This Dolphin experimenter's board for the Flipper Zero provides a neat and clean way to do testing and development on the Flipper Zero
Designed by KecTronix in United States of America
Buy with confidence.
Our Tindie Guarantee protects your purchase from fraud. Learn More
PRICE REDUCED!!! Dolphin experimenters kit for Flipper Zero NOW INCLUDES Flipper Zero - SubGHz Dorsal Q433RT daughterboard What's included in the kit: Version 1.4 of the Dolphin Flipper Zero experim…
Read More…What's included in the kit:
==============================================================================
The Wi-Fi Modules area
NRF24L01 area
I2C area
Breadboard area.
The breadboard area resembles a standard breadboard but it is tailored a bit to the Flipper Zero; instead of five rows on each side it has three (space limitations), instead of power rails on each side it has all 15 pins from the Flipper Zero on each side.
There are three, 4-pin headers toward the bottom of the breadboard area with 5v-GND-3.3v-GND.
In this breadboard area, a person will be able to test many different devices, for example an I2C device with a pinout that's not available in the I2C area.
Instead of having a device hanging off of wires coming out of the Flipper Zero, the device can be plugged into the breadboard area and it will all be contained on the Dolphin board.
For many cases instead of running jumper wires from the Flipper Zero to an external breadboard, it can all be done on the Dolphin breadboard area and be portable at the same time.
Some items that the breadboard area will not accommodate are the ESPxx Devkit type modules because they're so wide. BUT, one row pins on these modules can be plugged into the breadboard and the floating row of pins can be jumped to any required signals with the standard DuPont type jumpers (included). In this way the module is secured on the Dolphin board and not dangling from wires hanging out of the Flipper Zero. See photos for an example. The photos show a WROOM module plugged into the breadboard area. The WROOM will actually plug directly into the Dolphin board with no jumper wires. But if you had another variation of a wide module, that is how you could use it on the Dolphin board.
For simple breadboard projects the DuPont type jumper wires are included, but for a nice-and-tidy setup the standard 22 gauge breadboard jumpers can be used (not provided but recommended). One roll of 22 gauge solid core wire will make a bunch of breadboard jumpers.
As with any breadboard there are many possibilities.
The breadboard area is also ripe for custom add-on modules, one of which will be released very soon
Other features include:
==============================================================================
Following are usage tips for testing particular to the Dolphin board and included modules.
Only tests that are particular to this board and included modules are discussed. In general, if anyone is having problems with a particular application, support requests should be directed at the developer of the application or perform an Internet search for the problem. The Flipper Zero apps and third party firmwares have a lot of idiosyncrasies.
When plugging anything into the Dolphin board double check to be sure the pins are in the correct location. It's easy to be off by a pin or two or get something backwards if not paying attention. I haven't fried a Wi-Fi board yet but had one plugged in backwards with no damage. I did fry an i2c device, more on that later.
The Dolphin board is clearly marked where the Wi-Fi modules are to be installed, be sure to have the antenna end of the modules to the right of the Dolphin board where the antenna symbol is. Be sure to line up the far right pins to the far right pin hole.
Wi-Fi Deauth
To use the WEMOS D1 Mini (included) or the ESP8266 Devkit (not included) for deauth testing you need to use the Deauther “V2” app and RogueMaster firmware (or other firmware compatible with the Deauther V2). https://github.com/Timmotools/flipperzero_esp8266_deautherv2
The V2 version only requires four pins to be connected where the other deauther app requires several more. If you try to run other than the V2 app and get, "insert the board", then you know you didn't choose the V2 app. If you installed the V2 app and can't find it or it won’t run, then flash the Flipper Zero with the RogueMaster firmware as I know this works and I think the Deauther V2 app is included in the RogueMaster firmware. I'm constantly switching between firmwares because not all apps work with all firmwares (it can be a pain). Some apps won't even appear where other will be there but won't run. I haven’t looked into why this is. I currently use RogueMaster, Unleashed, and Xtreme firmwares. RogueMaster is my preferred go-to at this time
Wi-Fi Marauder
My experience with Wi-Fi modules.
I deauthed my local Wi-Fi thinking all it would do is interrupt the connections and once the attack was over the devices would simply reconnect like the YouTube videos show. Well, my TV reconnected to my guest network instead of my main network and a couple of days later it took me a while to figure out why I couldn't access my local Plex server. I was asking myself, "Why is the TV connected to guest...?” Oh yeah, I deauthed it. Other devices were kicked offline and I had to manually get them back online, my HP Printer was one of them.
I had to do the Rick-Roll attack, doesn't everyone?
I haven't messed around with the sophisticated features of the Marauder yet.
My experience with the mouse scanner and mousejacker.
I happen to have three older Logitech wireless mice that haven't been patched against the mousejack attacks. If you have any older Logitech wireless mice and you haven't run the Logitech software, then DON'T. The Logitech software will patch the dongle and you won't be able to mousejack it. I don't know if it does it on its own or if you have to tell it to patch it. All Microsoft branded mice that are vulnerable will be patched as soon as they're plugged into a Windows machine.
