Linux Fu: Atomic Power

People are well aware of the power of virtual machines. If you want to do something dangerous — say, hack on the kernel — you can create a virtual machine, snapshot it, screw it up a few times, restore it, and your main computer never misses a beat. But sometimes you need just a little shift in perspective, not an entire make belive computer. For example, you are building a new boot disk and you want to pretend it is the real boot disk and make some updates. For that there is chroot, a Linux command that lets you temporarily open processes that think the root of the filesystem is in a different place than the real root. The problem is, it is hard to manage a bunch of chroot environments which is why they created Atoms.

The system works with several common distributions and you install it via Flatpak. That means you can launch, for example, a shell that thinks it is running Gentoo or Centos Linux under Ubuntu.

Continue reading “Linux Fu: Atomic Power”

Reverse Engineering Hack Chat With Matthew Alt

Join us on Wednesday, September 28 at noon Pacific for the Reverse Engineering Hack Chat with Matthew Alt!

Our world is full of mysteries, from the nature of time to how exactly magnets work. There are some things that we just have to accept that no matter how hard we look, we’ll never get a complete answer, especially in the natural world. The constructed world is another thing, though. It doesn’t seem fair that only a relatively few people have the inside scoop on the workings of everyday things, like network routers, game consoles, and even the vehicles we drive. Of course, the companies that make these things have a right to profit from their intellectual property, but we as consumers also have a right to be curious about how these things work and to understand what the software running on these devices is doing on our behalf.

join-hack-chatLuckily, what can be engineered can be reverse engineered, if you have the right tools and the skills to use them. It can be a challenge, but it’s one Matthew Alt has taken on plenty of times. We’ve seen him deep-dive into JTAG, look at serial wire debugging, and recently even try some glitching attacks. In fact, he even taught a HackadayU course on reverse engineering with Ghidra. And now he’ll drop by the Hack Chat to talk all about reverse engineering. Join us with your questions, your exploits, and your ideas on how to go where no hacker has gone before.

Our Hack Chats are live community events in the Hackaday.io Hack Chat group messaging. This week we’ll be sitting down on Wednesday, September 28 at 12:00 PM Pacific time. If time zones have you tied up, we have a handy time zone converter.

Hackaday Links Column Banner

Hackaday Links: September 25, 2022

Looks like there’s trouble out at L2, where the James Webb Space Telescope suffered a mechanical anomaly back in August. The issue, which was just announced this week, involves only one of the six imaging instruments at the heart of the space observatory, known as MIRI, the Mid-Infrared Instrument. MIRI is the instrument on Webb that needs the coldest temperatures to work correctly, down to six Kelvins — we’ve talked about the cryocooler needed to do this in some detail. The problem has to do with unexpectedly high friction during the rotation of a wheel holding different diffraction gratings. These gratings are rotated into the optical path for different measurements, but apparently the motor started drawing excessive current during its move, and was shut down. NASA says that this only affects one of the four observation modes of MIRI, and the rest of the instruments are just fine at this time. So they’ve got some troubleshooting to do before Webb returns to a full program of scientific observations.

There’s an old saying that, “To err is human, but to really screw things up takes a computer.” But in Russia, to really screw things up it takes a computer and a human with a really poor grasp on just how delicately balanced most infrastructure systems are. The story comes from Moscow, where someone allegedly spoofed a massive number of fake orders for taxi rides (story in Russian, Google Translate works pretty well) through the aggregator Yandex.Taxi on the morning of September 1. The taxi drivers all dutifully converged on the designated spot, but instead of finding their fares, they just found a bunch of other taxis milling about and mucking up traffic. Yandex reports it has already added protection against such attacks to its algorithm, so there’s that at least. It’s all fun and games until someone causes a traffic jam.

Continue reading “Hackaday Links: September 25, 2022”

Honor Your Hacker Heroes

We recently ran an article on a sweet percussion device made by minimal-hardware-synth-madman [Gijs Gieskes]. Basically, it amplifies up an analog meter movement and plays it by slamming it into the end stops. Rhythmically, and in stereo. It’s got that lovely thud, plus the ringing of the springs. It takes what is normally a sign that something’s horribly wrong and makes a soundtrack out of it. I love it.

