It can also read cards that use RFID and NFC technology — like credit cards, gym cards and hotel keys — and sometimes replicate them. there are other ways to clone cards listen to "scam rap" from detroit area. Here we have a video showing off the Flipper Zero & its multiple capabilities. Flipper Zero then saves the signal type to memory. Your card uses the Mifare Plus protocol, which is not yet supported by the Flipper, and the full reading may never be supported because this card uses strong cryptography that has no known attack vectors to date. 3. As Flipper Zero is marketed as a 'hacking tool', discusses use-cases as cloning cards and acting as a 'bad USB' device, has a indie go-go page that implies that you could use it to break into car parks, I'm not entirely surprised that Amazon wouldn't want to stock it. SeriousAd2013. These work great with the flipper: Go to Main Menu -> 125 kHz RFID -> Saved. Stars. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. It combines the functionalities of various tools into a single compact device, making it a valuable asset for ethical hackers, security researchers, and enthusiasts. SD Card for saving settings and files. We can do so much with such a simple connection!To the untrained eye, the Flipper Zero looks like a toy. Go to Main Menu -> NFC -> Saved. Flipper Zero. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. Flipper Zero will emulate this card for the MFKey32 attack. Be sure to read sub rules before posting, use the resources linked in the sidebar / about section of the sub, and use search to see if your question has already been answered. You can definitely capture, emulate and write NFC and RFID. Part of Flipper Zero's appeal is its versatility. Txt. Preamble 🔝 ; This is a community FAQ. Right now the Flipper supports only reading the unencrypted DESFire data, and implementing decryption/writing would be tricky due to the sheer length of the key. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. ; Flipper Zero Firmware Update. But you can’t clone the SE with a Flipper. The ChameleonMini can extract info from card keys and key fobs, including cloning the UID and storing the data for later. Buying similar individual pieces of hardware to make your own device would end up costing more in the long run. ; Flipper-IRDB Many IR dumps for various appliances. In this segment, i clone my doorbell and explain what i do in order to do so. Flipper Zero supports the following NFC cards type A (ISO 14443A): Bank cards (EMV) — only read UID, SAK, and ATQA without saving. That's how I'm going to need someone to visualize me when responding if I have even a small shot at ever figuring this out. 1. It loves to hack digital. Just take each 5 bits and only read the first 4. Hold your Flipper Zero near the reader or smartphone to program it. Tap your phone on the reader and see if apple pay or google pay pops up, if it does, it’s NFC, if it. But i am Not an expert so i dont know really what is needed and somes other people say it never be possible. use the built-in constructor or make config file by following this instruction. On the front, there's a 1-Wire connector that can read and. Guides / Instructions. If you have an ID that opens a door, you can (probably) clone it with a Flipper Zero, whether it’s your work badge or a hotel room key. Cloning building entry cards; How does Flipper Zero work? Central to Flipper Zero's capabilities are its various antennas that allow it to capture, store, clone, and emulate wireless signals. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. About Our cloned cards, – Buy cloned cards – Buying clone cards – Buy clone cards online -Buy cloned credit cards. 4-inch display. With Flipper Zero, you can emulate saved 125 kHz cards. Curious, I presented my face and unlocked it and the flipper read my card. 32. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. Select the signal, then press Emulate. This data can be used to gather the credit card number, and other data, such as expiration date, CVV code, and more. It might be a bit before it’s ready though as. This makes it super easy to clone the RFID off a credit card you have used to lock an RFID hotel safe, or your NFC front door, etc. And if you are able to clone the. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. Flipper Zero is a small, concealable, portable penetration testing tool capable of exploring, copying, intercepting, and replaying signals and protocols communicated in short ranges, including radio protocols, access control systems, and hardware. Flipper Zero also has the ability to transmit and record IR signals, read and clone physical access to different RFID cards, function as a USB to. While Flipper Zero is a versatile handheld device that can be used for a variety of tasks, Flipper Lite is a simpler version that focuses on. Nesica. And if you are able to clone the SE of a credit card or a Yubikey, you can get very rich. The popular, in-demand hacking tool went viral on TikTok in late 2022 and can. