New Chip Alert: The ESP8266 WiFi Module (It’s $5)

Every so often we run across something in the Hackaday tip line that sends us scurrying to Google, trying to source a component, part, or assembly. The ESP8266 WiFi module is the latest, made interesting because it pretty much doesn’t exist outside China.

Why is it cool? It’s a WiFi module with an SOC, making it somewhat similar to TI’s CC300 in conception (A.K.A. the thing that makes the Spark Core so appealing), in that a microcontroller on the module takes care of all the WiFi, TCP/IP stack, and the overhead found in an 802.11 network. It’s addressable over SPI and UART, making this an exceptionally easy choice for anyone wanting to build an Internet of Things thing; you can simply connect any microcontroller to this module and start pushing data up to the Internet. Oh, it’s also being sold for $5 in quantity one. Yes, for five dollars you can blink a LED from the Internet. That’s about half the price as the CC3000 itself, and a quarter of the price if you were to build a CC3000 breakout board.

There’s a catch, right, there’s always a catch. Yep. About two hours after this post is published it will be the number one English language Google result for “ESP8266.” As far as the English-speaking world is concerned, there is absolutely nothing to be found anywhere on the Internet on this module.

Seeed Studio recently sold a few of these modules for $7 and has some documentation, including a full datasheet and an AT command set. All the documentation is in Chinese. There’s also an “ESP8266 IoT SDK”, but from a quick glance at the code, this appears to be an SDK for the SOC on the module, not a simple way to connect the module to a microcontroller.

Anyone wanting to grab one of these modules can do so on Ali Express. Anyone wanting to do something with one of these modules will have a much more difficult time, most likely poking and prodding bits randomly with the help of Google translate. Should someone, or even a group of people, want to take up the task of creating a translation of the datasheet and possibly a library, we have a pretty collaborative project hosting site where you can do that. You may organize in the comments below; we’ll also be taking bets as to when a product using the ESP8266 will be found on Kickstarter. My guess is under a month.

EDIT: Here’s a translation of the datasheet and AT command set.

Edit two: [bafeigum] is writing a library go help him out.

Thanks [Liam] for the tip.

Bluetooth Low Energy Beacons In A Flock Of Birds

birds_ready

No, not real birds! [Kyle] works in operations at a web company and needed a way to send alerts to his fellow coworkers, so he modified a flock of Audubon Society plush birds to respond to a Bluetooth beacon.

Using NRF24L01+ Bluetooth Low Energy modules, [Kyle] installed one each in these battery-powered singing birds. The devices are presumably powered off of the battery that comes with the birds, but the use of the BTLE module means the batteries won’t discharge as rapidly.

[Kyle] also built an API that works over HTTP or IRC, which means that the employees in the office can activate everyone else’s birds over a simple and intuitive interface. The birds can be activated one at a time, or all together in “panic” mode as one giant flock (in case of an emergency in the office). They can also be activated one at a time on a specific hour to simulate the Audubon Society’s bird call clock.

He calls the device equail and it’s a very unique notification system with a lot of applications. All of [Kyle]’s code and documentation of his project are available on his github site. He also used this primer on BTLE to get started, and this guide on sending data over BTLE to help get the project in the air.

Sniffing NRF24L01+ Traffic With Wireshark

Wireshark trace

We’re sure that some of our readers are familiar with the difficult task that debugging/sniffing nRF24L01+ communications can be. Well, [Ivo] developed a sniffing platform based on an Arduino Uno, a single nRF24L01+ module and a computer running the popular network protocol analyzer Wireshark (part1, part2, part3 of his write-up).

As these very cheap modules don’t include a promiscuous mode to listen to all frames being sent on a particular channel, [Ivo] uses for his application a variation of [Travis Goodspeed]’s technique to sniff Enhance Shockburst messages. In short, it consists in setting a shorter than usual address, setting a fix payload length and deactivating the CRC feature. The Arduino Uno connected to the nRF24L01+ is therefore in charge of forwarding the sniffed frames to the computer. An application that [Ivo] wrote parses the received data and forwards it to wireshark, on which can be set various filters to only display the information you’re interested in.

