Check out this 20″ iMac. Notice anything peculiar? Look closely at the branding above the Apple logo. The only thing that tips you off that this iMac is a hacked together unit is that Acer logo on the replacement screen.
As we’ve so often been caught doing, [Flippy] was browsing eBay for deals. It’s a dangerous activity because you end up falling into purchases like an Aluminum iMac for $35. That led to the purchase of a very slim LED LCD monitor to use as the display. It fits perfectly behind the iMac’s glass bezel, which has a tiny chip in the upper right corner that doesn’t bother [Flippy]. It’s thin enough that this actually left room for him to add in the guts of a MacBook Pro which he had sitting in his unused parts pile. With all of the main components accounted for the rest is really just logistics like routing all of the cable connectors and adding openings for USB ports. What he ended up with is a high-end computer for a low-end price.
[Oliver] wiped the hard drive from a Macbook Pro using the ‘dd’ command on another machine. This does a great job of getting everything off the drive, but he was still faced with the EFI PIN lock protection when he tried to put it back into the Mac. You used to be able to clear the NVRAM to get around this issue, but that exploit has now been patched. So [Oliver] set out to use a microcontroller to brute-force the EFI PIN.
You can read his back story at the link above. He had the chance to enter a 4-digit pin before the format process. Now that he’s wiped the drive the code is at least 6 characters long, which is a lot more possibilities (at least it’s numeric characters only!). To automate the process he programmed this Teensy board to try every possible combination. It worked great on a text editor but sometimes the characters, or the enter command wouldn’t register. He guesses this was some type of protection against automated attackers. To get around the issue he added different delays between the key presses, and between entering each code. This fixed the issue, as you can see in the clip after the break. Unfortunately after two 48-hour runs that tried every code he still hasn’t gained access!
Continue reading “Mac EFI PIN lock brute force attack (unsuccessful)”
Fabric dye is one of those products where it keeps popping up for unintended uses, we have seen it coloring printed circuit boards, and now a Macintosh computer? [The Brain]’s project to add a little color to his Macbook has been done before, but he chooses to do it in a different way, which comes down to a little bit of sandpaper.
You could go ahead and dye the Macbook plastics as is, but that thick layer of glossy plastic is going to take much more time to penetrate and its going to resist taking the color, so it might end up splotchy. The simple solution to this is to just sand off the gloss, that way the color has much less of a barrier to dye the plastic. Once the protective gloss shell is sanded away and cleaned throughly, Rit brand fabric dye is added to a pan of water and set on the stove to boil.
While most of the case plastics are thick and tough enough to withstand some heat, care does need to be taken when dealing with thin soft parts like the display bezel. After about 45 min the parts are dyed and popping with super bright orange color in record time.
When you think about hacking laptops, it’s highly unlikely that you would ever consider the battery as a viable attack vector. Security researcher [Charlie Miller] however, has been hard at work showing just how big a vulnerability they can be.
As we have been discussing recently, the care and feeding of many batteries, big and small, is handled by some sort of microcontroller. [Charlie] found that a 2009 update issued by Apple to fix some lingering MacBook power issues used one of two passwords to write data to the battery controllers. From what he has seen, it seems these same passwords have been used on all batteries manufactured since that time as well. Using this data, he was subsequently able to gain access to the chips, allowing him to remotely brick the batteries, falsify data sent to the OS, and completely replace the stock firmware with that of his own.
He says that it would be possible for an attacker to inject malware into the battery itself, which would covertly re-infect the machine, despite all traditional removal attempts. Of course, replacing the battery would rectify the issue in these situations, but he says that it would likely be the last thing anyone would suspect as the source of infection. While using the battery to proliferate malware or cause irreversible damage to the computer would take quite a bit of work, [Charlie] claims that either scenario is completely plausible.
He plans on presenting his research at this year’s Black Hat security conference in August, but in the meantime he has created a utility that generates a completely random password for your Mac’s battery. He says that he has already contacted Apple to in order to help them construct a permanent fix for the issue, so an official patch may be available in the near future.
[Enigma-penguin] built a tablet computer out of a Core2Duo Macbook circa 2007. The battery exploded, damaging the case and a few components inside. But there was hope for a new life as a tablet computer. He removed the screen and tested to make sure the computer would still function without it by using the video out port.
Putting the whole thing back together as a tablet proved to have some headaches. He worked through problems caused by the addition of a touchscreen between the LCD and the bezel and made the connections work with the screen flipped. The finished product looks so good because the bezel has not been turned around like on other tablet builds. Instead, a viewing window was cut in what would have been the case behind the screen.
There’s a little more to be done yet. The black USB cable seen above is the connector for the touchscreen which he plans to internalize. The magnetic sleep sensor has been relocated to the headphone jack. Inserting a plug (no cord necessary) puts it to sleep for transport. There’s also an on screen keyboard and the ability to change the screen orientation from landscape to portrait. After the break we’ve embedded one of [Enigma-penguin’s] demonstrations. Continue reading “Mac tablet keeps the look of the donor-Macbook”
[Bart] managed to get his hands on a Macbook Air for free. The catch was that the monitor hinge was broken and the laptop wasn’t in too great of a condition. Rather than scrapping it or using it as a cake cutter, he decided to turn it into a keyboard PC. By removing the internals he was able to fit all of the components with minimal modification. [Bart] has added a few things to make it a functional desktop, such as integrating a USB hub under the the keyboard and fitted the keyboard with a Magic Trackpad. As with any great hack, the project is still in progress, and we can’t wait to see the final touches as it comes together.
[Billy] wanted to use the audio connector on his MacBook Pro for input and output at the same time. He knew it could be done because Apple sells headphones with built-in microphones that work with the computer. He set out to build a breakout box so that he could connect the components of his choice to the single port. Using a scart-RCA adaptor box he scrapped the scart plug and wired the RCA jacks to the Apple headphone wires. He can now patch the pickup of his guitar to the mic connector, send it through the MacBook, and run the output back to his guitar amp.