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. Already talks about making a dedicated amiibo plugin that can read Bins off the SD card and directly convert them on fly for emulation. txt. Universal remotes for Projectors, Fans, A/Cs and Audio (soundbars, etc. It's fully open-source and customizable so you can extend it in whatever way you. Flipper Zero Official. It reads cards based on sub-specifications of the MIFARE standard. Astra April 16, 2022, 9:51pm #2. If an attacker has that much access, the target has other problems. 00 of select items. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. No, the Flipper Zero can't change gas station signs, can't clone credit and debit cards, and can't (normally, anyway) turn off the displays at your favorite burger joint. Multiple High Frequency protocols are supported, and the Flipper Zero can even sniff. Upgrade your Flipper to "unleashed" firmware. Blue Team Field Manual (BTFM): 3. It's fully open-source and customizable so you can extend it in whatever way you like. Some of the tech specs highlights include: 32-bit Arm Cortex-M4 processor + Cortex-M0+ 32 MHz (network) 1 MB of Flash. 1 Like. Then flipper emulate the read card:I do the detect reader, Flipper says it gathered 10 nonces, but then Filpper says it didn't find any new keys, only has some duplicates already. My-Flipper-Shits Free and open-source [BadUSB] payloads for Flipper Zero. Once you have all of these components: 1. If you like playing will electronics it is worth every penny. This is intentional, so you can use newer readers and newer cards seamlessly. It shows how well an RFID blocking card can work, and why you do want to protect your bank cards if they have RFID on them. Hack the planet! Spildit November 15, 2022, 2:38pm #16. It can test servos, clone tv remotes, and read NFC cards (like the one you have for a bank or credit card. 3. Databases & Dumps. Not going to be officially developed. From the main menu select the NFC; Select the Read option; Move the NFC tag to the back of the Flipper ZeroThe Flipper Zero most interested me for its ability to work with sub-GHz frequencies (frequencies below 1 GHz). The Flipper Zero is a small gadget that can transmit and receive sub-GHz frequencies. 3. Episode 4 in the Proxmark Basics series introduces the MIFARE Classic® 1K : introduced in 1994, there are over 10 billion cards in circulation. Flipper Zero is a versatile open-source hacking device designed with a focus on hardware and software security exploration. Card or Tag Flipper Zero Setting. The Flipper Zero is a small gadget that can transmit and receive sub-GHz frequencies. Before buying the Flipper Zero, you should know that many. fap files, which do not update to the correct API versions by default if old ones are present (Thanks flipper devs). First, you need a Wi-Fi dev board, and then you're going to have to flash the firmware on the Wi-Fi board, install new firmware. A Flipper Zero can read credit cards. It can clone TV. Select the added card and press Emulate. r/flipperzero. Preamble 🔝 ; This is a community FAQ. Big thanks to Lab401 for sending me some cool toys :) The Flipper Zero must be one of the most in demand hacking tools of 2022. I can’t seem to get the Flipper RFID reader to read the RFID cards we use in my building, they are HID ISOProx II cards. Let me aid you in resolving any queries you may have. Emulate the NFC tag with your Flipper and hold it on the phone until it's success. I have a keyfob that "unlocks" public rooms in my building, allows the elevator to go "up" and unlocks my specific. I have the data in . Press Send to send the saved signal. It then asked again to run in a compatible app. 108K Members. Scroll through tools and look for the “PicoPass Reader”. Hexadecimel verision: 9BAFA0. Go to Main Menu -> NFC -> Saved -> Card's name. •. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. Go to NFC -> Detect Reader -> hold flipper to your front door lock. This is a thread about providing detection of anti-copy algorithms put in place by French Access Control manufacturers to prevent Flipper Zero owners for inadvertently erasing their original cards when they make private copies, or when they make in-scope penetration tests. 