[Andrew] just finished his write-up describing electronic conference badges that he built for a free South African security conference (part1, part2). The end platform shown above is based on an ATMega328, a Nokia 5110 LCD, a 433MHz AM/OOK TX/RX module, a few LEDs and buttons.
The badges form a mesh network to send messages. This allows conversations between different attendees to be tracked. Final cost was the main constraint during this adventure, which is why these particular components were chosen and bought from eBay & Alibaba.
The first PCB prototypes were CNC milled. Once the PCB milling was complete there was a whole lot of soldering to be done. Luckily enough [Andrew]‘s friends joined in to solder the 77 final boards. He also did a great job at documenting the protocol he setup, which was verified using the
open source tool Maltego. Click past the break to see two videos of the system in action.
Continue reading “Building a Mesh Networked Conference Badge”
The LayerOne security conference is fast approaching and [charliex] is doing his best to put the finishing touches on this year’s conference badge.
Around the perimeter of the badge is 48 LEDs driven by two LED drivers. This allows for some crazy hardware hacking to create anything from a TV-B-GONE to a bulbdial clock. There’s also a few extra switches and sensors that can be hacked to do some interesting things, but where this badge really shines is the addition of an OLED display, allowing it to transform into an XMEGA Xprotolab, a small oscilloscope, spectrum analyzer, and frequency generator. Yes, this badge can be hacked, but it’s also a tool for hacking.
There’s an impressive amount of work that went into this badge, a feat even more impressive given the fact that the LayerOne conference is this weekend and the PCBs for these badges won’t arrive until tomorrow. We’ll be the first to say we’re masters of procrastination, but [charliex] really cut it close here.
[nico] just received his credentials for an upcoming conference. On each badge, there’s a 2D barcode with the participant’s bio and contact info. These are meant to be scanned by vendors for future contact. [nico] isn’t so interested in that and plans on updating his personal info by generating a new barcode. To this end, he’s collected a number of links to help out barcode hackers. He used the SWIPE toolkit to identify the format and decode (it has an online component too). There are also several online encoders you can use, like this one from [Terry Burton]. If you’re wondering what sort of shenanigans you can get into faking barcodes, check out [fx]‘s presentation from 24C3.