Sniff Ethernet With A Throwing Star

[Michael Ossmann] came up with a nifty little device that arranges RJ45 plugs into a plus shape for the intent of sniffing Ethernet packets, and named it the “Throwing Star LAN Tap”. While the original design worked fine it does suffer some limitations such as being limited to 10/100 base networks, and one way only. This new version of the “Throwing Star LAN Tap” fixes those and adds some much needed convenience.

Gone are the male plugs, which requires couplers and are prone to break, and fiddly splices in favor of a throwing star shaped pcb, and female sockets. 1000 base networks are supported, but due to the workings of 1000 base and wanting to keep the device passive, capacitors are added to filter out the signal and force the network to drop down to 100 base. Sure, it may be an ugly hack, but it’s an ugly hack that fits in your pocket.

Electronic Tolling System

For us the hardest part of any project is coming up with the seminal idea. Once in a while you just need to cheat by recreating an existing product. That’s what EngineersGarage did with this toll plaza project. If you take a look around the various tabs at the top of that article you’ll see that they’ve used an 8051 microcontroller to bring together a character LCD, RFID reader, and a keypad. From there it’s a slew of coding to add the functionality for reading multiple tags, looking up stored value, and creating a replenishment system. Sure, it’s not really of much use in this form, but it’ll give you something to do with those shiny parts you have sitting around, and it might just lead you down a path to something more meaningful. As usual, there’s a demonstration video of this after the break.

If this doesn’t float your boat, perhaps this other RFID access system is more your thing.

Continue reading “Electronic Tolling System”

WWII’s Top Cryptography Comes To A Child’s Toy

This toy has some upgraded internals that turn it into an Enigma machine. We absolutely love the idea, as it takes a toy that your child may have grown out of, and uses it to provide teachable moments dealing with both history and mathematics. But who are we kidding? We want to make one just because it’s a fun project.

[Sketch] grabbed this toy from a thrift store because it has a full keyboard that he can use to make his own machine. It’s powered by an Arduino, with a four-line character LCD display taking the place of the original. His post covers the methods he used to figure out the keyboard wiring, and also contains a cursory overview of how the Enigma Machine functions. See a video of the finished project after the break.

If this wet your appetite, also check out the paper Enigma Machine we covered during Hackaday’s first year.

Continue reading “WWII’s Top Cryptography Comes To A Child’s Toy”

Sniffing RF Hardware Communication Packets

[Travis Goodspeed] put together a proof of concept hack that sniffs wireless keyboard data packets. He’s using the Next HOPE badge that he designed as the hardware platform for these tests. It has an nRF24L01+ radio on-board which can easily communicate with 2.4 GHz devices.

The real trick comes in getting that radio to listen for all traffic, then to narrow that traffic down to just the device from which you want data. He covers the protocol that is used, and his method of getting around MAC address verification on the hardware. In the end he can listen to all keyboard data without the target’s knowledge, and believes that it is possible to inject data using just the hardware on the badge.

Simple RFID Access System Clone

rfidbboards

A few months back, [John] was reading an article about a simple RFID security system kit, and decided he would like to build one himself.  While many of the system’s details, including full schematics were provided, he was dismayed to find that the source code for the project was not published as it was held under copyright by the manufacturer.  Believing that open source is better, he modified the original design, replacing their PIC controller with an ATmega328 armed with an Arduino bootloader.

His system replicates all of the original kit’s functionality, while offering plenty of opportunity for modification beyond the initial design.  The article contains a complete parts list, wiring schematic, and the Arduino code required to get things up and running.  He even has a video of his clone at work, demonstrating the acceptance and rejection of RFID tags as well as the system’s learning mode.

The Future Of Cyberattacks

[Dino A. Dai Zovi] gave a talk in the earlier part of 2010 where he shares his thoughts on the future of malicious exploits. You can watch it on Ustream and he’s also posted a set of slides (PDF) that goes along with it. We find the 48 minute video to be quite interested. Instead of going into mundane detail, he covers the broader picture; what has been done in the past, what will happen in the future, and how are we currently ill-equipped to respond to future threats? That last question is covered throughout the video, but seems to come back to the concept that we are stuck in a rut of terminology and past practice that is impeding our ability to innovate security strategies at the same rate that the bad guys are coming up with the next nasty thing to come down the pipeline.

Building Infra Red Light Sources With Regular Lights

[Oneironaut] sent us another IR hack. This time it is a writeup on the best ways to create IR light sources from regular lights. Since normal flashlight bulbs emit a broad enough spectrum to include visible light and IR light, this basically comes down to filtering. [Oneironaut] explores different light sources and different materials in depth, along with great pictures to show his results. This is a great resource if you’re needing to do some night vision for cheap.