1) I have an NFC lock that uses a Mifare Classic 1K, all default keys, just UID authentication. ; User Documentation. Flipper Zero SW&HW keynote (OUTDATED) Hardware & software architecture document. It would be amazing if one could use the Flipper as a backup car key, not to mention a huge money saver compared to buying another key from the. A new phishing campaign is exploiting the increasing interest of security community members towards Flipper Zero to steal their personal information and. If you have an ID that opens a door, you can (probably) clone it with a Flipper Zero, whether it’s your work badge or a hotel room key. Go to NFC Tools -> mfkey32 to read and calculate keys. You cannot clone a credit card. is a light primer on NFC and the Flipper Zero. Maybe a replay in time would be successful. It all depends on the standard used by the tickets and ticket machines. 2 Press Read, then. go to qflipper and connect you’re flipper and click on install from file. Just take each 5 bits and only read the first 4. Improvements for your dolphin: latest firmware releases, upgrade tools for PC and mobile devices. (sidenote: the bank card feature doesn’t work) Pilate. From a report: The Flipper Zero is a compact, portable, and programmable pen-testing tool that can help experiment with and. both the encrypted and unencrypted parts of the card’s scan is needed for a successful transaction. I made one a while back but it’s become outdated I’m sure, and I’d like to create a new one but it’s time consuming to go through all the individual GitHub’s and download and sort all the. Maybe a replay in time would be successful. The cli and detect mode are Linux only. Using the Flipper Zero’s 125 kHz antenna, you can read such cards and store the bytes stored in them, later using the Flipper to open those doors. The airport likely uses the numbers at the beginning of the set and sold the ones at the end. Your best bet is to just get a variety pack for $5-10 on amazon or Aliexpress or something. Flipper Zero NFC Cards. you need to save the one you want to write, make sure they are same type of card, and than if you saved the nfc tag u want to write, if you go to saved, the tag u want to write, and then scroll down till u find “write” button, and then press that button and place card you want to write under the. Enter the card's data manually. 56MHz) and Low-Frequency (125KHz) RFID tags. The Flipper Zero includes more advanced uses, including the reading, emulation, and cloning of NFC cards. options: -h, --help show this help message and exit --cli Extract the values via flipper CLI, compute the key ' s and upload them to flipper (full auto mode) --detect Detect Flipper Zero Device - prints only the block device --extract LOGFILE Extract Keys from a local mfkey32. It is, by design, incomplete, and you still need the card, the CVV, the name, the address and an OTP or 3Dsecure clearance. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. Tried to modify another NFC save but obviously it's not so simple and I ran out of time. It also features a built-in NFC module, enabling it. Unknown cards — read (UID, SAK, ATQA) and emulate an UID. It's fully open-source and customizable so you can extend it in whatever way you like. Flipper Zero is designed with a variety of antennas that enable it to capture, store, replicate, and imitate wireless signals, interacting with a multitude of signal types: NFC: Commonly found in bank cards and building access cards. In the qFlipper application, go to the Advanced controls tab. This is an external app that writes UID of Mifare Classic 1k to RW NFC tags (Magic cards). According to Amazon, the company banned the Flipper Zero, a $169, self-described "portable multi-tool for pentesters and geeks in a toy-like body," for breaking its rules against card-skimming devices. 2. Flipper Presentation: 00009BAFA0. MIT license Activity. Learn more about your dolphin: specs, usage guides, and anything. Select the card you want to emulate, then press Emulate. Carnival Cruiseline. Recently, my 15-year-old teenage son, Noah, mentioned that a friend of his, Vincent, had some questions for me knowing that I work in the field of cybersecurity. Altrimenti, ti toccherà aspettare un po’! Al momento è sold out sul sito ufficiale di vendita e non è possibile sapere quando sarà di nuovo disponibile. Go to NFC Tools -> mfkey32 to read and calculate keys scan the fob again. The tool is smaller than a phone, easily concealable, and. However looks are very much deceptive in this instance, as this device is a. The Complete Big Data & Power BI Bundle. Well, no longer an issue with this simple Flipper Zero hack. Flipper Zero Tool, NFC Cloning Demo #flipperzero #flipper #zero #crawsec #crawsecurity #crawacademy CRAW SECURITY #security Must…If it doesn't read, try to reboot device (press Left + Back ) Repeat process. . Look your for the Big Bounty programs. $1151. 