Sega controller houses auto-launch emulator


[Joe’s] wife grew up playing Sega games and he wanted to help her unwind by reliving the experience. Since the work computer she uses when travelling isn’t a good place to install emulators he built this plug-and-play emulator inside of a Sega controller.

We’ve seen this type of thing a few times before (even with XBMC in a SNES controller) but there is one thing we hadn’t thought of lately. Newer versions of Windows have auto-launch disabled for USB drives. But [Joe] knew that there were still some USB sticks that manage to auto-launch anyway so he researched how those work. It turns out that they have two partitions, one is formatted as a CDFS which looks like a CD-ROM to Windows and allows auto-launch. He used this method of partitioning a USB stick, storing the ROMs on the mass storage partition and the emulator and the CDFS partition. To finish the hack he cracked open the controller and found room for a USB hub and the PCB from the thumb drive.

If you still have cartridges lying around you can pull the ROMs off of them over USB.

Wifi Pineapple project uses updated hardware for man-in-the-middle attacks

We’ve seen this small, cheap, and powerful WiFi router before. But this time it’s up to no good. [Andy] used a TP-Link WR703N to build an upgraded WiFi Pineapple hacking tool.

A WiFi Pineapple is a device spawned years ago by the Hak5 team (here’s a clip showing off the device). It uses a WiFi router that will answer to any SSID request. Basically if your computer or smart phone has an AP SSID saved and broadcasts a request to connect the pineapple will pretend to be that device and start the handshake. This provides the chance to sniff all the data passing through in a classic man-in-the-middle attack.

[Andy] is recreating the device but at a rock bottom price. He picked up this router for about $20 and added an $8 USB drive to it. The only other thing you would need is a power source and a way to hide the hardware. The code used in the Hak5 version is available for download and that’s what he worked on after flashing OpenWrt to the device.

[Thanks Midnite]

Chromebook hack controls your television


[Michael Kohn] only accomplished about half of what he set out to, but we still think his TV channel switcher from a Chromebook turned out nicely. When starting the project he wanted to include a grid of listing so that he could choose a specific program, but decided that scraping the data was too much work for this go-round.

The Chromebook doesn’t include an IR transmitter so he built one using an MSP430 chip. He had previously built a little transmitter around an AVR chip and was surprised to find that the internal oscillator on that was quite a bit more accurate than on the MSP430. Timing is everything with the Manchester encoded signals used for IR remote controls so he used his oscilloscope to tune the DCO as accurately as possible.

The app shown on the screen was written in Javascript. Google published some example code on using RS232 with the computer; [Michael] used this resource to provide communications between the computer and the microcontroller.

Continue reading “Chromebook hack controls your television”