​Get in, Get Sexy, Get out


History of the Boscloner

Early 2015

Phillip began to heavily modify the Tastic RFID Thief to better suite his needs as a penetration tester. Many areas where the Tastic fell short, Phillip began to improve upon. As these improvements were made, he achieved a much higher level of success on his physical penetration testing assessments. In early 2015, Phillip began using early prototypes of the Boscloner RFID cloning toolkit.

Phillip worked with an assembly and manufacturing company to create a limit run of 100 units, and began offering pre-orders for the Boscloner board + shield in March 2017 (est. ship date May 2017)

Summer 2015

Development on the Boscloner was finished, and Phillip began using the final Boscloner product on physical penetration testing engagements. The Boscloner has helped clients realize the large vulnerability that using antiquated RFID technology has on their organization. At this point, Phillip decided that the best way to release the Boscloner, was to release it as an open-source product, with full build instructions, and announce the product officially at DEFCON 24. After applying for DEFCON's CFP, the Boscloner was accepted:


Early 2016

Fall 2015

Spring 2018

Utilizing some great feedback from the Boscloner, Phillip has rewritten the Android app and created an all-new iOS app. It's pretty great to be walking into a building with the Boscloner and receiving an Apple Watch notification informing you that a badge has successfully been captured! Both of the rewritten apps work with the v1.5 Boscloner boards, which utilize a new BLE module, rather than the legacy HC-05 Bluetooth 2.0 module on v1.0 boards. 
(If you want to upgrade to the v1.5 boards, let me know, and I'll send you a BLE module free of charge. Requires only a few points to solder!)

The apps give users additional features and the desired stability improvements, give them a look and let me know what you think!


The fantastic team at ACE Hackware and I are proud to announce an exclusive distribution partnership, whereby the Boscloner will be sold exclusively through the ACE Hackware site! This will allow the Boscloner to get in front of more pentesters, more quickly, while allowing the platform to develop further. I am grateful for the friendly folks at ACE Hackware and their commitment to ensuring the Boscloner gets in the hands of more penetration testers for more epic 'war stories'.

Phillip realized that the cost of research began to stunt his progress with creating a newer device, and to raise additional funds, launched a Kickstarter campaign. The campaign was live for less than one week when Kickstarter deemed the project's contents to be "offensive". Kickstarter admitted that they were not comfortable hosting the Boscloner on their site, and cancelled all further progress. This effectively delayed the Boscloner's progress as funds would need to be raised through other means.

Phillip paired with a developer to assist in the creation of the Boscloner shield, the PM3 board, the modified firmware, and the mobile application. The goal was to create completed Bill of Materials (parts list), and to provide tech enthusiasts with complete diagrams for anyone to print their own boards.

Phillip Bosco, a Principal Security Consultant and Security Researcher, was fascinated with Bishop Fox's research on the Tastic RFID Thief tool, which is capable of reading RFID badges from up to three feet away.

After using the Tastic RFID Thief on many penetration tests, a few things stood out to him where there could be room for improvement. Initially, it started as very minor modifications to the Tastic RFID Thief, but ballooned into a new product that streamlined the tasks of a penetration test, from capturing a badge to cloning it instantaneously.