0. You can also emulate cards by entering their IDs manually. Additional Flipper Zero accessories include a protective silicone casing priced at $15, a screen shield for $7. . Look in to how magspoof works; it tricks magnetic read heads by generating a field that is interpreted by the reader the same as swiping a card through it. THIS way your original key doesn’t lose its synchronized is with the vehicle and has its own rolling code. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. . Your best bet at cloning those is to get a. and never will. should read the tag with 32/32 keys and all sectors in about 5 seconds or so. bm # Animation frame │ │ └── meta. If you get access to the card, the Flipper Zero only reads the card number and sometimes the expiration date depending on the type of card it is. I’m sure it could be encrypted, too, for security. Car Key Emulation. So you can use Flipper Zeros to pay. It can be used for light pen testing and as an introduction to the sub-frequency world. Look your for the Big Bounty programs. Amazon has banned the sale of the Flipper Zero portable multi-tool for pen-testers as it no longer allows its sale on the platform after tagging it as a card-skimming device. I'm attempting to clone my key fob and ran the original dictionary against it and got 49/80 keys. 78 subscribers. I think the flipper will show file 2 as 'standard. Flipper Zero can read and emulate RFID cards, allowing users to analyze and interact with them. both the encrypted and unencrypted parts of the card’s scan is needed for a successful transaction. Hold your Flipper Zero near the reader or smartphone to program it. Arcade Test: Failed-MaximumTune5DX+Terminal, Machine didn't respond to flipper. Then you go away, connect your flipper to the phone app, and the phone app reads the log of the numbers you got from the. . The Flipper Zero is a multipurpose hacker tool that aims to make the world of hardware hacking more accessible with a slick design, wide array of capabilities, and a fantastic looking UI. Current availability of Flipper Zero: Zero Kickstarter Campaign:cards have data in them. if no then it may simply be that the type of card you have is not currently supported under the flipper. The device showed "Reading bank card". Flipper Zero Clone using ESP8266 Resources. Be sure to read sub rules before posting, use the resources linked in the sidebar / about. You're personal. For example, I’ve seen hotel safes that can be locked and unlocked using credit or debit cards, and a Flipper Zero could be used to clone the card and unlock the safe. ; UberGuidoZ Playground Large collection of files, documentation, and dumps of all kinds. txt # Windows sample script ├── dolphin │ ├── L1_Furippa1_128x64 │ │ ├── frame_x. . To read and save the NFC card's data, do the following: 1. Introduced initially as a Kickstarter campaign seeking to raise $60K towards the end of 2022, the FlipperZero has taken the security world by storm, producing dozens of YouTube videos, write-ups, GitHub repos, and derivative products to extend its capabilities. Which includes cloning IR signals and then emulating them, as well as cloning the UID of an RFID and writing it to another RFID card. > Buy stuff. Imagine I'm a 12 year old who only uses his computer to watch youtube videos. Summary. Each EMV smart card contains a unique public and private key pair that is used during authentication. . ↣ Get Members only perks at subscribe: STAY LU. The flipper recognized it as an EMV card. the flipper has no way of decrypting the card. It used to be an option in stock FW for a while, but it made no practical sense since only UID can be emulated for EMV cards. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. ago. Maybe a replay in time would be successful. In-depth University Hid Iclass NFC card. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. Flipper cannot clone/emulate credit/debit cards. ago. MSP Culture. #flipperze. You use the flipper NFC app feature "Detect Reader" to pretend to be a MiFare Classic NFC card. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. 2. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. Unfortunately for Flipper, this scanning ability has earned a ban from Amazon, which now considers it a policy-breaking card-skimming device. crumpledelex • 2 mo. txt # List of items displayed in Favorites ├── Manifest # Resource files list ├── badusb # Put Rubber Ducky scripts here │ ├── demo_macos. It can read the chip, and tell you the EMV but you need the t1 and t2 tracks too. . It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. You. But beat your can do is emulate the card with the flipper. 