Signals Defense With Faraday Bags & Flipper Zero, (Tue, May 16th)

Nikola Tesla, with his equipment EDIT
Nikola Tesla, with his equipment EDIT

There are situations where it is desired to block signals between devices. Commonly scenarios are when traveling, in a location of uncertain safety, or otherwise concerned with data privacy and geolocation. I was curious how well a faraday bags and similar products protected wireless communications. A more common purchase these days are wallets that can help to protect against RFID skimming of credit card data [1].

Here were the scenarios tested using some faraday bags (Haftigts) [2]:

Wireless Communications Scenario / Device
125 kHz RFID HID proximity card, read with Flipper Zero
HID proximity fob, read with Flipper Zero
NFC Credit Card, read with Flipper Zero
Bluetooth Phone in bag and bluetooth earbuds
WiFi (802.11) Phone in bag used as hotspot, laptop connected to hotspot
Celluar Phone in bag, another cellular phone used to call it

Extensive testing was done done using a variety of faraday bags and devices.

Scenario Testing Process
HID proximity card HID proximity card placed into bag
Bag closed and sealed
Flipper Zero placed on top of bag over card location
Flipper Zero used to read 125 kHz RFID data
HID proximity fob HID proximity fob placed into bag
Bag closed and sealed
Flipper Zero placed on top of bag over card location
Flipper Zero used to read 125 kHz RFID data
Credit Card Credit card placed into bag
Bag closed and sealed
Flipper Zero placed on top of bag over card location
Flipper Zero used to read NFC data
Bluetooth iPhone connected to iPods via Bluetooth
iPhone playing audio content
iPhone placed into bag
Listened for audio disruptions
WiFi (802.11) Android phone with hotspot turned on
Windows device connected to hotspot
Continuous ping set to %%ip:8.8.8.8%%
Android phone placed into bag
Ping reviewed for disruptions
Cellular iPhone placed into bag
Android phone used to call iPhone

The results for these different tests were pretty quick. For the Flipper Zero tests, either the data could be read or it couldn’t. For bluetooth and wifi, it was just waiting to see how the signal changed. Now for the results:

Scenario Result
HID proximity card Fail
(Flipper Zero was able to read the data)
HID proximity fob Fail
(Flipper Zero was able to read the data)
Credit Card Success
(Flipper Zero was unable to read the data)
Bluetooth Limited Success
(Audio signal cut in and out, heavily impacted by proper sealing of the bag)
WiFi (802.11) Success
(Wireless network was quickly disconnected and unable to be seen from mobile hotspot feature)
Cellular Success
(iPhone was unable to receive phone call, Android phone was directed straight to voicemail)

From the testing, there were a few takeaways:

  • Test to make sure your protections are effective
  • Make sure to follow instructions – Bluetooth audio was very functional with a partially closed bag
  • When in doubt, turn off features, or devices, if not needed and when in a space of uncertain safety

For some of these attacks, someone would need very close proximity to complete a successful attack. In the case of testing using the Flipper Zero, the reader was physically sitting on top of the bag and that would be much more challenging for someone to do in a real world situation.

[1] https://www.zdnet.com/article/do-rfid-blocking-cards-actually-work-my-flipper-zero-revealed-the-truth/
[2] https://www.amazon.com/dp/B0BHSH8BLR?ref=ppx_yo2ov_dt_b_product_details&th=1


Jesse La Grew
Handler

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

(Post Note – a picture of a Faraday Cage would have been ideal, however this (doctored) image invokes the thought behind these tests)

Photo:

Title
English: Nikola Tesla, with his equipment
First the machine’s huge sparks were photographed in the darkened room, then the photographic plate was exposed again with the machine off and Tesla sitting in the chair. In his Colorado Springs Notes Tesla admitted that the photo is false:

“Of course, the discharge was not playing when the experimenter was photographed, as might be imagined!”
Author

Photographer: Dickenson V. Alley

Restored by Lošmi
Date December 1899
Other versions
Experiment to illustrate the capacity of the oscillator for producing electrical explosions of great power.jpg
File:Experiment to illustrate the capacity of the oscillator for producing electrical explosions of great power.jpg
This is a featured picture on Wikimedia Commons (Featured pictures) and is considered one of the finest images. See its nomination here.
This image was selected as picture of the day on Wikimedia Commons for 26 May 2021.
Licensing
w:en:Creative Commons
attribution share alike
This file is licensed under the Creative Commons Attribution-Share Alike 4.0 International license.

Reposted from SANS. View original.

Alex Post