Hackaday Links Column Banner

Hackaday Links: September 29, 2019

In a sure sign that we’ve arrived in the future, news from off-world is more interesting this week than Earth news. When the InSight probe landed on Mars last year, it placed the first operating magnetometer on the Red Planet. Since then, the sensitive instrument has been logging data about the planet’s magnetic field, and now there are reports that researchers have discovered a chain of pulsations in the magnetic field. Pulsations in planetary magnetic fields aren’t all that strange; pulse trains that occur only at Martian midnight are, though. Researchers haven’t got a clue yet about what this means. We assume they’ve eliminated artifacts like something on the lander being turned on at local midnight, so when they figure it out it should be fascinating.

In more news from the future, Boston Dynamics is trolling us again. We covered the announcement early this week that they’re putting their Spot quadruped robot on sale – sort of. Turns out you need to be selected to qualify based on the application you have in mind, plus have several Ferraris full of cash to spend. While everyone was watching the adorable antics of Spot as it wandered through improbably industrial vignettes, Boston Dynamics also released this slightly terrifying video of their Atlas robot running through a gymnastics routine.  It starts with a headstand and a front roll and ends with a slipt leap and whatever the gymnastics equivalent of a figure skating axel jump is. Yes, it has a special roll cage attached to make the tumbles a bit smoother, but it’s still some remarkable stuff.

How are your RF design skills? If they’re good enough to design an RF power amp, you might want to check out this homebrew RF design challenge. Put on by NXP Semiconductors, the design must use one of their new LDMOS RF power transistors. They’ll send you samples so you can build your design, and you stand to win up to $3000 plus $1000 worth of NXP products. The contest opened back in May but is running through the middle of November, so you’d better hurry.

Speaking of RF, wouldn’t it be interesting to see a snapshot of the RF spectrum over the entire planet? ElectroSense thinks so, and they’re working on a crowdsourcing model to set up a globe-spanning network of connected RF sensors. The idea is similar to what FlightAware does for monitoring the locations of aircraft with a distributed network of ADS-B receivers. But where FlightAware only monitors a narrow slice of spectrum, ElectroSense wants it all – DC to 6 GHz. You can build a sensor from an SDR and a Raspberry Pi and start contributing to the effort, which only has a handful of sensors at the moment.

Has affordable metal 3D-printing finally arrived? For certain values of affordability, it soon will, when One Click Metal launches their new selective laser melting printer. Thomas Sanladerer did a video with the principals, and the prototype looks promising. SLM is not a new process, but patents on the core process recently ran out, so startups like One Click Metal are jumping into the market. Their printer won’t be cheap — you’ll still need to write a check with many zeroes — but with more players, the price should come down.

And finally, what’s this world coming to when a startup specializing in building giant fighting robots can’t make a go of it? MegaBots is shutting down, and while that’s certainly bad news for its founders and employees, it’s great news for anyone in the market for used battle bots. The company’s flagship bot, the 15-ton Eagle Prime, is currently up for auction on eBay. Bidding started at $1 with no reserve, but if you were looking for a steal, you’re a bit late. The high bid is currently $100,100, which is still an incredible buy considering it cost $2.5 million to build. You’ll have to pay for shipping, but you’ll have a super-destructive mecha of your own to drive around. And think how cool you’ll look rolling into some kid’s backyard birthday party. Presumably one you’ve been invited to.

Custom Game Pad Can Reprogram Itself

In the heat of the moment, gamers live and die by the speed and user-friendliness of their input mechanisms. If you’re team PC, you have two controllers to worry about. Lots of times, players will choose a separate gaming keyboard over the all-purpose 104-banger type.

When [John Silvia]’s beloved Fang game pad went to that LAN party in the sky, he saw the opportunity to create a custom replacement exactly as he wanted it. Also, he couldn’t find one with his desired layout. Mechanical switches were a must, and he went with those Cherry MX-like Gaterons we keep seeing lately.