4. Hook up a satellite dish to your flipperzero. Flipper Zero; PC with qFlipper; Download the Xempty_213. MSP Culture. 68. 56MHz) and Low-Frequency (125KHz) RFID tags. Follow these steps: 1. It used to be possible to read some public information from them, but some time ago that feature was removed, probably due. GBL model of the Flipper Zero; ProtoBoards KiCadA KiCad for printing Flipper Zero Protoboards; Hardware. then locate that file you just downloaded. However, it's crucial to highlight. NOTE: The transcription of questions and answeres may contain errors, take it all with a grain of salt. For example, in just seconds, I used the Flipper Zero to seamlessly clone the signal of an office RFID badge tucked safely inside my wallet. go to qflipper and connect you’re flipper and click on install from file. $40. I made a video featuring one of the BEST TOOLS EVER CREATED for Flipper Zero: The ESP Flasher too!! Also. The user can access the saved signal and emulate it. hurry buy it all buy everything consume consume consume. scan the fob again. Flipper Zero Official. It could also clone car key fobs on older car systems as well as some garage door openers. RFID. File 2 cannot read without knowing a key (communication setting 3, no output). In the emulation mode, Flipper itself acts as a key and emulates the iButton from the memory. Flipper Zero is a little, toy-like multi-tool with the inquisitive viewpoint of a cyber-dolphin. It's fully open-source and customizable so you can extend it in whatever way you like. 7999 with either device and capture. I have tried a few ways to read and save this card but maybe someone can point me in the right direction. Adrian Kingsley-Hughes/ZDNET. The final product will look the same! A quick comparison of the first sample with th. com. ago. So, while I think the chance of someone reading your card and using it for bad things is small, these cards cost about $4 each, which means they’re cheap and easy-to-use. It's fully open-source and customizable so you can extend it in whatever way you like. I've heard copying credit cards is disabled in the default. (I had the flipper plugged into my laptop to make sure there was enough power. It loves researching digital stuff like radio protocols, access control systems, hardware, and more. NFC hardware. For really playing around with reading/writing cards, you're cheapest option is probably a Proxmark3 Easy clone off Aliexpress or something. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. It can format those tags/cards as well. Below is a library of helpful documentation, or useful notes that I've either written or collected. • 27 days ago. 3D Models!Flipper Zero must not be in "Settings" -> "System" -> "Debug ON", if it is activated, reading any Emulated tags will always fails (tested on the latest stable release 0. and never will. dizkopat 1 yr. Best Flipper Zero Alternatives. The Vulkit RFID blocking card certainly adds a layer of security between you and someone wanting to access your data. should read the tag with 32/32 keys and all sectors in about 5 seconds or so. It is a small, discreet device. An ID for emulation can be added in Flipper Zero in two ways: Read an existing key - saves the key’s ID to an SD card for the desired key to be. Flipper Zero has quite a few antennas built in, with the capacity to read frequency signals from a wide range of cards. Card keys are the most obvious use, but the tricks don’t stop there: the. This format is prefaced by a parity bit, and ends with a parity bit. But I recommend to look for research on cloning smart. I read the NFC card. Popular 125 kHz protocols: EM-Marin, HID Prox II, and Indala Flipper Zero Official. Make sure idk it's legal too, if you clone to cancel but still go or bring other people in on one card maybe reconsider. txt # MacOS sample script │ └── demo_windows. You can copy a dump of the card, sure. Hit the down arrow >> Scroll right or left until. Also, Flipper Zero must be nearby to clone a remote-control signal and extremely close to clone your key fob or security badge. 