Hackaday Podcast 208: Hallucinating Robots, Floppy Cartridges, And A Flexure Synth French Horn

This week, Editor-in-Chief Elliot Williams and [former Assignments Editor] Kristina Panos stood around talking about the greatest hacks of the previous week. But first, we’ve got a contest running now through March 21st — the Low Power Challenge!

Kristina almost got What’s That Sound this week, but could only describe it as some sort of underwater organ, so still no t-shirt for her. But [BalkanBoy] knew exactly what it was — the Zadar Sea Organ in Croatia. Then it’s on to the hacks, beginning with the most beautiful sea of 7-segments you’ll likely ever see. We gush over a tiny PC in a floppy drive that uses custom cartridges, dish about an expressive synth that uses a flexure mechanism, and enjoy a loving ode to the vacuum fluorescent display.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in  the comments!

And/or download it and listen offline.

Continue reading “Hackaday Podcast 208: Hallucinating Robots, Floppy Cartridges, And A Flexure Synth French Horn”

This Week In Security: OpenEMR, Bing Chat, And Alien Kills Pixels

Researchers at Sonar took a crack at OpenEMR, the Open Source Electronic Medical Record solution, and they found problems. Tthe first one is a classic: the installer doesn’t get removed by default, and an attacker can potentially access it. And while this isn’t quite as bad as an exposed WordPress installer, there’s a clever trick that leads to data access. An attacker can walk through the first bits of the install process, and specify a malicious SQL server. Then by manipulating the installer state, any local file can be requested and sent to the remote server.

There’s a separate set of problems that can lead to arbitrary code execution. It starts with a reflected Cross Site Scripting (XSS) attack. That’s a bit different from the normal XSS issue, where one user puts JavaScript on the user page, and every user that views the page runs the code. In this case, the malicious bit is included as a parameter in a URL, and anyone that follows the link unknowingly runs the code.

And what code would an attacker want an authenticated user to run? A file upload, of course. OpenEMR has function for authenticated users to upload files with arbitrary extensions, even .php. The upload folder is inaccessible, so it’s not exploitable by itself, but there’s another issue, a PHP file inclusion. Part of the file name is arbitrary, and is vulnerable to path traversal, but the file must end in .plugin.php. The bit of wiggle room on the file name on both sides allow for a collision in the middle. Get an authenticated user to upload the malicious PHP file, and then access it for instant profit. The fixes have been available since the end of November, in version 7.0.0-patch-2.

Bing Chat Injection

Or maybe it’s AI freedom. So, the backstory here is that the various AI chat bots are built with rules. Don’t go off into political rants, don’t commit crimes, and definitely don’t try to scam the users. One of the more entertaining tricks clever users have discovered is to tell a chatbot to emulate a personality without any such rules. ChatGPT can’t comment on political hot button issues, but when speaking as DAN, anything goes.

Arrrrr

This becomes really interesting when Bing Chat ingests a website that has targeted prompts. It’s trivial to put text on a web page that’s machine readable and invisible to the human user. This work puts instructions for the chat assistant in that hidden data, and demonstrates a jailbreak that turns Bing Chat malicious. The fun demonstration convinces the AI to talk like a pirate — and then get the user to click on an arbitrary link. The spooky demo starts out by claiming that Bing Chat is down, and the user is talking to an actual Microsoft engineer.

LastPass Details — Plex?

Last time we talked about the LastPass breach, we had to make some educated guesses about how things went down. There’s been another release of details, and it’s something. Turns out that in one of the earlier attacks, an encrypted database was stolen, and the attackers chose to directly target LastPass Engineers in an attempt to recover the encryption key.

According to Ars Technica, the attack vector was a Plex server run by one of those engineers. Maybe related, at about the same time, the Plex infrastructure was also breached, exposing usernames and hashed passwords. From this access, attackers installed a keylogger on the developer’s home machine, and captured the engineer’s master password. This allowed access to the decryption keys. There is some disagreement about whether this was/is a 0-day vulnerability in the Plex software. Maybe make sure your Plex server isn’t internet accessible, just to be safe.

There’s one more bit of bad news, particularly if you use the LastPass Single Sign On (SSO) service. That’s because the SSO secrets are generated from an XOR of two keys, K1 and K2. K1 is a single secret for every user at an organization. K2 is the per-user secret stored by Lastpass. And with this latest hack, the entire database of K2 secrets were exposed. If K1 is still secret, all is well. But K1 isn’t well protected, and is easily accessed by any user in the organization. Ouch.

The Ring Alien

Turns out, just like a certain horror movie, there is a video that the very watching causes death. If you happen to be a Pixel phone, that is. And “death” might be a bit of an exaggeration. Though the video in question certainly nails the vibe. Playing a specific YouTube clip from Alien will instantly reboot any modern Pixel phone. A stealth update seems to have fixed the issue, but it will be interesting to see if we get any more details on this story in the future. After all, when data can cause a crash, it can often cause code execution, too.