This 37-key game pad, which [John] named Eyetooth in homage to the Fang, has a couple of standout features. For one, any key can be reprogrammed key directly from the keypad itself, thanks to built-in macro commands. It’s keyboard-ception!

One of the macros toggles an optional auto-repeat feature. [John] says this is not for cheating, though you could totally use it for that if you were so inclined. He is physically unable to spam keys fast enough to satisfy some single-player games, so he designed this as a workaround. The auto-repeat’s frequency is adjustable in 5-millisecond increments using the up /down macros. There’s a lot more information about the macros on the project’s GitHub.

Eyetooth runs on an Arduino Pro Micro, so you can either use [John]’s code or something like QMK firmware. This baby is so open source that [John] even has a hot tip for getting quality grippy feet on the cheap: go to the dollar store and look for rubber heel grippers meant to keep feet from sliding around inside shoes.

If [John] finds himself doing a lot of reprogramming, adding a screen with a layout map could help him keep track of the key assignments.

This Week In Security: Zeroconf Strikes Again, Lastpass Leaks Your Last Password, And All Your Data Is Belong To Us

VoIP cameras, DVRs, and other devices running the Web Services Dynamic Discovery (WSDD) protocol are being used in a new type of DDoS attack. This isn’t the first time a zeroconf service has been hijacked as part of a DDoS, as UPnP has also been abused in similar ways.

Feel like alphabet soup yet? A Denial of Service attack is one where the target is simply made unavailable, rather than actually compromised. The classic example of this is the SYN flood, where an attacker would open hundreds of connections to a web server at once, exhausting the server’s resources and interrupting legitimate use of that server. As mitigations for these attacks were developed (SYN Cookies, for example), DoS attacks were replaced by Distributed Denial of Service (DDOS) attacks. Rather than attack a weakness on the target machine, like available RAM or CPU cycles, a DDoS generally targets available network bandwidth by hitting the target website from many, many locations at once. No clever software tricks can help when your Internet connection is fully saturated with junk traffic. Continue reading “This Week In Security: Zeroconf Strikes Again, Lastpass Leaks Your Last Password, And All Your Data Is Belong To Us”

Badge builder's meetup at DC27

Pictorial Guide To The Unofficial Electronic Badges Of DEF CON 27

DEF CON has become the de facto showplace of the #Badgelife movement. It’s a pageant for clever tricks that transform traditional green rectangular circuit boards into something beautiful, unique, and often times hacky.

Today I’ve gathered up about three dozen badge designs seen at DC27. It’s a hint of what you’ll see in the hallways and meetups of the conference. From hot-glue light pipes and smartphone terminal debugging consoles to block printing effects and time of flight sensors, this is a great place to get inspiration if you’re thinking of trying your hand at unofficial badge design.

If you didn’t catch “The Badgies” you’ll want to go back and read that article too as it rounds up the designs I found to be the craziest and most interesting including the Car Hacking Village, Space Force, SecKC, DC503, and Frankenbadge. Do swing by the Hands-On articles for the AND!XOR badge and for [Joe Grand’s] official DC27 badge. There was also a lot of non-badge hardware on display during Hackaday’s Breakfast at DEF CON so check out that article as well.

Enough preamble, let’s get to the badges!

Continue reading “Pictorial Guide To The Unofficial Electronic Badges Of DEF CON 27”

Arduino Bot Rocks A PS2 Controller

As far as controlling robots goes, makers today are spoilt for choice. WiFi and Bluetooth enabled microcontrollers are a dime a dozen, and integration with smartphone apps is a cinch. Despite this, the old methods still hold sway, as [Igor Fonseca] demonstrates with a simple Arduino bot.

It’s a classic build, using a tracked chassis with a pair of motors providing propulsion and skid steering. The motors are controlled by an L298N H-bridge board, with power courtesy of a trio of 18650 batteries. An Arduino Uno acts as the brains of the operation. Control is via a Playstation 2 controller, in this case a 2.4 GHz third party version. This allows the robot to be controlled wirelessly, with the decoding handled by [Bill Porter]’s useful Arduino library.

