I got a great seat on the main floor for the first big DEFCON 22 talk which is a welcome to the con and discussion of the badge hardware. [LosT], the creator of this year’s badge, started the discussion with a teaser about the badge… there’s a phone number hidden as part of the challenge. [LosT] took a call from someone chasing the puzzles. The guy was in the audience which was pretty fun.
The process of building a puzzle that can be solved at DEFCON is really tough. How do you make it just hard enough that it won’t get pwned right away but easy enough that a large number of attendees will be able to figure it out during the weekend? The answer is to build a secure system and introduce strategic flaws which will be the attack vectors for the attendees solving the badge challenge.
Of course the badge can be used as a development platform. The populated electronics on the board all have these nice little footprints which can be cut to disconnect them from the chip. The breakout headers on either side of the board allow you to connect headers for your own uses. Great idea!
The back of the lanyards have special characters on them too. This encourages community at the conference. To solve the puzzle you need to find others with different lanyards. Compare the glyphs and crack the code (so far I have no clue!!).
Know what I’m doing wrong? Have suggestions on where to go from here? I’ll be checking the comments!
It took a measly 2-hours in line to score myself entry to DEFCON and this nifty badge. I spent the rest of the afternoon running into people, and I took in the RFIDler talk. But now I’m back in my room with a USB cord to see what might be done with this badge.
First the hardware; I need a magnifying glass but I’ll tell you what I can. Tere are huge images available after the break.
- Parallax P8X32A-Q44
- Crystal marked A050D4C
- Looks like an EEPROM to the upper right of the processor? (412W8 K411)
- Something interesting to the left. It’s a 4-pin package with a shiny black top that has a slightly smaller iridesent square to it. Light sensor?
- Tiny dfn8 package next to that has numbers (3336 412)
- Bottom left there is an FTDI chip (can’t read numbers)
- The DEFCON letters are capacitive touch. They affect the four LEDs above the central letters.
I fired up minicom and played around with the settings. When I hit on 57600 8N1 I get “COME AND PLAY A GAME WITH ME”.
Not sure where I’m going from here. I don’t have a programmer with me so not sure how I can make a firmware dump. If you have suggestions please let me know in the comments!
Continue reading “Hands-On DEFCON 22 Badge”
[Andrew] just finished his write-up describing electronic conference badges that he built for a free South African security conference (part1, part2). The end platform shown above is based on an ATMega328, a Nokia 5110 LCD, a 433MHz AM/OOK TX/RX module, a few LEDs and buttons.
The badges form a mesh network to send messages. This allows conversations between different attendees to be tracked. Final cost was the main constraint during this adventure, which is why these particular components were chosen and bought from eBay & Alibaba.
The first PCB prototypes were CNC milled. Once the PCB milling was complete there was a whole lot of soldering to be done. Luckily enough [Andrew]’s friends joined in to solder the 77 final boards. He also did a great job at documenting the protocol he setup, which was verified using the
open source tool Maltego. Click past the break to see two videos of the system in action.
Continue reading “Building a Mesh Networked Conference Badge”
I’ve arrived at the Rio Casino in Las Vegas, Nevada for DEF CON 21. Over the next couple of days, I’ll be talking about what I get up to here.
The main event today is registration, which means getting a neat badge. This year’s badge was designed by [Ryan Clarke]. According to the DEF CON booklet, they are “non-electronic-electronic” badges this year, and DEF CON will be alternating between electronic badges every other year.
The playing card design is printed on a PCB, and uses the silkscreen, solder mask, and copper layers to provide three colors for the artwork. The badge is a crypto challenge, featuring some cryptic characters, numbers, and an XOR gate. I don’t have any ideas about it yet, but some people are already working hard on cracking the code.
Tomorrow, I’ll be heading to a few talks including one on hacking cars that we discussed earlier, and one on decapping chips. I’ll also be checking out some of the villages. The Tamper Evident Village is premiering this year, and they’ll be showing off a variety of tamper proofing tech. I’ll also try to get to the Beverage Cooling Contraption Contest, where competitors build devices to cool beverages (ie, beer) as quickly as possible.
If you have any DEF CON tips, let me know in the comments.
Take a look at this sexy piece for open hardware. It’s what you’ll be wearing around your neck at the Open Hardware Summit this year. WyoLum teamed up with Repaper for the display and Seeed Studios for the boards.
It’s called the BADGEr and it’s both an Arduino and and Arduino shield. There are several different power options; coin-cell, microUSB, unpopulated barrel jack, or the lanyard terminals if you want to wear the power supply around your neck. You can see the five momentary push buttons see above, but on the back you’ll find the microSD card slot along with a power switch for preserving the coin cell.
Check out the video below for a quick look. In addition to acting as your credentials the conference schedule comes preloaded. And of course, this is an Open Source design so you can dig through schematic, board artwork, and code at the page linked above. Oh, and the first hack has already been pulled off. Here’s the badge reading Crime and Punishment.
Speaking of conference badges, DEF CON starts this week. Hackaday writer [Eric Evenchick] will be there and we hope he has a chance to look in on some of the badge hacking at the event.
Continue reading “2013 Open Hardware Summit badge includes ePaper display”
[Dynotronix] wrote in to share the news that he won the 2013 LayerOne badge hacking contest. In addition to the good news he included a description of his badge hack.
We got a good look at the hardware included on the badge several days ago. You may remember that it’s outfitted with footprints for 48 LEDs around the perimeter which are driven by two ICs. Looking at the image above it’s hard to miss the fact that [Dyno] didn’t populate any of that. He went right for the power of the XMEGA processor to analyze and generate signals.
But what specifically can you do with the signal this thing generates? Turns out a rather simple circuit can make it into a transmitter. [Dyno] concedes that it’s a remarkably finicky setup, but just a few components on a scrap of copper clad turned this into an FM transmitter. Check out the video where you can hear the sweeping alarm-type sounds pushed to an FM radio via his voltage controlled oscillator circuit which has a range of about fifteen feet.
Continue reading “2013 LayerOne badge hacking contest winner”
The LayerOne security conference is fast approaching and [charliex] is doing his best to put the finishing touches on this year’s conference badge.
Around the perimeter of the badge is 48 LEDs driven by two LED drivers. This allows for some crazy hardware hacking to create anything from a TV-B-GONE to a bulbdial clock. There’s also a few extra switches and sensors that can be hacked to do some interesting things, but where this badge really shines is the addition of an OLED display, allowing it to transform into an XMEGA Xprotolab, a small oscilloscope, spectrum analyzer, and frequency generator. Yes, this badge can be hacked, but it’s also a tool for hacking.
There’s an impressive amount of work that went into this badge, a feat even more impressive given the fact that the LayerOne conference is this weekend and the PCBs for these badges won’t arrive until tomorrow. We’ll be the first to say we’re masters of procrastination, but [charliex] really cut it close here.