[Gijs] has been making electro-mechanical musical hacks for about as long as I’ve been reading Hackaday, if not longer. We’ve written up no fewer than 22 of his projects, and the first one on record is from 2005: an LSDJ-based hardware sequencer. All of his projects are simple, but each one has a tremendously clever idea at its core that comes from a deep appreciation of everything going on around us. Have you noticed that VU meters make a particular twang when they hit the walls? Sure you have. Have you built a percussion instrument out of it? [Gijs] has!

Maybe it’s a small realization, and it’s not going to change the world by itself, but I’ve rebuilt more than a couple projects from [Gijs]’ repertoire, and each one has made my life more fun. And if you’re a regular Hackaday reader, you’ve probably seen hundreds or thousands of similar little awesome ideas played out, and maybe even taken some of them on as your own as well. When they accumulate up, I believe they can change the world, at least in the sense of filling up a geek’s life. I hope that feeling comes across when we write up a project. Those of you out there hacking, we salute you!

Hackaday Podcast 186: Weighing Cats, Slamming VU Meters, Slimmer Skimmers, And Clean Air On The Cheap

Hackaday Editor-in-Chief Elliot Williams took time out from Supercon planning to join Staff Writer Dan Maloney for a look through the hacking week that was. We always try to keep things light, but it’s hard sometimes, especially when we have to talk about wars past and present and the ordnance they leave behind. It’s also not a lot of fun to talk about a continent-wide radio outage thanks to our angry Sun, nor is learning that a wafer-thin card skimmer could be lurking in your ATM machine.

But then again, we did manage to have some fun by weighing cats to make sure they’re properly fed, and making music by pegging VU meters. We also saw how to use PCBs to make a beautiful yet functional circuit sculpture, clean up indoor air on a budget, and move microns with hardware store parts. And we also got to celebrate a ray of international hope by looking back on the year that taught us much of what we know about the Earth.

Check out the links below if you want to follow along, and as always, tell us what you think about this episode in the comments!

Direct download here!

Continue reading “Hackaday Podcast 186: Weighing Cats, Slamming VU Meters, Slimmer Skimmers, And Clean Air On The Cheap”

This Week In Security: Malwarebytes Goes Nuts, Uber

I got a rude awakening Wednesday morning this week. HaD writers don’t necessarily keep normal hours — don’t judge. A local client called, complaining that Google Maps was blocking on one of their computers, and the browser stated that it was a malicious site. Well that got my attention. Standard incident response: “Turn off the affected computers, I’m on my way.” Turns out, it was Malwarebytes that was complaining and blocking Google Maps, as well as multiple other Google domains. That particular machine happened to have a fresh install of the program, and was still in the trial period of Malwarebytes premium, which includes the malicious IP and domain blocking feature.

Oof, this could be bad. The first possibility that came to mind was a DNS hijack. The desktop’s DNS was set to the router, and the router’s DNS was set to the ISP’s. Maybe the ISP had their DNS servers compromised? Out came the cell phone, disconnected from the WiFi, for DNS lookups on some Google domains. Because Google operates at such a massive scale, they have multiple IPs serving each domain, but since the two different results were coming from the same subnet, the suspicious DNS server was likely OK. A whois on the blocked IP also confirmed that it was a Google-owned address. We were running out of explanations, and as a certain fictional detective was known for saying, “whatever remains, however improbable, must be the truth.” And, yes, Malwarebytes did indeed accidentally add Google to its bad list. The upside was that my customer wasn’t compromised. The downside? I had to answer a phone call before my first cup of coffee. Blegh.

Continue reading “This Week In Security: Malwarebytes Goes Nuts, Uber”

A Love Letter To Small Design Teams, And The B-52

The true measure of engineering success — or, at least, one of them — is how long something remains in use. A TV set someone designed in 1980 is probably, at best, relegated to a dusty guest room today if not the landfill. But the B-52 — America’s iconic bomber — has been around for more than 70 years and will likely keep flying for another 30 years or more. Think about that. A plane that first flew in 1952 is still in active use. What’s more, according to a love letter to the plane by [Alex Hollings], it was designed over a weekend in a hotel room by a small group of people.

A Successful Design

One of the keys to the plane’s longevity is its flexibility. Just as musicians have to reinvent themselves if they want to have a career spanning decades, what you wanted a bomber to do in the 1960s is different than what you want it to do today. Oddly enough, other newer bombers like the B-1B and B-2 have already been retired while the B-52 keeps on flying.

Continue reading “A Love Letter To Small Design Teams, And The B-52”