It’s a cheap approach to building a remote-controlled bot, and one that would be a great way to teach interested children about how to work with embedded systems. We’ve featured a similar build before, too. Video after the break.

Continue reading “Arduino Bot Rocks A PS2 Controller”

Hackaday Links Column Banner

Hackaday Links: September 8, 2019

We start this week with very sad news indeed. You may have heard about the horrific fire on the dive boat Conception off Santa Cruz Island last week, which claimed 33 lives. Sadly, we lost one of our own in the tragedy: Dan Garcia, author of the wildly popular FastLED library. Dan, 46, was an Apple engineer who lived in Berkley; his partner Yulia Krashennaya died with him. Our community owes Dan a lot for the work he put into FastLED over the last seven years, as many an addressable LED is being driven by his code today. Maybe this would be a good chance to build a project that uses FastLED and add a little light to the world, courtesy of Dan.

In happier news, the biggest party of the hardware hacking year is rapidly approaching. That’s right, the 2019 Hackaday Superconference will be upon us before you know it. Rumor has it that there aren’t that many tickets left, and we haven’t even announced the slate of talks yet. That’s likely to clean out the remaining stock pretty darn quickly. Are you seriously prepared to miss this? It seems like a big mistake to us, so why don’t you hop over and secure your spot before you’re crying into your Club-Mate and wondering what all the cool kids will be doing in November.

Of course one of the highlights of Superconference is the announcement of the Hackaday Prize winner. And while we naturally think our Prize is the best contest, that doesn’t mean there aren’t others worth entering. MyMiniFactory, the online 3D-printing community, is currently running a “Design with Arduino” competition that should be right up the alley of Hackaday readers. The goal is simple: submit a 3D-printed design that incorporates Arduino or other electronics. That’s it! Entries are accepted through September 16, so you’ve still got plenty of time.

Sometimes you see something that just floors you. Check out this tiny ESP32 board. It doesn’t just plug into a USB port – it fits completely inside a standard USB Type A jack. The four-layer board sports an ESP32, FTDI chip, voltage regulator, an LED and a ceramic antenna for WiFi and Bluetooth. Why would you want such a thing? Why wouldn’t you! The board is coming soon on CrowdSupply, so we hope to see projects using this start showing up in the tipline soon.

Here’s a “why didn’t I think of that?” bench tip that just struck us as brilliant. Ever had to probe a board to trace signal paths? It’s a common enough task for reverse engineering and repairs, but with increasingly dense boards, probing a massive number of traces is just too much of a chore. Hackaday superfriend Mike Harrison from “mikeselectricstuff” makes the chore easier with a brush made from fine stainless wires crimped into a ring terminal. Attached to one probe of a multimeter, the brush covers much more of the board at a time, finding the general area where your trace of interest ends up. Once you’re in the neighborhood you can drop back to probing one pad at a time. Genius! We’d imagine a decent brush could also be made from a bit of coax braid too.

Another shop tip to wrap up this week, this one for woodworkers and metalworkers alike. Raw materials are expensive, and getting the most bang for your buck is often a matter of carefully laying out parts on sheet goods to minimize waste. Doing this manually can be a real test of your spatial relations skills, so why not automate it with this cut list optimizer? The app will overlay parts onto user-defined rectangles and snuggle them together to minimize waste. The program takes any units, can account for material lost to kerfs, and will even respect grain direction if needed. It’s built for wood, but it should prove useful for sheet metal on a plasma cutter, acrylic on a laser, or even PCBs on a panel.

This Week In Security: Mass IPhone Compromise, More VPN Vulns, Telegram Leaking Data, And The Hack Of @Jack

In a very mobile-centric installment, we’re starting with the story of a long-running iPhone exploitation campaign. It’s being reported that this campaign was being run by the Chinese government. Attack attribution is decidedly non-trivial, so let’s be cautious and say that these attacks were probably Chinese operations.

In any case, Google’s Project Zero was the first to notice and disclose the malicious sites and attacks. There were five separate vulnerability chains, targeting iOS versions 10 through 12, with at least one previously unknown 0-day vulnerability in use. The Project Zero write-up is particularly detailed, and really documents the exploits.

