Learn IC Decapping

Decapsulating ICs used to be an exotic technique. (I should know, I did that professionally for one of the big IC vendors back in the 1980s.) These days, more and more people are learning to take apart ICs for a variety of reasons. If you are interested in doing it yourself, [Juan Carlos Jimenez] has a post you should read about using acid to remove epoxy from ICs.

[Juan Carlos] used several different techniques with varying degrees of success. Keep in mind, that using nitric acid is generally pretty nasty. You need safety equipment and be sure to plan for bad things to happen. Have eyewash ready because once you splash acid in your eye, it is too late to get that together.

Continue reading “Learn IC Decapping”

The Cable Modem To SDR Transformation

What do you do with an old cable modem in a closet? If you are [stdw] you reverse engineer it and turn it into a software-defined radio. The modem in question was a Motorola MB7220. After looking at a similar project using a different modem, it seemed like it should be doable.

Cracking open the case revealed two likely UART ports, one of which was active. The output from that UART provided a lot of info. The chip was a Broadcom BCM3383 which is a MIPS processor. It had eCos as an operating system. However, the bootloader eventually disables the UART, so there wasn’t much more investigation possible via the serial terminal.

The next step was to dump the flash memory. That required a little solder surgery to prevent the board from starting while the flash chip had power. It appeared that some key credentials and configuration data were present, but they were really backups. After doing a factory reset to remove the backups, the right data was apparent.

After some lengthy exploration, the diagnostic that builds a spectrum display gave up its data. At first, the data was just a small sample of what was really required, but it did show a local FM station as a spectrum. Eventually, the data loss rate was down to about 12% when streaming which is not great, but good enough. You can hear an audio clip of the reception. Not exactly crystal-clear quality, but not bad.

Of course, no one will use this for an FM radio. But it is a fascinating view into how far you can hack into a device like this if you have some skills and patience. There must be something about quarantine that is making people hack old gear, as we just recently saw a similar Netgear hack. Even cheap games aren’t safe.

Official Teardown Gives Unexpected Look Into PS5

With Sony and Microsoft still a month away from the public release of their next-generation game consoles, you’d expect technical details of their respective systems to still be under a veil of secrecy. But both companies look to be taking things a bit differently this generation, as it becomes increasingly clear that modern consumers are interested in what makes their devices tick. Today, Sony really threw down the gauntlet by beating the tech media to the punch and posting their own in-depth teardown on the new PlayStation 5.

Unsurprisingly, the video after the break is almost entirely in Japanese. But even if you don’t know the language, there’s plenty of interesting details to be had. For one thing, the heatsink and fan that cools the PS5’s AMD CPU and GPU are collectively so massive that they appear to take up most of the console’s internal volume.

In fact, the heatsink itself is so large that the motherboard is actually mounted to it instead of the other way around. So if you want to take out the board, you have to unbolt it from the heatsink and remove it first. In the process you’ll expose the unique liquid metal thermal compound that Sony apparently developed specifically for this application. Good luck to you if any dust gets in that expensive-looking goop.

It’s also interesting to note that, unlike the previous two generations of Sony consoles, the PS5 has no discrete hard drive. Instead, onboard flash with a custom controller is used to provide 825 GB of storage for software. Hopefully Sony has put the requisite amount of R&D into their wear leveling, as a shot flash chip will mean a whole new motherboard. That said, gamers with extensive collections will be happy to see there appears to be an expansion bay where you can install your own M.2 drive.

Between this and the recent PS4 assembly line tour, it’s refreshing to see a company like Sony be a bit more transparent. After years of adversarial treatment from the tech giants, we’d almost forgotten that the customer is supposed to be king. Continue reading “Official Teardown Gives Unexpected Look Into PS5”

Hacking A Netgear Router

Have you ever wanted to watch someone reverse engineer a piece of hardware and pick up some tips? You can’t be there while [Jeremy] tears open a Netgear N300 router, but you can see his process step by step in some presentation charts, and you’ll get a few ideas for the next time you want to do something like this.

The first part of the presentation might be a little basic for most Hackaday readers, but presumably, the intended audience might not know much about soldering or multimeters. But we enjoyed the methodology used to work out the UART pins on the board. We would have read the baud rate with the scope, which [Jeremy] does, but he also mentions a script to work it out and create a minicom profile that looked interesting.

