doc/standalone/hf_bog.md
Author: Bogito Frequency: HF (13.56 MHz) Hardware: RDV4 (requires flash memory)
Back to Standalone Modes Index | Source Code | Development Guide
An enhanced ISO14443A sniffer that specifically extracts and stores ULC, ULEV1, and NTAG authentication passwords from sniffed traffic.
Many MIFARE Ultralight deployments use password authentication (PWD_AUTH) to protect data. By sniffing the communication between a legitimate reader and card, you capture the authentication passwords in plaintext. This is more targeted than generic sniffing — it automatically extracts and logs just the passwords.
hf_bog.log on flash| LED | Meaning |
|---|---|
| A (solid) | Sniffing activity |
| Action | Effect |
|---|---|
| Short press | Stop sniffing, save auth data to flash |
stateDiagram-v2
[*] --> Sniffing : Startup
Sniffing --> Sniffing : Parse frames\nExtract auth attempts
Sniffing --> SaveAuth : Button press
SaveAuth --> [*] : Saved to hf_bog.log\n(up to 64 auth attempts)
hf_bog.logmake clean
make STANDALONE=HF_BOG -j
./pm3-flash-fullimage