attacks.
Add Manually (Add Manually). This item allows you to manually create a virtual NFC card by entering the required parameters (e.g. UID), which is useful for debugging or special scenarios.
Flipper Zero has become a virtual pocket laboratory for researching NFC systems. It is used by:
Professional pentesters – for testing the security of office or industrial access control systems;
Researchers – for studying encrypted protocols such as MIFARE Classic/Plus/Desfire;
Engineers – for creating and testing reader infrastructure;
Educational institutions – in courses on cryptography, information security and wireless technologies.
The ability to read, store, and emulate cards opens up a huge space for experimentation, testing, and prototyping your own NFC solutions.
Flipper Zero in NFC is an impressive combination of simplicity, technical depth and flexibility. Its engineering implementation allows you to not just passively scan cards, but actively interact with cryptographically protected protocols, test authentication attacks, simulate the behavior of real cards, and conduct research experiments.
With an open architecture, continuous firmware development and an active community, Flipper Zero with NFC is more than a gadget. It is a real research tool that can expand the understanding of contactless security to a whole new level. Its effectiveness has already been proven by thousands of users around the world – from enthusiastic hackers to certified cybersecurity professionals.
Flipper NFC is not limited to current functions – it evolves with you. And if you have ever wondered how access systems work – Flipper will allow you not only to understand it, but also to control it.