A Very Simple Android Recon Vehicle

Desperately in need of a graduation paper, [Andrei] decided to build a few computer controlled recon vehicles (PDF warning), and we’re really impressed with the minimalist approach [Andrei] took.

The Computer Operated Recon Entity (C.O.R.E.) mk. I is based around a laptop. Instead of an Arduino, [Andrei] used a car stereo amp to control the motors. The two channel amp [Andrei] picked out has four outputs. Tying a motor to each output gives a four-wheel drive robot that’s really clever in its simplicity. With an onboard webcam, [Andrei] can do live video streaming from his remote vehicle. Outputting a specific tone with the sound card allows for full control of the robot.

The C.O.R.E. mk. II uses a Samsung Galaxy I5500 phone – the cheapest Android phone [Andrei] could find. The setup is similar to the mk. I C.O.R.E. with a WiFi connection sending video back to a base station. Control of the two motors is still handled by playing sound files and sending that to a stereo amp connected to the motors.

Check out the C.O.R.E. mk. II going Bach and forth after the break.

Continue reading “A Very Simple Android Recon Vehicle”

Recon 2008 Recap

[Tiller Beauchamp] gave a presentation on applied reverse engineering in OS X at this year’s REcon, but he also attended many of the other talks and gives his take on the highlights of REcon 2008 in a guest post on the ZDNet blog, Zero Day.

One of the highlights for him was Neohapsis’s [Chris Smith] discussing virtual machines implementing code obfuscation. The method uses custom instructions and runtime interpreter, which can help make the task of reverse engineering markedly more difficult if implemented properly.

On the opposite end of the spectrum, [Beauchamp] noted [Gerardo Richarte]’s software reverse engineering tools that decompile and recompile software in iterative portions. This allows the recompiled software to be tested piece by piece. Be sure to read his post and see what you missed.