We’re sure that some of our readers are familiar with the difficult task that debugging/sniffing nRF24L01+ communications can be. Well, [Ivo] developed a sniffing platform based on an Arduino Uno, a single nRF24L01+ module and a computer running the popular network protocol analyzer Wireshark (part1, part2, part3 of his write-up).
As these very cheap modules don’t include a promiscuous mode to listen to all frames being sent on a particular channel, [Ivo] uses for his application a variation of [Travis Goodspeed]’s technique to sniff Enhance Shockburst messages. In short, it consists in setting a shorter than usual address, setting a fix payload length and deactivating the CRC feature. The Arduino Uno connected to the nRF24L01+ is therefore in charge of forwarding the sniffed frames to the computer. An application that [Ivo] wrote parses the received data and forwards it to wireshark, on which can be set various filters to only display the information you’re interested in.
Not wanting to wait for Apple to step up their game and complete their purchase of Beats headphones, [Carnivore] decided he wanted his own pair of Apple-compatible Beats cans with Bluetooth. He created something that will probably be for sale in the Apple store come Christmas: a pair of Beats Pro headphones with Bluetooth and a Lightning connector for charging.
[Carnivore] liked the sound of his Beats Pro headphones but hated the wires. After disassembling the headphones, he carefully rewired the speakers with smaller gauge wire, added a small Bluetooth module and battery, and sealed everything back up.
There are a few interesting bits to this build – by getting rid of all external wires, [Carnivore] was left with a few holes in the headphones. These were a perfect place to add a 3D printed mount for the power button and the Lightning adapter taken from an Apple Lightning extension connector.
Thanks [Tony] for the tip!
With a simple $35 dongle that plugs right into your TV, it’s possible to enjoy your favorite TV shows, YouTube channels, and everything else Chromecast has to offer. Being a WiFi enabled device, it’s also possible to hijack a Chromecast, forcing your neighbors to watch [Rick Astley] say he’s never going to give you up.
The rickmote, as this horrible device is called, runs on a Raspberry Pi and does a lot of WiFi shennaigans to highjack a Chromecast. First, all the wireless networks within range of the rickmote are deauthenticated. When this happens, Chromecast devices generally freak out and try to automatically reconfigure themselves and accept commands from anyone within proximity. The rickmote is more than happy to provide these commands to any Chromecast device, in the form of the hit song from 1987 and 2008.
Video demo of the rickmote below, along with a talk from ToorCon describing how the hijacking actually works.
Continue reading “Hijacking Chromecast With The Rickmote Controller”
In a fit of desperation, I turned to data mining tools and algorithms, but stepped back from the horror of that unspeakable knowledge before my mind was shattered. That way madness lies.
Wise words. Wise words, indeed. Who among us hasn’t sat staring into the abyss of seemingly endless data without the slightest clue to what it means or even how to go about figuring out what it means? To literally feel the brain damage seeping in as you start to see ‘ones’ and ‘zeros’ reach out to you from every day electronic devices…like some ghost in the wires. But do not fear, wise hacker! For we have good news to report! [Rory O’hare] has dived into this very abyss, and has emerged successful.
While others were out and about playing games and doing whatever non-hackers do to entertain themselves, [Rory O’hare] decided to reach out and grab some random wireless signals for a little fun and excitement. And what he found was not just a strong, repeating signal at 433Mhz. Not just a signal that oozed with evidence of ASK. What he found was a challenge…a mystery that was begging to be solved. A way to test his skill set. Could he reverse engineer a signal by just looking at the signal alone? Read on, and find out.
[John Petersen] created a very cool piece of wearable technology for him and his son. Eager to explore the Maker Fair, but not eager to lose his son in the crowds, he’s come up with the Seeker Hat — a kind of auto-locating GPS hat which always points towards the other.
It’s a clever setup that makes use of a GPS module, a microprocessor, a xBee wireless chip, a compass, and LEDs to light the way. The GPS determines the hat’s approximate location, the xBee transmits it to the other hat, the digital compasses determine the directions of both hats, and the microprocessor figures out the azimuth, resulting in a difference in trajectory of the two — a strip of LEDs, like landing lights, direct you in the right direction.
Continue reading “Seeker Hats Find Each other With Directional LEDs”
[Texane] had been thinking about how to monitor the state of his garage door from a remote place. The door itself isn’t around any power outlets, and is a few floors away from where his server would be located in his apartment. This presented a few design challenges – namely, the sensor itself should have a wireless connection to the server, and being low power would be a great idea. This led to the development of a minimalist framework for wireless communication that allows a sensor to run for weeks without a battery swap.
The wireless protocol itself is based on a simple key value pair; each individual sensor, coupled with a NRF905 radio, has passes an address, a key, and a value. There are allowances for checksums and acknowledgement, but as the PDF says, this is a very minimal protocol.
With the software out of the way, [Texane] turned to the hardware. The microcontroller is a simple Arduino clone, paired with a radio and a coin cell on a small board. The micro spends most of its time in a low power state, with the sensor, in this case a reed switch, tied to an interrupt pin.
There was a problem with the power consumption of the radio, though: when the short 17-byte message was transmitting, there was a significant voltage drop. This was okay with a fully charged battery, but with a partially drained coin cell, the possibility of brownouts was high. A big cap in parallel was enough to offset this voltage drop.
It’s still a little expensive for an all-in-one home automation and monitoring system, but developing a functional wireless protocol and the hardware to go with it is no small feat. It’s actually a great piece of kit that [Texane] is sure to find a few uses for.
Many technologies that come about for one type of product make us want to extend it to other things. For instance, we’d like the ability to remotely unlock our front door when it’s raining or our hands are full. Once [MS3FGX] experienced Qi wireless charging with his Nexus 5, he wanted the ability to wirelessly charge all the things. The first gadget on the list was his Nook Simple Touch eReader, which he successfully retrofit with a Qi receiver.
Space is at a premium inside of most modern technology. As it turns out, there is a burgeoning market for shoving inductive charging receivers into things. [MS3FGX] decided to try a Qi receiver meant for a Samsung S3, and it actually fits very well behind the battery. He glued it down and then cut a channel in the battery tray for the wires.
[MS3FGX] went full hack with this one and wired it to the Nook’s USB port on the inside. He would have preferred a thinner wire, but used some from a 40-pin IDE cable with little trouble. After the operation was complete, he put it on the Qi pad and it started charging right away. To his delight, the battery increased 20% after an hour. And yes, he can still charge the Nook the traditional way without any issues.
If you want to add wireless charging to any phone cheaply and easily, we’ve got you covered.