Launching A Balloon And Not Landing In The Ocean

In just a few short hours, the Yale Undergraduate Aerospace Association will launch their 4th high altitude balloon project into the rarefied air of the stratosphere and with any luck bring back pictures of the view high above Connecticut  Long Island, Rhode Island, and Martha’s Vineyard.

Inside their surprisingly strong unibody chassis is two GoPro cameras and a triple-redundant telemetry system consisting of a custom radio system capable of transmitting over 40 miles, a cell-phone based comms system and a SPOT satellite tracker.

There is one very large problem the Yale Aerospace team has had to cope with; Because they’re launching their Skyview balloon from the eastern seaboard of the US, it’s very likely their payload could end up taking a drink in the Atlantic. To solve this problem, the team developed a novel cut-down solution: a piece of nichrome heater wire is wrapped around the line tying the payload to the balloon. If the hardware receives a signal from the ground, or has a software problem, or runs out of battery power, the nichrome circuit will release the balloon from its launch vehicle to hopefully return it to solid ground.

The Yale Aerospace team has also written a custom iOS app allowing the chase cars to track the balloon in real time – a great feature if you’re trying to communicate with several cars going down the highway. You can check out the live data from the balloon on the Yale Aerospace tracking site or just head over to their twitter to read the latest news about the flight.

Building A Better Software Defined Radio (and Transmitting As Well)

By now most Hackaday readers should be familiar with this year’s latest advance in software defined radio. With a simple USB TV tuner dongle, it’s possible to receive FM broadcasts, GPS data from satellites, and even telemetry from aircraft flying overhead. There is one limitation to this setup, though: it’s receive only. Hacker extraordinaire [Michael Ossmann] is looking to make a better software defined radio called the HackRF.

The HackRF is an incredibly ambitious project – able to receive just about anything between 100 MHz and 6 GHz (this includes everything from the top of the FM radio band to cordless phones, cell phones, WiFi, and basically any radio technology that has been commercialized in the last 15 years), the HackRF is also able to transmit. Yes, with the HackRF it’s possible to build your own software-defined WiFi module, or just broadcast bogus GPS information.

Compared to the $20 TV tuner SDR dongles we’ve played around with, the HackRF isn’t exactly cheap. [Mossmann] figures he’ll be able to sell the device for about $300. A fair bit of change, but much, much less than professional, commercial SDR solutions.

A very cool advance in the state of SDR, but reason dictates we must suggest that everyone who wants a HackRF to start studying for their amateur radio exam now. Being a licensed radio operator won’t stop you from any sort of malicious intent, but with at least with licensing comes with the possibility of knowing what evil you’re doing.

You can check out the wiki for the HackRF over on the gits along with the current hardware design

Super Serious Garage Door Opener

Tired of cheap plastic garage door openers? [Yetifrisstlama]’s is probably the most serious garage door opener that we’ve seen. The case is an old emergency stop switch, which has plenty of space for the circuitry and features a big red button.

This build log starts with details on reverse engineering the original door opener’s protocol. It’s an amplitude-shift keying (ASK) signal that sends a 10 bit code to authenticate. The main components inside are a PIC16LF819 microcontroller, a MAX7057 ASK/FSK transmitter, and some RF circuitry needed to filter the signal. There’s a mix of through hole and surface mount components mounted on a prototyping board, requiring some crafty soldering.

[Yetifrisstlama] says that the next step is to add a power amplifier to increase the range. The code and project files are also provided for anyone interested in working with ASK. While the hack looks awesome, it might make bystanders think you’re doing something more sinister than opening a garage door.

Metroid Helmet Takes Halloween Costuming To A Higher Level

Hackaday writer [Ryan Fitzpatrick], aka [PlatinumFungi], recently put together this amazing Metroid Power Suit helmet as a prop for a [Mike n Gary], on youtube. How amazing is it? This image is an actual photograph of the helmet! It’s being modeled by [Kelly Johnson], who built a power suit costume for a previous Halloween. But she never made a helmet, which makes sense to us. After all, how are you supposed to talk to anyone while wearing a helmet? Practicality aside, it is a delight to walk through the fabrication process.

[Ryan] started with a motorcycle helmet, making paper templates based on images from the game. After he had a reasonable road map for the work that needed to be done he started cutting away the parts which he didn’t need. The ‘beak’ on the front was then fabricated from paperboard, with the fins on the side sculpted from rigid foam. But there’s still a lot of work to be done from that point. Sure, the internal lighting and colored visor are necessary touches, but it’s the paint job and ‘distressing’ steps that make this look so realistic.

Looks like we’ve exceeded his bandwidth due to the tons of pictures he had of the process. Check out the video after the break.

Continue reading “Metroid Helmet Takes Halloween Costuming To A Higher Level”

Driving An LCD Character Display Using Custom HID Codes

Here’s an external display meant to help you keep track of your computer’s status. It connects via USB and is driven by a PIC microcontroller. It listens for a small set of commands, using those to implement a simple control protocol to drive the screen.

[Andrew Gehringer] designed the device around a PIC 18F2550, which offers native USB control. He’s using Microchip’s USB stack to enumerate the module as an HID device. It listens for commands 0x10 through 0x23. These clear the display, write strings to each of the four lines of the display, and switch the LCD backlight. Of course the project includes a program [Andrew] wrote to feed the display. It  has a GUI which let’s him decide what information is displayed and how it is formatted. This helper app hangs out in the system tray for easy access.

Hacking Facebook To Remove The Social Value Facade

We see [Ben Grosser’s] point that all the metrics found on the Facebook user interface make the experience somewhat of a game to see if you can better your high score. He thinks this detracts from the mission of having social interactions that themselves have a value. So he set out to remove the ‘scores’ from all Facebook pages with a project he calls the Facebook Demetricator.

You can see two UI blocks above. The upper offering is what a normal user will see. The lower is the page seen through the lens of the Demetricator. [Ben’s] feels it doesn’t matter how many people like something or share something, but only that you are genuinely interested in it. With the numbers removed you’re unlikely to follow the herd mentality of only clicking through to things that are liked by a huge number of people. He explains this himself in the clip after the break.

The Demetricator works much like the Reddit Enhancement Suite. It’s a browser add-on for Chrome, Firefox, and Safari that selectively strips out the metrics as the page renders.

Brute Force Used To Crack A Key Logger’s Security Code

The USB device seen plugged in on the right of this image was found in between the keyboard and USB port of the company computer belonging to a Senior Executive. [Brad Antoniewicz] was hired by the company to figure out what it is and what kind of damage it may have done. He ended up brute forcing an unlock code to access the device, but not before taking some careful steps along the way.

From the design and placement the hardware was most likely a key logger and after some searching around the Internet [Brad] and his colleagues ordered what they thought was the same model of device. They wanted one to test with before taking on the actual target. The logger doesn’t enumerate when plugged in. Instead it acts as a pass-through, keeping track of the keystrokes but also listening for a three-key unlock code. [Brad] wrote a program for the Teensy microcontroller which would brute force all of the combinations. It’s a good thing he did, because one of the combinations is a device erase code hardwired by the manufacturer. After altering the program to avoid that wipe code he successfully unlocked the malicious device. An explanation of the process is found in the video after the break.

Continue reading “Brute Force Used To Crack A Key Logger’s Security Code”