Stealth Decoy Reader

Regular price
€375.00
Sale price
€375.00
Regular price
€0
Sold out
Unit price
Quantity must be 1 or more

THE PROBLEM

Extracting RFID & Keypad credentials via spliced implants is a well-known technique. However, these tools are rarely used in professional audits: installations are slow and complicated, and damage to wiring, hardware and infrastructure are rarely authorised in Scope of Engagement documents.

The implants themselves have limited functionality and protocol support, and only provide the "capture" part of an RFID Audit lifecycle. The analysis and cloning of a captured credential requires multiple manual steps, tools and skills.

THE SOLUTION

Imagine walking into an audit, placing an access control reader on a wall and instantly collecting credentials. Your phone gives you real-time notifications of skimmed badges and PIN codes, and directly writes a clone badge with your Proxmark.

You don't need a computer, you don't need to damage client property, you don't need to memorise arcane Proxmark commands. Everything is taken care of. When the audit is over, you've got a timestamped log of all operations, ready for export into a report. Your time and skills are spent on the audit, instead of the tools.

You've just imagined the Stealth Decoy Reader platform, a next-generation, non-destructive credential capture system designed specifically for red-teamers and pentesters. The Stealth Decoy Reader is an open-source, battle-tested hardware module built to collect and exfiltrate all known corporate access-control protocols and PIN codes.

Even better, the Stealth Decoy Reader is available pre-installed inside the most common access control readers for perfect camouflage. The readers come equipped with non-destructive mounting systems, ready for rapid placement in public areas, choke points, doorways, cabinets, etc.

Rapid deployment during public access

Credential capture

Instant notifications and credential management

One-click cloning via Proxmark 3

The Stealth Decoy Reader Platform covers the full RFID pentest life-cycle:

  1. Capture: Rapidly deployed, instant multi-factor credential skimming
  2. Control: Manage multiple devices, analyse, save, tag and exfiltrate captured credentials via the cross-platform WebUI.
  3. Clone: Emulate, clone and write captured credentials directly from the UI via Proxmark 3. One click & wireless: No command lines, no code.
  4. Access: Gain and escalate access via cloned RFID.

MULTI-PROTOCOL

Supports all corporate RFID and keypad protocols, including HID & Wiegand, iCLASS, Indala, Paxton..

UNDETECTABLE

Physical switch to deactivate WiFi for undetectable installation, NAC evasion, and reduced RF exposure.

NON-DESTRUCTIVE INSTALLATION

No need to remove readers, crimp cables or damage client hardware. Deploy and remove in seconds.

PROFESSIONAL TOOL & SUPPORT

Built by pentesters based on real-world requirements: modern hardware, software and frequent updates.

POWERED BY STEALTH

Inside every Stealth Decoy Reader is a Stealth Decoy Module - the high-performance, multi-protocol, wireless equipped RFID capture, analysis and cloning device. It works hand-in hand with the Doppelgänger Assistant, a cross-platform professional GUI application designed to handle every possible operation requirement.

Together, they allow for automated card capture and wireless credential exfiltration. Teams can collaborate and share credentials; credentials can be analysed, exported or cloned.

The Doppelgänger Assistant also works as a easy-to-use UI for the Proxmark 3, making credential writing, cloning and verification a one-click operation. Don't miss opportunities because of knowledge gaps or constrained time: the Doppelgänger Suite is a results-oriented system for complete RFID audits.


  • 1
  • 2
  • 3
  • 4
  • 4

1. REAL HARDWARE

Legitimate readers with the Stealth Decoy Reader modules embedded inside are indistinguishable from your client's existing readers.

2. MULTI-FACTOR CREDENTIALS

Skim RFID and matching PIN credentials simultaneously. Handles all corporate protocols, including iCLASS SE/SEOS/SR.

3. NEVER MISS A CREDENTIAL

Support for all major corporate RFID systems. Frequent firmware and software updates. Never miss a credential.