2. . The Flipper Zero is able to read and emulate RFID / NFC / Infrared etc. . RFID. . It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. Look your for the Big Bounty programs. Flipper Zero — Multi-tool Device for Hackers - KickstarterThe lowest cost, easiest way to quickly copy a simple keycard is to just get one of the RFID card ID copier (also called RFID 125Khz EM4100 ID Card Copier) from Amazon ($27 with free shipping) or eBay ($10. All you need to do is pop it into your wallet or purse, and it's supposed to block RFID reading. In this video, we cover how to:Rapidly read, save and emulate 13. Hello friends, I recently bought my Flipper, I still don't know how to use it very well, I want to clone my garage door control, I don't know if I have to clone it from the remote control, or from the machine, or any idea how to do it. emulate the key using flipper to test to make sure it. This requires either 2 flipper zeros, 2 hackrf ones or 1 flipper zero and 1 hackrf one (my current setup). For NFC cards type B, type F, and type V, Flipper Zero is able to read an UID without saving it. . It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. The Flipper acts like it wants to read the card, because I can see the blue light flashing like it recognizes a RFID Card is present,. I’m pretty sure they are 33 bit and I know 100% they are for a DSX access control system. In fact, it can present a programmable tag, which changes based on the app. Customizable Flipper name Update!Flipper Zero NFC Cards. Even if there is a hidden/secured area at the Bank Card, you can pay with your phone or smartwatch. The ChameleonMini can extract info from card keys and key fobs, including cloning the UID and storing the data for later. I cloned an old hotel key, just to try it. Videos recorded to go viral. Company: TICONN. 108K Members. It's almost like credit card companies have incentives to encrypt their cards such that you can't steal credentials with a $170 piece of equipment. Flipper Zero Official. The target would have to lend the key to the attacker, then go out to lunch or something. Hey, I just got my new flipper, I tried to read my credit card but I every time it shows unknown iso tag. If there's any remote possibility of it being read by the Flipper, the Proxmark3 should be able to read/clone it no problem. Flipper Zero is a portable multi-tool for pentesters and geeks in a toy-like body. 0. Arcade Test: Failed-Groove Coaster 4EX, Machine Flashed Red for flipper but didn't scan. 100%: 4 star: 0%: 3 star: 0%: 2 star: 0%: 1 star: 0%: Add a review. This video is part of the FREE Security+ course covering the SY0-501 AND SY0-601 exams. It is not possible to clone a card with a flipper. I will break this into 3 parts Part 1 - Read and Save the master including the (N)UID and keys Part 2 - Copy and write the keys 🗝 +(N)UID *Check you are writing to a Magic gen1a *Write the (N)UID + *Write the keys Part 3 - Confirm & Compare Clone “Checksum” - NON-ESSENTIAL Part 1 - Read and Save the master + (N)UID READ the. Flipper Zero Official. tgz file. Hey, I just got my new flipper, I tried to read my credit card but I every time it shows unknown iso tag. Connect your Flipper Zero to your computer via a USB cable. • $100 - 200 = antennas. It can disable Chip&PIN and predict AMEX card numbers with 100% accuracy. Three simple hacks showcase Flipper Zero's capabilities via radio signal communication and other means. I measured antenna patterns (EIRP and TRP) for my Flipper zero in my lab's RF anechoic chamber. If having physically the card can help to Make it working i can Always sens it one. Flipper Zero can read, clone, store and then emulate the 125kHz credentials with ease and has no trouble doing the same to 13. I bought one a few months ago out of curiosity and sure enough, it perfectly clones ID badges to enter the office and gets me in the door. Plus, you might be able to find a card that at least resembled what you're trying to clone, instead. 5 star: 100. It's fully open-source and customizable so you can extend it in whatever way you like. When prompted by the terminal, the card uses one. With your Flipper Zero, you can generate various NFC cards that can be programmed as keys in access control systems or write various data onto them using. have you tried using both the NFC and RFID scanning apps on the flipper, did either of them produce an output. Flipper Zero is designed with a variety of antennas that enable it to capture, store, replicate, and imitate wireless signals, interacting with a multitude of signal types: Commonly found in bank cards and building access cards. There are no payment tokens or copy-fees. Sending signals. There's probably a few houses that still have them. Maybe a replay in time would be successful. It loves to hack digital stuff around such as radio protocols, access control systems, hardware and more. It's fully open-source and customizable so you can extend it in whatever way you like. Yes you can you can either use an app called nfc tools or you can use and scroll down to find nfc.