After pen testing a home network it becomes a novelty item.
Turning off TVs and opening Tesla charging ports is fun for a bit.
The best, though, is setting off the department alerts at Walgreens, there’s a lot that exist that the employees have never heard. When you trigger “help needed in the baby department” then watch the employee reactions it’s a fun time.
Think of it like one of those 3-inch swiss army knives, but for IR tech and radio. If you mean to do work. Use the correct tool for the job, but there is no reason you cant acomplish what your trying to do. They are great for learning, if I was teaching a kids about cyber security, a flipper zero would be on the required tool kit.
Yes, you can do harm with them, per the previous analogy its still a knife. However, devices not hardened against simple replication attacks or brute force acomplished by something barely more powerful than a TI-84, those manufactures and customers needs to take the security of their products more seriously.
This certainly doesn’t make me want a flipper any less than I already do. Seems so fun to mess with
After pen testing a home network it becomes a novelty item.
Turning off TVs and opening Tesla charging ports is fun for a bit.
The best, though, is setting off the department alerts at Walgreens, there’s a lot that exist that the employees have never heard. When you trigger “help needed in the baby department” then watch the employee reactions it’s a fun time.
Beyond that, it’s a paperweight most days.
I have a buddy that uses his to spoof people’s apartment swimming pool access cards.
Think of it like one of those 3-inch swiss army knives, but for IR tech and radio. If you mean to do work. Use the correct tool for the job, but there is no reason you cant acomplish what your trying to do. They are great for learning, if I was teaching a kids about cyber security, a flipper zero would be on the required tool kit.
Yes, you can do harm with them, per the previous analogy its still a knife. However, devices not hardened against simple replication attacks or brute force acomplished by something barely more powerful than a TI-84, those manufactures and customers needs to take the security of their products more seriously.
It was nothing more than a novelty after about a day and a half, even with the WiFi module.