Imagine a security consultant named Maya. She arrives at a client’s office for a physical penetration test.
: As you use the device to clone cards or analyze remote signals, your dolphin levels up in specific "Skill Trees"—Sub-GHz Mastery, NFC Wizardry, or GPIO Tinkering. A Day in the Life with FX2
: She uses the FX2’s enhanced NFC reader to discreetly sniff the frequency of the building’s badge system from a few inches away. The Analysis : Within seconds, the identifies the legacy protocol and suggests a clone.