When you run the sniffer, the mouse and dongle need to be communicating, I just keep moving the mouse until the sniffer picks up the address. Once it has an address it stores it in a file, then you use mousejacker, which should use that stored address file to list the addresses to choose from. Then you choose which Bad USB script to send over the air. This method worked for me and I think it’s the way it’s meant to be done. When my wife was using my computer I attacked it using one of the scripts that will text-to-speech whatever text you type into the script, I did it again when company was here using that computer. Pretty funny! Be careful as there are some nasty scripts. Read the scripts before you run them! Several of the scripts I can't really tell what they are doing so I don't even think about trying to run them. Several of them access the internet to download files, I don't want to find out what those files do even though they have seemingly innocent names.
What I found during my testing is that the addresses for the mouse and the dongle end in the same characters, when you choose an address be sure it's the address of the dongle and not the mouse. I don't know if it's true for all mice, but it bit me once and I couldn't figure out why I couldn’t mousejack a certain address that had previously worked; I had selected the wrong address because I was only referring to the last characters of the address.
The I2C area has 6 rows of pinouts and you can get 12 different pinout combinations by having pin 1 on the right or left. I've had three I2C devices plugged into this area at one time. There are also a couple of combinations that are vertical. Study the diagram on the Dolphin in the I2C area and you will see how that works. For instance, the top row is labeled VGDC, that means the far left pin of that row is +V, so from left to right it's +V, GND, SDA, SCL. If you have an I2C device with that order of pins you use that row, and so on. If you have a device that doesn't match any of the rows, then you can plug it into the breadboard area and use jumper wires from one of those rows or from one of the 15 pin Flipper signal headers in the breadboard area. If you have a QWIIC or STEMMA device then that is pretty straight forward and you plug the cable into the appropriate connector.
With I2C it's required to have the SCL and SDA lines pulled high by resistors to VCC. Some devices have on board pullups and some don't. It's only required to have one pullup on each line no matter how many devices are on the lines. If you have several devices on the lines and they all have pullups, it could cause issues where they can't be pulled low enough by a device and thus not be able to communicate. On some devices you can unsolder a jumper to disable the pullups. If you have a single device or several devices attached with no pullups or the pullups are disabled, then place the "i2c 10K PULLUP" jumper across the pins.
A word of caution about I2C voltage selection: Be sure “all” connected devices are 5 volt if you have the VCC selector on 5 volts. The supplied AHT10 can work on either 5v or 3.3, the HTU21D is 3.3V only.
I semi-fried an AHT10 device from plugging it into the correct row but had it backwards. It still worked but got REALLY hot, it read correctly at first but it got so hot it skewed the temperature. I fixed that module by removing all the SMD components that had to do with switching between 5V or 3.3V, then soldered jumper wires to complete the connections. That particular device is now 3.3V only.
You can have both of the included temp sensors plugged in at the same time if the headers are soldered so they extend out the bottom of the module. They will then plug into the top two rows facing away from each other.
The following link is the app I like best for these temperature/humidity sensors as it will display them one at a time or all at once if you have more than one connected: https://github.com/quen0n/unitemp-flipperzero. Thanks to "quen0n" for that app.
Just to be safe, unplug all other devices/modules when using the HC-SR04. When this device is plugged into the dedicated header with only 3.3V from the Flipper and 5V not yet turned on, a small voltage, about 2.5V, is leaked out its 5V pin and the 5V LED on the Dolphin board lights up a little bit. I verified that it is the sensor and not something wrong with the Dolphin board. Pin 13 & 14 coming out of the Flipper are pulled high to 3.3V and HC-SR04 device somehow feeds that back out through its 5V pin.
This module is pretty easy to setup, plug the module into the dedicated header at the top of the Dolphin board with the transducers pointing away from you, +5V on the right. Go to the GPIO main menu on the Flipper Zero and turn on 5V then run the app.
==============================================================================
==============================================================================
No country selected, please select your country to see shipping options.
No rates are available for shipping to .
Enter your email address if you'd like to be notified when Flipper Zero - Dolphin Experimenters board. can be shipped to you:
Thanks! We'll let you know when the seller adds shipping rates for your country.
Shipping Rate | Tracked | Ships From | First Item | Additional Items |
---|---|---|---|---|
:
|
For shipping outside the US, send us an email.
Buy with confidence.
Our Tindie Guarantee protects your purchase from fraud. Learn More
$32.50
Free Shipping!
$3.00
Free Shipping!
$13.80
Free Shipping!
$75.00
Free Shipping!
By clicking Register, you confirm that you accept our Terms & Conditions
We recognize our top users by making them a Tindarian. Tindarians have access to secret & unreleased features.
We look for the most active & best members of the Tindie community, and invite them to join. There isn't a selection process or form to fill out. The only way to become a Tindarian is by being a nice & active member of the Tindie community!