Continue reading “Hacking A Netgear Router”

Teardown: BlackBerry Smart Card Reader

Years before Steve Jobs showed off the first iPhone, the BlackBerry was already the must-have accessory for mobile professionals. Back then, nobody was worried about watching movies or playing the latest games on their mobile devices, they just wanted a secure and fast way to send and receive email on the go. For that, the BlackBerry was king.

Fast forward to today, and the company is just a shell of what it once was. They don’t even bother making their own hardware anymore. Over the last several years they’ve opted to partner with a series of increasingly obscure manufacturers to produce a handful of lackluster Android phones so they still have something to sell to their dwindling userbase. Anyone excited about the new 5G BlackBerry being built by Texas start-up OnwardMobility? Did you even know it was in the works before now?

A DoD Common Access Card

But this article isn’t about BlackBerry phones. It’s about something that’s evenĀ more irrelevant to consumers: the BlackBerry Smart Card Reader. Technically, this little device isn’t dependent on the phones of the same name, but it makes sense that Research In Motion (which eventually just renamed itself to BlackBerry Limited) would market the gadget under the brand of their most popular product. Though as you might expect, software was available to allow it to work with the BlackBerry phone that you almost certainly owned if you needed a dedicated smart card reader.

For those who might not be aware, a smart card in this context is a two-factor authentication token contained in an ID card. These are used extensively by organizations such as the Department of Defense, where they’re known as Common Access Cards, that require you to insert your ID card into a reader before you can log into a secure computer system. This sleek device was marketed as a portable reader that could connect to computers over USB or Bluetooth. Worn around your neck with the included lanyard, the battery-powered reader allowed the card itself to remain on the user’s body while still being readable by nearby devices.

Civilians will recognize the basic technology from modern “Chip and PIN” debit and credit cards, but we’ve never had to stick one of those into our laptop just to log in. To be sure, the BlackBerry Smart Card Reader was never intended for the average home computer user, it was sold to companies and organizations that had tight security requirements; which just so happened to be the same places that would likely already be using BlackBerry mobile devices.

Of course, times and technology change. These devices once cost $200 apiece and were purchased in vast quantities for distribution to trusted personnel, but are now all but worthless. Even in new and unopened condition, they can be had for as little as $10 USD on eBay. For that price, it’s certainly worth taking a peek inside. Perhaps the hacker community can even find new applications for these once cutting-edge devices.

Continue reading “Teardown: BlackBerry Smart Card Reader”

Cheap Current Probe Gets Good Review

A current probe isn’t a very common fixture on most workbenches because they are pretty expensive. [VoltLog] looks at a fairly inexpensive current probe from Micsig. He seemed impressed with the workmanship and it looks similar to more expensive offerings. There are two models with different bandwidth numbers (800 kHz and 2 MHz). It can measure current on a 10A and 100A scale.

According to [VoltLog] comparable probes from other vendors are more expensive and have lower bandwidth. He also liked that the device powers from USB since most newer scopes will have a USB port available.

Continue reading “Cheap Current Probe Gets Good Review”

Teardown: Mini GPS Jammer

If you spend enough time trolling eBay for interesting electronic devices to take apart, you’re bound to start seeing suggestions for some questionable gadgets. Which is how I recently became aware of these tiny GPS jammers that plug directly into an automotive 12 V outlet. Shipped to your door for under $10 USD, it seemed like a perfect device to rip open in the name of science.

Now, you might be wondering what legitimate uses such a device might have. Well, as far as I’m aware, there aren’t any. The only reason you’d want to jam GPS signals in and around a vehicle is if you’re trying to get away with something you shouldn’t be doing. Maybe you’re out driving a tracked company car and want to enjoy a quick two hour nap in a parking lot, or perhaps you’re looking to disable the integrated GPS on the car you just stole long enough for you to take it to the chop shop. You know, as one does.

But we won’t dwell on the potentially nefarious reasons that this device exists. Hackers have never been too choosy about the devices they investigate and experiment with, and there’s no reason we should start now. Instead, let’s take this piece of gray-area hardware for a test drive and see what makes it tick.

Continue reading “Teardown: Mini GPS Jammer”