4. NO RISK, NO DAMAGE INSTALLS

No risky, lengthy or destructive installation or hardware modifications required. Deploy in seconds. Runs on internal power.

5. BUILT FOR DISCRETION

Credential capture is silent, and can trigger notifications, SMS or emails. Hardware switch to disable all RF emissions.

FIELD-READY WORKFLOW

Unlike traditional approaches for RFID audits, the Stealth Decoy Reader system provides a full end-to-end workflow for RFID audits. What previously required highly technical knowledge, complicated wiring, fussy tools and unstable software is replaced by an all-in-one device and intuitive, cross-platform software.

Red-teamers and auditors can literally turn on the device, attach it to an appropriate wall / door / cabinet / public choke-point and instantly collect credentials. Captured cards can be detected, analysed and exported to other team-members, or effortlessly simulated or physically cloned wirelessly via a Proxmark - the included Doppelgänger Assistant handles everything.

The Long Range Reader and Doppelgänger ecosystem covers every step of an RFID Audit: acquisition, exfiltration & analysis, duplication and access / escalation.


  • 1
  • 2
  • 3
  • 4

1. MULTI-FACTOR ACQUISITION

Capture RFID & PIN Credentials, silently. Rapid deployment. No wiring or complex setup required. Turn on, drop and go.

2. CROSS-PLATFORM UI

Get instant notifications of captures, across multiple readers. Share readers and card data in real-time with colleagues.

3. PROXMARK3 INTEGRATION

Instantly emulate or clone captured credentials via the Proxmark 3 directly via the UI. No commands, no code, no wires.

4. FIELD-TESTED RESULTS

The Stealth Decoy Reader system is purpose-built by professional red-teamers to be results oriented. RFID Audits just got better and easier.

AVAILABLE MODELS & TECHNICAL DETAILS

Every major corporate reader is available - simply take the unit that your client uses for undetectable credential harvesting. Devices ships preconfigured with your choice of integrated reader hardware. For convenience, we have a product selection assistant to help you determine which model / device you require.

Available Models
Model Type Protocols
HID multiCLASS SE RP40
HID multiCLASS SE RP40
RFID
RFID+Keypad
HID iCLASS Legacy
HID iCLASS SE/SEOS/SR
MIFARE Classic (via SE)
MIFARE DESFire
HID Prox, AWID, EM4102, T5577
HID Signo 20TKS
HID Signo 20KTKS
HID Signo 40TKS
HID Signo 40KTKS
RFID
RFID+Keypad
HID iCLASS Legacy
HID iCLASS SE/SEOS/SR
MIFARE Classic (via SE)
MIFARE DESFire
Indala
HID Prox, AWID, EM4102, T5577
Paxton P75
Paxton PK75
RFID
RFID+Keypad
Paxton Net2

The stand-alone module is compatible with all the above protocols and authentication methods.

Technical Specifications
Feature Notes
UI Cross Platform App / WebUI
Integration Integrates with Proxmark3 RDV4.
One-click cloning and emulation.
Wireless operation via Blueshark.

BACKED BY REAL-WORLD TRAINING & CERTIFICATION

Beyond the professional support, highly-detailed documentation and active development - real-world training is available for all PPE products. Covering comprehensive product learning to in-the-field assignments simulating the toughest operating conditions, for individuals and teams.

On-site training is available in the US, Europe and the UK. For more information, please contact support@lab401.com

What's included

  • Access Control Hardware of choice
  • Stealth Decoy Reader (preinstalled)
  • PPE 3.7V 1800mAh LiPo battery
  • PPE Stealth Card
  • HID iCLASS 2k card (HID Variants Only)
  • T5577 card
  • Magnetic mounting plate
  • Hook-and-pile mounting strips

The "Module + Battery Only" variant includes:

  • Stealth Decoy Reader (preinstalled)
  • PPE 3.7V 1800mAh LiPo battery

Recommended Accessories

Go to full site