Bluetooth HID Gamepad And HC-05 Serial Hack

“Which came first, the chicken or the egg?” Don’t bother us with stupid questions, they both co-evolved into the forms that we now serve up in tasty sandwiches or omelets, respectively. “Which came first, the HC-05 serial-flash-hack, or the wireless Bluetooth Gamepad?” Our guess is that [mitxela] wanted to play around with the dirt-cheap Bluetooth modules, and that building the wireless controller was an afterthought. But for that, it’s a well-done afterthought! (Video below the break.)

It all starts with the HC-05 Bluetooth module, which is meant to transfer serial data, but which can be converted into a general-purpose device costing ten times as much with a simple Flash ROM replacement. The usual way around this requires bit-banging over a parallel port, but hackers have worked out a way to do the same thing in bit-bang mode using a normal USB/Serial adapter. The first part of [mitxela]’s post describes this odyssey.

Continue reading “Bluetooth HID Gamepad And HC-05 Serial Hack”

Star Track: A Lesson In Positional Astronomy With Lasers

[gocivici] threatened us with a tutorial on positional astronomy when we started reading his tutorial on a Arduino Powered Star Pointer and he delivered. We’d pick him to help us take the One Ring to Mordor; we’d never get lost and his threat-delivery-rate makes him less likely to pull a Boromir.

As we mentioned he starts off with a really succinct and well written tutorial on celestial coordinates that antiquity would have killed to have. If we were writing a bit of code to do our own positional astronomy system, this is the tab we’d have open. Incidentally, that’s exactly what he encourages those who have followed the tutorial to do.

The star pointer itself is a high powered green laser pointer (battery powered), 3D printed parts, and an amalgam of fourteen dollars of Chinese tech cruft. The project uses two Arduino clones to process serial commands and manage two 28byj-48 stepper motors. The 2nd Arduino clone was purely to supplement the digital pins of the first; we paused a bit at that, but then we realized that import arduinos have gotten so cheap they probably are more affordable than an I2C breakout board or stepper driver these days. The body was designed with a mixture of Tinkercad and something we’d not heard of, OpenJsCAD.

Once it’s all assembled and tested the only thing left to do is go outside with your contraption. After making sure that you’ve followed all the local regulations for not pointing lasers at airplanes, point the laser at the north star. After that you can plug in any star coordinate and the laser will swing towards it and track its location in the sky. Pretty cool.

Continue reading “Star Track: A Lesson In Positional Astronomy With Lasers”

Hackaday Prize Entry: Non-Computational Fluid Dynamics

Computational Fluid Dynamics, or CFD, and is applied to everything from aircraft design to how good of a wing a new skyscraper will be. Of course, the science of building airfoils is much older than CFD, leading to the question of how airfoil design was done before computers.

The answer, of course, is a wind tunnel. Walk around a few very good air museums, and you’ll find wind tunnels ranging from the long wooden boxes built by the Wright brothers to fantastic plywood contraptions that are exceptionally interesting to woodworkers.

[Joel] needed final project as an upcoming aeronautical engineer, but he wanted his project to be something physical, and a tool that could be used again. He decided to build a wind tunnel that’s also his entry for The Hackaday Prize.

This wind tunnel isn’t a gigantic device the size of a building. The very first wind tunnels were simple devices just a few meters long. With a fan at one end, a section to stabilize the wind, a chamber, and a place for the air to go, it’s also a very simple device. Just because something is simple doesn’t mean anyone has built one recently, though: [Joel] couldn’t find anyone who built a wind tunnel with step-by-step instructions. This project is just that – an Open Source wind tunnel.

The design of this wind tunnel is simple enough, built out of fiberglass with relatively simple molds. The design can be adapted to various electric fans, and the most fun part of the build – the smoke machine – is already complete.

Remote-Operated Gate On A Budget

Sometimes, a simple fix is the best solution. Lacking extra funds for a proper remote-controlled gate-opener after the recent purchase of their farm, redditor [amaurer3210] built one as a birthday gift for his wife.

Supported on pillow block housings, a 10″ wheel is connected to the motor by via a 3D printed pulley and a timing belt turned inside-out to allow for slippage — in case of obstacles or manual opening of the gate. If you’ve ever worked with belts in your builds, [amaurer3210] adds that during sizing he uses a few layers of fiberglass tape as a stand-in for the belt to avoid frustration over final belt size and tension.
Continue reading “Remote-Operated Gate On A Budget”

Unexpected Betrayal From Your Right Hand Mouse

Some people really enjoy the kind of computer mouse that would not be entirely out of place in a F-16 cockpit. The kind of mouse that can launch a browser with the gentle shifting of one of its thirty-eight buttons ever so slightly to the left and open their garage door with a shifting to the right of that same button. However, can this power be used for evil, and not just frustrating guest users of their computer?

We’ve heard of the trusted peripheral being repurposed for nefarious uses before. Sometimes they’ve even been modified for more benign purposes. All of these have a common trend. The mouse itself must be physically modified to add the vulnerability or feature. However, the advanced mice with macro support can be used as is for a vulnerability.

The example in this case is a Logitech G-series gaming mouse. The mouse has the ability to store multiple personal settings in its memory. That way someone could take the mouse to multiple computers and still have all their settings available. [Stefan Keisse] discovered that the 100 command limit on the macros for each button are more than enough to get a full reverse shell on the target computer.

Considering how frustratingly easy it can be to accidentally press an auxiliary button on these mice, all an attacker would need to do is wait after delivering the sabotaged mouse. Video of the exploit after the break.

Continue reading “Unexpected Betrayal From Your Right Hand Mouse”

The First Evil Maid-Proof Computer

It doesn’t matter how many bits your password has, how proven your encryption is, or how many TrueCrypt volumes are on your computer. If someone wants data off your device, they can get it if they have physical access to your device. This is the ‘evil maid’ security scenario, named after hotel maids on the payroll of a three-letter agency. If someone has physical access to a laptop – even for an hour or two – the data on that laptop can be considered compromised. Until now, there has been no counter to this Evil Maid scenario, and for good reason. Preventing access to data even when it is in the possession of an Evil Maid is a very, very hard problem.

Today, Design Shift has released ORWL (as in George Orwell), the first computer designed with physical security in mind. This tiny disc of a computer is designed to defeat an Evil Maid through some very clever engineering on top of encryption tools we already use.
Continue reading “The First Evil Maid-Proof Computer”

Yak Shaving: Hacker Mode Vs Maker Mode

When I start up a new project, one that’s going to be worth writing up later on, I find it’s useful to get myself into the right mindset. I’m not a big planner like some people are — sometimes I like to let the project find its own way. But there’s also the real risk of getting lost in the details unless I rein myself in a little bit. I’m not alone in this tendency, of course. In the geek world, this is known as “yak shaving“.

The phrase comes obliquely from a Ren and Stimpy episode, and refers to common phenomenon where to get one thing done you have to first solve another problem. The second problem, of course, involves solving a third, and so on. So through this (potentially long) chain of dependencies, what looks like shaving a yak is obliquely working on cracking some actually relevant problem.
Continue reading “Yak Shaving: Hacker Mode Vs Maker Mode”