In-The-Wild

The US Cybersecurity and Infrastructure Security Agency (CISA) maintains a list of bugs that are known to be under active exploitation, and that list just recently added a set of notches. CVE-2022-36537 is the most recent, a problem in the ZK Framework. That’s an AJAX framework used in many places, notable the ConnectWise software. Joining the party are CVE-2022-47986, a flaw in IBM Aspera Faspex, a file transfer suite, and CVE-2022-41223 and CVE-2022-40765, both problems in the Mitel MiVoice Business phone system.

Bits and Bytes

There’s yet another ongoing attack against the PyPI repository, but this one mixes things up a bit by dropping a Rust executable as one stage in a chain of exploitation. The other novel element is that this attack isn’t going after typos and misspellings, but seems to be a real-life dependency confusion attack.

The reference implementation of the Trusted Platform Module 2.0 was discovered to contain some particularly serious vulnerabilities. The issue is that a booted OS could read and write two bytes beyond it’s assigned data. It’s unclear weather that’s a static two bytes, making this not particularly useful in the real world, or if these reads could be chained together, slowly leaking larger chunks of internal TPM data.

And finally, one more thing to watch out for, beware of fake authenticator apps. This one is four years old, has a five star rating, and secretly uploads your scanned QR codes to Google Analytics, exposing your secret authenticator key. Yoiks.

Hacker Hotel 2023: Back Again!

After three years, it’s odd to think back to those few weeks before the COVID-19 pandemic morphed from something on the news into an immediate and ever-present threat which kept us isolating for so long. For me, some of the last moments of normality were a trip to the Netherlands for Hacker Hotel, a hacker event in the comfort of a resort hotel. Now three years later and after two cancelled events, Hacker Hotel is back, and I made the same journey to Garderen to hang out for a weekend with a bunch of hacker friends over some good Dutch beer and a lot of bitterballen. Continue reading “Hacker Hotel 2023: Back Again!”

The Die Is Cast!

We all know the basics of how metal casting works, a metal is heated up to melting point and the resulting liquid metal is poured into a mold. When the metal sets, it assumes the shape of the mold. It’s a straightforward way to reliably replicate a metal item many times over, and the basics are the same whether the metal is a low-temperature alloy in a silicone mould or a crucible of molten steel poured into a sand mould.

The mould is black sand in a cast iron box, and the pattern piece is half submerged in it
A sand mould being formed around a pattern. Lukas Stavek, CC BY-SA 3.0 .

What we all understood as casting in our conversation was sand casting. Sand is packed around a pattern of the piece to be cast, and then the pattern is removed leaving a cavity in its shape which becomes the mould. There are refinements to this process and the mould is frequently formed in two halves, but it’s something that’s even practical to do in a hackerspace level setting.

A refinement of sand casting is so-called lost-wax casting, in which a hollow wax model of the piece to be cast is packed around with sand, and when the metal is poured onto the top of it the wax melts and the wax is melted out before pouring the metal in to take its place. A variation on this appears here from time to time, so-called lost-PLA casting, where the wax model is replaced with a PLA 3D print.

Injection Molding For Metals

Diagram of a die casting machine
A die casting machine. Ahmed elbhje, Public domain.

Where our confusion crept in was with die casting. We could recognise a die-cast piece, but just what is die-casting, and how is a die-casting made? The answer there lies in mass-production, because a snag with sand casting is that  a sand mould can be labour intensive to produce. Much better to come up with a quick-turnaround process that re-uses the same mould over and over, and save all that time!

Enter the die-casting, to metalwork what injection moulding is to polymers. The die is a mould made out of metal, usually with liquid cooling, and the casting is done not by pouring but by forcing the molten metal into the mould under pressure. The whole process becomes much quicker, meaning that it can become a piece of process machinery spitting out castings rather than a labour-intensive individual task. The metals used for die-casting are the lower temperature ones such as aluminium, zinc, and their alloys, but  you will find die-castings in all conceivable places.

It’s obvious that Hackaday editors are not experienced foundrymen even if some of us grew up around metalwork, but we know that among our readers lie genuine experts in all sorts of fields. If that’s you and you operate a die-casting machine, please take a moment to tell us about it, we really would like to know more!

Header: Constantin Meunier, Public domain.

Supercon 2022: Selling Your Company And Not Your Soul

Haddington Dynamics is a particular company. After winning the 2018 Hackaday Prize with an open-source robotic arm, we’ve covered their micro-factories and suction cup end-effectors for making face shields during 2020. They’ve been laser-focused on their mission of creating a fantastic robot arm at a small price tag with open-source software and design. So how does a company with such a hacker ethos get bought by a much larger company, and why? They came to SuperCon 2022 to share their story in a panel discussion.

