Cornell Final Projects 2007


The latest crop of final projects from Cornell Universities ECE576 course went up a while ago. This round focuses on FPGAs. They’re all fairly impressive projects. My favorite is this real time spectrograph. With the decreasing cost of FPGAs, this Digital Oscilloscope could become a popular one. Putting this UDP network stack on a capture the flag network would probably freak out some people. Lately I’ve noticed a trend of replacing ASIC chips with FPGAs – these projects could be just the thing to get some people started with them.

Day O’ Guitar Hero Mods (with A Bonus)


I’ve already gotten a pile of tips on Guitar Hero controllers today, so here we go. The first one is already making the rounds. [Mark] replaced strummer with a touchscreen LCD and a magnetic switch. [Mark]s ultimate goal is to add some optical sensing and make the guitar self playing. For details, hit the acidmods thread or just watch the proof of concept demo.

[Johan] sent in the second controller of the day, and it’s probably my favorite for guitar bling. The original mushy switches were replaced with micro-switches and CNC milled replacement buttons. Each button is individually lit with LEDs and a cold cathode lights up translucent panel in the body. A PIC controller controls the lights and provides some input options for button tapping. The video is actually pretty entertaining to watch.

For a little bonus, check out [Mastershake916]’s cast Hack-A-Day pendant.

Wireless Keyboards Easily Cracked

We first covered breaking the commodity 27MHz radios used in wireless keyboards, mice, and presenters when [Luis Miras] gave a talk at Black Hat. Since then, the people at Dreamlab have managed to crack the encryption on Microsoft’s Wireless Optical Desktop 1000 and 2000 products (and possibly more). Analyzing the protocol they found out that meta keys like shift and ALT are transmitted in cleartext. The “encryption” used on each regular keystroke involves XORing the key against a random one byte value determined during the initial sync with the receiver. So, if you sniff the handshake, you can decrypt the keystrokes. You really don’t have to though; there are only 256 possible encryption keys. Using a dictionary file you can check all possible keys and determine the correct one after only receiving 20-50 keystrokes. Their demo video shows them sniffing keystrokes from three different keyboards at the same time. Someone could potentially build a wireless keylogger that picks up every keystrokes from every keyboard in an office. You can read more about the attack in the whitepaper(pdf).

[via Midnight Research Labs]

Continue reading “Wireless Keyboards Easily Cracked”