The payload as investigated by Project Zero doesn’t permanently install any malware on the device, so if you suspect you could have been compromised, a reboot is sufficient to clear you device.

This attack is novel in how sophisticated it is, while simultaneously being almost entirely non-targeted. The malicious code would run on the device of any iOS user who visited the hosting site. The 0-day vulnerability used in this attack would have a potential value of over a million dollars, and these high value attacks have historically been more targeted against similarly high-value targets. While the websites used in the attack have not been disclosed, the sites themselves were apparently targeted at certain ethnic and religious groups inside China.

Once a device was infected, the payload would upload photos, messages, contacts, and even live GPS information to the command & control infrastructure. It also seems that Android and Windows devices were similarly targeted in the same attack.

Telegram Leaking Phone Numbers

“By default, your number is only visible to people who you’ve added to your address book as contacts.” Telegram, best known for encrypted messages, also allows for anonymous communication. Protesters in Hong Kong are using that feature to organize anonymously, through Telegram’s public group messaging. However, a data leak was recently discovered, exposing the phone numbers of members of these public groups. As you can imagine, protesters very much want to avoid being personally identified. The leak is based on a feature — Telegram wants to automatically connect you to other Telegram users whom you already know.

By default, your number is only visible to people who you’ve added to your address book as contacts.

Telegram is based on telephone numbers. When a new user creates an account, they are prompted to upload their contact list. If one of the uploaded contacts has a number already in the Telegram system, those accounts are automatically connected, causing the telephone numbers to become visible to each other. See the problem? An attacker can load a device with several thousand phone numbers, connect it to the Telegram system, and enter one of the target groups. If there is a collision between the pre-loaded contacts and the members of the group, the number is outed. With sufficient resources, this attack could even be automated, allowing for a very large information gathering campaign.

In this case, it seems such a campaign was carried out, targeting the Hong Kong protesters. One can’t help but think of the first story we covered, and wonder if the contact data from compromised devices was used to partially seed the search pool for this effort.

The Hack of @Jack

You may have seen that Twitter’s CEO, Jack [@Jack] Dorsey’s Twitter account was hacked, and a series of unsavory tweets were sent from that account. This seems to be a continuing campaign by [chucklingSquad], who have also targeted other high profile accounts. How did they manage to bypass two factor authentication and a strong password? Cloudhopper. Acquired by Twitter in 2010, Cloudhopper is the service that automatically posts a user’s SMS messages to Twitter.

Rather than a username and password, or security token, the user is secured only by their cell phone number. Enter the port-out and SIM-swap scams. These are two similar techniques that can be used to steal a phone number. The port-out scam takes advantage of the legal requirement for portable phone numbers. In the port-out scam, the attacker claims to be switching to a new carrier. A SIM-swap scam is convincing a carrier he or she is switching to a new phone and new SIM card. It’s not clear which technique was used, but I suspect a port-out scam, as Dorsey hadn’t gotten his cell number back after several days, while a SIM swap scam can be resolved much more quickly.

Google’s Bug Bounty Expanded

In more positive news, Google has announced the expansion of their bounty programs. In effect, Google is now funding bug bounties for the most popular apps on the Play store, in addition to Google’s own code. This seems like a ripe opportunity for aspiring researchers, so go pick an app with over 100 million downloads, and dive in.

An odd coincidence, that 100 million number is approximately how many downloads CamScanner had when it was pulled from the Play store for malicious behavior. This seems to have been caused by a third party advertisement library.

Updates

Last week we talked about Devcore and their VPN Appliance research work. Since then, they have released part 3 of their report. Pulse Secure doesn’t have nearly as easily exploited vulnerabilities, but the Devcore team did find a pre-authentication vulnerability that allowed reading arbitraty data off the device filesystem. As a victory lap, they compromised one of Twitter’s vulnerable devices, reported it to Twitter’s bug bounty program, and took home the highest tier reward for their trouble.