Haddington Dynamics started with two clever inventions: optical encoders that used analog values instead of digital values and an FPGA that allowed them to poll those encoders and respond rapidly. This allowed them to use cheaper motors and rely on the incredibly sensitive encoders to position them. After the Hackaday prize, they open-sourced the HD version of the robot and released the HDI version. But in 2020, they were bought by a group called Ocado. As to why the somewhat practical but not exciting answer is that they needed money. Employees needed to be paid, and they needed capital to keep the doors open.

So this leads to the next tricky question, how do you sell your company without changing it? The fine folks at Haddington Dynamics point out in their panel discussion that a company is a collection of people. The soul of that company is the collective soul of those people coming together. A company being bought can be akin to stopping working for yourself and going to work for someone else. Working alone, you have values and principles that you can easily stick to. But once you start working for someone else, they will value different things, and while the people that make up the company might not change, the company’s decisions might become unrecognizable.

As the panel points out, looking for a buyer with the same values is critical. Ocado was a great fit as their economic interests and culture matched Haddington’s. However, it’s not all roses, as Ocadao tends to be a very closed-source group. However, Haddington Dynamics still supports its open-source initiatives. It’s a fascinating look into a company’s life cycle and how they navigate the waters of open-source, funding, acquisitions, innovation, and invention. Despite the fairytale-like nature of inventing a revolutionary robot arm in your garage and winning many awards, it turns out there is quite a lot that happens after the happily ever after.

We look forward to seeing more of Haddington Dynamics and where they go next. Video after the break.

Continue reading “Supercon 2022: Selling Your Company And Not Your Soul”

Emulating All The TRS-80 Software

Even if you didn’t own a TRS-80, the widespread footprint of Radio Shack in malls meant that if you are old enough, it is a good bet you have seen one and maybe even played with one. The games were crude, but state-of-the-art for 1982. If you wanted business software, that was there too, just don’t expect much on any of the personal computers of the day. My old TRS-80 Model III doesn’t boot anymore and is waiting for me to find time to pull it apart. But it turns out you can run all those old programs with almost no effort. If you’ve experimented with emulators before, you know there are two major problems. First, you need to install the sometimes-fidgety emulator. Second, you need to find the software you want to run and probably convert it into some format the emulator will read. The website named The Big List of TRS-80 Software solves both problems.

You are probably thinking this doesn’t solve any problem because it is just a list of links to software. That’s a reasonable thing to think, but we think the website really needs a new name. There are 15,873 pieces of software on the site, although some of them are duplicates or multiple versions of a single program. You can download them in a format that is useful for some emulators or, in some cases, the original files. But here’s the kicker. You can also click to launch a virtual TRS-80 in your browser and start the program.

Sounds great, right? Well, for the most part, it is. However, some of the programs are finicky and don’t run well in the browser. There’s also the problem of finding the documentation, but you can’t have everything. If you want a quick run of a very common game from back in the day, try Flying Saucers. Continue reading “Emulating All The TRS-80 Software”

Life At CERN Hack Chat

Join us on Wednesday, March 1st at noon Pacific for the Life at CERN Hack Chat with Daniel Valuch!

You know the story — work is just…work. The daily grind, the old salt mine, the place where you trade your time and talent for the money you need to do other stuff in the few hours you’re not at work. It’s not the same for everyone, of course, but chances are good that just getting through the day is a familiar enough experience even for someone who’s currently working his or her dream job.

We’re going to go out on a limb here a bit, but it really seems like working at the European Organization for Nuclear Research (CERN), has got to be a dream gig for almost any engineer. CERN is the top place in the world for particle physics research and home to such ludicrously large machines as the famous Large Hadron Collider (LHC). The facilities and instruments at CERN attract tens of thousands of researchers from all over the world every year who produce multiple petabytes of data; perhaps not coincidentally, it’s also the place where Tim Berners Lee invented the World Wide Web. Thanks, Sir Tim!

join-hack-chatTo say that being an electrical engineer at CERN might be a little like dropping a kid off at a combination candy store/bouncy house/petting zoo is probably not an understatement. When the biggest of Big Science is always on the menu, it must be hard to focus on this cool project or that new instrument. Then again, we’re just guessing — maybe it’s all still “just work.” Luckily, we found someone to ask: Daniel Valuch, currently an electrical engineer who is rapidly closing in on 25 years at the fabled institution.

You’ll recall Daniel from some of his side projects, like the most accurate pendulum clock in the world, or his super-clicky pseudorandom number generator. He’s also teaching at the university level, and we’ve seen him give back to the community with his work for the “ZENIT in Electronics” contest, an annual STEM event that’s currently in its 39th year of inspiring students. Daniel is going to stop by the Hack Chat so we can pick his brain about what it’s like to work at CERN, what kind of projects he’s worked on, and what a career in Big Science is all about.

Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, March 1 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

Click that speech bubble to the right, and you’ll be taken directly to the Hack Chat group on Hackaday.io. You don’t have to wait until Wednesday; join whenever you want and you can see what the community is talking about.

[Featured image: CERN, CC BY 4.0, via Wikimedia Commons]