Reverse Engineering The Nike+ Hardware

The Nike+ hardware is obviously an interesting device.  We haven’t heard a whole lot about hacking one until now, but [Dimitry] has decided to change that. Many would assume that the data transmitted off of these sensors is quite simple, however there’s a bit more than meets the eye. Amongst other challenges, all the data packets coming out of the transceiver are encrypted. [Dimitry] claims to have decoded this data stream and made use of it.

This hack also outlines how one can use this without the stock iPod receiver using a 2.4 GHz chip from Sparkfun. A lot of work has been done to figure out how these packets are decoded and the process one goes through to do this is well outlined in this post. This could serve as a good example for those wanting to figure out similar devices.

One thing [Dimitry] hasn’t done yet is release the source code for this hack. He cites some ethical issues that might not seem obvious on first glance, including the ability to follow someone in a crowd or simply jamming their data. He does add though that if you have a good reason for wanting it, to simply email him. We’re looking forward to what [Dimitry] comes up with in the future using this setup!

Wireless Hackerspace Music Control

skipbutton_bitlair.nl

The crew at the Netherlands-based Bitlair hackerspace love their music, and have set up a digital jukebox for their workshop using mpd and fookebox. One problem that you run into with a bunch of different people working in one place is that everyone has their own distinct taste in music. The rhythmic “wub wub wub” of Dubstep might be great for some while leaving others trying to solder while simultaneously covering their ears. To ensure that everyone can exercise a musical veto (a la Empire Records) now and again, they built a Skipbutton which allows members to change what’s playing.

The button allows users to skip to the next song in the queue. as well as to control the volume of the space’s sound system. It uses an Arduino pro mini to run the show, sending signals to the mpd daemon using a 433 MHz transmitter. Bitlair is pretty large and they often spend time outdoors, so they had to ensure that the Skipbutton worked wherever they did. To do this, they built a Yagi-Uda antenna at the receiving end to ensure that the button functions no matter where it’s being triggered from.

Check out their wiki if you’re interested in making a similar system for your home or hackerspace – all of the code and schematics are available for the taking.

RF Sniffing On-the-go

It’s been a while since we checked in on [Travis Goodspeed]. His latest post makes RF sniffing with the Next HOPE badge more portable by ditching the need to display data on a computer. He’s built on the work he did at the beginning of the year, replacing the FTDI chip on the badge with a Bluetooth module. Now he can use his Nokia N900 as a GoodFET terminal to not only display the packets pulled from the air, but the control the badge as well.

Previously, the client running on the computer was communicating with the badge via a serial connection. To get it working on the N900 [Travis] transitioned from using py-serial over to using py-bluez. All of the code changes are available from the GoodFET repository.

He’s got a few other tricks planned for this concept. He put in a parts order to add Bluetooth to the Girltech IM-ME. The pretty pink pager has the same radio chip on board, so adding Bluetooth connectivity will allow it to be used in the same way. There are also plans in the works to add a couple other packet sniffing protocols to the bag of tricks, including ZigBee.

WiFi Jamming Via Deauthentication Packets

[Elliot] put together an intriguing proof-of-concept script that uses repeated deauthentication packet bursts to jam WiFi access points. From what we can tell it’s a new way to use an old tool. Aircrack-ng is a package often seen in WiFi hacking. It includes a deauthentication command which causes WiFi clients to stop using an access point and attempt to reauthenticate themselves. [Elliot’s] attack involves sending repeated deauthenitcation packets which in essence never allows a client to pass any data because they will always be tied up with authentication.

After the break you can see a video demonstration of how this works. The script detects access points in the area. The attacker selects which ones to jam and the script then calls the Aircrack-ng command. If you’ve got an idea on how to protect against this type of thing, we’d love to hear about. Leave your thoughts in the comments.

Continue reading “WiFi Jamming Via Deauthentication Packets”

rfid_door_lock_tutorial

Easily Movable RFID Door Lock Is Great For Dorm Rooms

One of the first things that [Eric] hacked together when he got to college was an RFID door locking system. He found that he was often in a rush to get in and out of his dorm room, and that using a simple wireless key was a great way to streamline his days.

Over the years, he has refined his design, and while his original prototype was functional, it was a bit rough around the edges. In the video posted on his site, he thoroughly explains how his system was built, and shows off the revisions he has made over time. One key consideration when building this system was the fact that the installation had to be non-permanent. Since schools typically frown on physically altering your rooms, he found a non-intrusive means to mount his system in the way of zip ties and foam board.

His RFID door lock looks to work quite nicely, and we especially like the inclusion of the reed switch to ensure that the system knows if the door has been opened or not. If you have about half an hour to spare and are interested in building an RFID entry system of your own, be sure to check out [Eric’s] video below for all the details.

Continue reading “Easily Movable RFID Door Lock Is Great For Dorm Rooms”

La Crosse Weather Station Wireless Data Acquisition

hacking_wireless_data_transfer_lacross_ws2305

Hackaday reader [equinoxefr] posted some images to our flickr pool showing off some modifications he made (Google Translation) to his La Crosse WS2305 weather station. Having built other router-based weather stations in the past, [equinoxefr] was looking for a better way to gather weather data after one of the routers gave up the ghost.

With a brand new La Crosse WS2305 in hand, his goal was to feed the Lacross’ data to his HTPC which runs XBMC. He pulled the weather station apart and probed around with an oscilloscope until he could find the TTL Tx and Rx pins required to retrieve data from the unit. He hooked the data pins to an XBee wireless transmitter, which he then tucked away in the station’s battery compartment.

Another XBee unit was connected to his computer via an XBee Explorer board, and he was reading data from his weather station in no time.

While his isn’t the first La Crosse weather station hack we’ve seen around here, we like how simple and clean it is. If you’re interested, be sure to check out his flickr stream to see more images of the hacking process.

Making A Bluetooth Headset Into A Wireless Music Streaming Device

This bluetooth headset hack, although simple, may provide some hacking inspiration. Turning a Bluetooth headset into a wireless input for one’s stereo is definitely something that makes one think “why didn’t I think of that?” It’s also good if you’ve got a tight hacking budget as there’s not a lot of stuff to buy.

In addition to a possibly broken headset, a 3.5mm stereo plug and some wires are needed for this. Throw in some tools that every good hacker should have around like a soldering iron and glue gun and you’re ready to get started. [Dex] does a good job of describing the process, from disassembling the headset to wiring the stereo plug to it. When making the conversion, one must remember to bridge the left and right output channels, as most headsets only output a mono signal.

There’s not a whole lot else required to do this hack.  Could be a good beginner project. For another Bluetooth-based hack using scrounged equipment, check out this Cellphone controlled retro-radio hack.