Tales From The Hackaday “tip Line”

surprisingly accurate portrayal of Caleb

Lets just start right off and acknowledge that the word “Hack” is in our site name. We all see it. It is right there, in plain English. However, anyone who spends more than a few nanoseconds looking down below that big name, will quickly see that the kind of hacking we do is more like McGyver and less like Operation Swordfish.

This exceedingly obvious point is missed by many, many people. We get tons of requests coming in for various acts of hackery. They range from nonsense gibberish to flagrant lies. Yeah, sure you forgot your password and the recovery system isn’t working. Oh they stole your website but you can’t prove that you’re the owner? Hrm, you want to be a master hacker and are seeking our guidance on how to steal money?

Join me after the break for a few actual examples.

Continue reading “Tales From The Hackaday “tip Line””

Open Source Tracking System Gets A Kickstarter

open-source-tracker

Many of the hacks featured here inspire others to build on the creator’s work, and on occasion the positive feedback brings the hack to market. Last year we told you about [Wayne’s] creation, a system aimed at tracking down would-be game console thieves. He received a bunch of requests to document the tracker in full, so he decided to revise his creation and release it as Open Source Hardware.

As you might remember, his original tracking device was powered by an Arduino, which monitored an accelerometer and GPS sensor, reporting coordinates and movements to his mobile phone on demand. He combined the disparate components together on a single board, and started a Kickstarter for the project.

Aside from his original purpose of tracking stolen goods, he lists off an array of other uses, such as tracking the driving habits of your newly licensed teen, geofencing objects in certain areas and more.

If an SMS controlled all-in-one tracking system is something you might be interested in, check out his Kickstarter, or take a look at the documentation and build one of your own.

Brute Force A Password Protected PDF Using The BeagleBone

The biggest benefit to using the BeagleBone is it’s 700 MHz ARM processor. If you’re just messing around with basic I/O that power is going unused, but [Nuno Alves] is taking advantage of its power. He built a PDF password cracker based on the $85 development board.

We recently saw how easy it is to perform basic I/O using the BeagleBone. Those techniques are in play here, used to drive a character LCD and sample a button input from the breadboard circuit. [Nuno] even published separate posts for each of these peripheral features.

The password protected PDF file is passed to the device on a thumb drive. Since the BeagleBone is running embedded Linux you don’t need to mess around with figuring out how to read from the device. A click of the button starts the process. Currently the code just uses a brute force attack which can test more than 6000 four-character passwords per second.  This is quite slow for any password more than four or five characters long, but [Nuno] does mention the possibility of running several ARM processors in parallel, or using a dictionary (or rainbow table) to speed things up. Either way it’s an interesting project to try on the hardware. You can see his video demo of the device after the break.

Continue reading “Brute Force A Password Protected PDF Using The BeagleBone”

Dead HDD Smartphone Stand Still Holds Secret Data

We’ve actually got a few dead hard drives collecting dust so when we hear about a project that finds a use for one we perk up a bit. But we were somewhat disappointed when we discovered this was a smartphone stand, pen holder, and LED lamp in one. We just don’t have a use for this kind of triple-tasker. But wait… the dead drive has a secret. It still serves as data storage, if you know how to enabling the drive within.

As you can seen, [Samimiy] removed all the guts of the HDD, repurposing the platters and mounting brackets as the phone holder, and mounting plate for a couple handfuls of LEDs. The lamp portion can be adjusted thanks to the articulated based from a small desk lamp he had in his parts bin. The device receives power from the USB connector you can see in the upper right. That’s where the first part of the secret comes in. This isn’t just supplying power, it provides a USB connection to the thumb drive hidden inside the HDD case. But just connecting it to your computer won’t mount it. [Samimy] took the light sensor from an automatic nightlight and set it up below the pen holder. If you shine a flashlight down the hole in that piece of wood it will routed power to the secret USB drive causing it to enumerate on your system. Pretty clever! Take a look at his build video after the break.

We wonder if there’s a way to incorporate this light-based lock system into that mouse-mounted thumb drive.

Continue reading “Dead HDD Smartphone Stand Still Holds Secret Data”

Steganography In Xkcd Comics Without The Img Alt Tag

Inspired by a recent Hackaday post [austin] decided to try his hand at steganography. Steganography, or ‘concealed writing’ has come a long way from ancient Greek slaves/couriers shaving their head, tattooing a message on their scalp, and regrowing their hair. We recently saw a music file masquerading as a picture of a kitten, but that method of hiding data required running a Ruby script. [austin] thought steganography would be a great way to hone his JavaScript skills, so he made an image encoder and decoder purely in JS and HTML.

Like the previous incarnation, [austin]’s work takes a regular .PNG image file and hides stuff in the pixel data. A few of the lower bits for each pixel are modified (three bits from the red and blue, two bits from the green – a good choice, the human eye is very sensitive to green) and a file is embedded inside the .PNG image.

For an example, [austin] embedded some stuff inside the xkcd comic underneath this post’s title. Even though the image is mostly white, we can’t see anything wrong with the colors. If you’d like to decode the message, [austin] put his encoder and decoder up on github. Feel free to take a shot at it.

USB Dongle Generates And Enters Your Passwords So You Don’t Have To

usb-password-dongle

Like many businesses out there, [Joonas Pihlajamaa’s] employer requires him to change his password every few months. Instead of coming up with a complex, yet easy to remember password again and again, he built a small USB device to do the work for him.

He dismantled an old USB memory stick, fitting it with an ATtiny85 with its required components on a small piece of perfboard. Using the knowledge he gleaned from his previous USB HID tinkering, he programmed the ATtiny to act as a USB keyboard which enters his password for him whenever he plugs it in.

The USB dongle not only types his password in for him, it can generate a new password with a few simple keystrokes whenever he desires. Obviously it merely takes someone getting their hands on his USB stick to compromise security, but it does beat a Post-It under the keyboard any day.

Continue reading to see a short video of his USB password dongle in action, and be sure to swing by his site for more details on how it was all put together.

Continue reading “USB Dongle Generates And Enters Your Passwords So You Don’t Have To”

This Image Contains A Hidden Audio Track

This image contains a hidden audio track which you’re very familiar with. Well, it used to. We’d bet we messed up the careful encoding that [Chris McKenzie] used to hide data within an image when we resized the original.

He’s using a method called Steganography to hide a message in plain sight. Since digital images use millions of colors, you can mess with that color data just a bit and the eye will not really be able to pick up any difference. Each pixel has had the eight least significant bits swapped out for the data [Chris] is hiding. Since the image uses 24-bit color, the largest possible change (going from 0 to 255) in those bottom eight bits will only result in a color change of about 0.15%. And that’s only for one pixel; in most cases the change will be much less.

He shows his work, both decoding and encoding using Ruby, and even provides a one-liner which lets you playback the audio without downloading anything (just make sure you’ve got all of the dependencies installed). Never gonna give, you, up…

[via Reddit]