Adding Bluetooth And A Lightning Connector To Beats Pro Headphones

Beats

Not wanting to wait for Apple to step up their game and complete their purchase of Beats headphones, [Carnivore] decided he wanted his own pair of Apple-compatible Beats cans with Bluetooth. He created something that will probably be for sale in the Apple store come Christmas: a pair of Beats Pro headphones with Bluetooth and a Lightning connector for charging.

[Carnivore] liked the sound of his Beats Pro headphones but hated the wires. After disassembling the headphones, he carefully rewired the speakers with smaller gauge wire, added a small Bluetooth module and battery, and sealed everything back up.

There are a few interesting bits to this build – by getting rid of all external wires, [Carnivore] was left with a few holes in the headphones. These were a perfect place to add a 3D printed mount for the power button and the Lightning adapter taken from an Apple Lightning extension connector.

Thanks [Tony] for the tip!

Hijacking Chromecast With The Rickmote Controller

rick-astelyWith a simple $35 dongle that plugs right into your TV, it’s possible to enjoy your favorite TV shows, YouTube channels, and everything else Chromecast has to offer. Being a WiFi enabled device, it’s also possible to hijack a Chromecast, forcing your neighbors to watch [Rick Astley] say he’s never going to give you up.

The rickmote, as this horrible device is called, runs on a Raspberry Pi and does a lot of WiFi shennaigans to highjack a Chromecast. First, all the wireless networks within range of the rickmote are deauthenticated. When this happens, Chromecast devices generally freak out and try to automatically reconfigure themselves and accept commands from anyone within proximity. The rickmote is more than happy to provide these commands to any Chromecast device, in the form of the hit song from 1987 and 2008.

Video demo of the rickmote below, along with a talk from ToorCon describing how the hijacking actually works.

Continue reading “Hijacking Chromecast With The Rickmote Controller”

A Lesson In Blind Reverse Engineering – Signals Intelligence

spread sheet of binary data

In a fit of desperation, I turned to data mining tools and algorithms, but stepped back from the horror of that unspeakable knowledge before my mind was shattered. That way madness lies.

–[Rory O’hare]

Wise words. Wise words, indeed. Who among us hasn’t sat staring into the abyss of seemingly endless data without the slightest clue to what it means or even how to go about figuring out what it means? To literally feel the brain damage seeping in as you start to see ‘ones’ and ‘zeros’ reach out to you from every day electronic devices…like some ghost in the wires. But do not fear, wise hacker! For we have good news to report! [Rory O’hare] has dived into this very abyss, and has emerged successful.

While others were out and about playing games and doing whatever non-hackers do to entertain themselves, [Rory O’hare] decided to reach out and grab some random wireless signals for a little fun and excitement. And what he found was not just a strong, repeating signal at 433Mhz. Not just a signal that oozed with evidence of ASK. What he found was a challenge…a mystery that was begging to be solved. A way to test his skill set. Could he reverse engineer a signal by just looking at the signal alone? Read on, and find out.

 

 

 

Seeker Hats Find Each Other With Directional LEDs

OLYMPUS DIGITAL CAMERA

[John Petersen] created a very cool piece of wearable technology for him and his son. Eager to explore the Maker Fair, but not eager to lose his son in the crowds, he’s come up with the Seeker Hat — a kind of auto-locating GPS hat which always points towards the other.

It’s a clever setup that makes use of a GPS module, a microprocessor, a xBee wireless chip, a compass, and LEDs to light the way. The GPS determines the hat’s approximate location, the xBee transmits it to the other hat, the digital compasses determine the directions of both hats, and the microprocessor figures out the azimuth, resulting in a difference in trajectory of the two — a strip of LEDs, like landing lights, direct you in the right direction.

Continue reading “Seeker Hats Find Each Other With Directional LEDs”