Ekahau HeatMapper Maps Out WiFi Signals

see_wireless_configs_large

The term ‘warwalking’ isn’t used very often, but the Ekahau HeatMapper adds a new tool to the pod bound hacker’s arsenal. The tool maps out wireless access points as well as their signal strength within a facility. A test of the HeatMapper on a map made with AutoDesk Dragonfly accurately determined the location of a router within 3 feet and helped tune the angle it needed to be at for maximum range. Ekahau made a fantastically cheesy promotional video for their product, which is viewable after the jump. The program is free of charge, but unfortunately only runs on windows, so mac and *nix users are out of luck, though it might run under wine.

Continue reading “Ekahau HeatMapper Maps Out WiFi Signals”

Keykeriki: Wireless Keyboard Sniffer

[vimeo = 4990390]

Remote-Exploit.org is releasing Keykeriki, a wireless keyboard sniffer. The project is both open source hardware and software. you can download the files on their site. Right now you can’t get a pre made board, but they plan on releasing one soon. The system can be upgraded with “backpacks” or add on modules. One of these is going to be an LCD that displays the keystrokes of the keyboard you are sniffing. Another is supposed to serve as an interface to your iPhone.  Right now it has the ability to decode Microsoft wireless keyboards, but the Logitech pieces should be added soon.

WiNet, Wireless Arduino Touchscreen

winet

Liquidware has put together an interesting kit called the WiNet. It has a battery powered touchscreen controlled by an Arduino. Using an XBee shield, it can send commands to a paired XBee and Arduino attached to a computer. The computer can also update the touchscreen display. This is demoed in the video below. It’s a unique interface, but the TouchShield alone costs $174 so we’re guessing you’re going to be pretty damn confident in your project before you go this route.

Continue reading “WiNet, Wireless Arduino Touchscreen”

Wireless Portable USB Tether

USB

[Pete] has put together a fairly simple writeup on building a wireless USB tether for your DSLR. He’s basically using a pair of USB wireless adapters and a battery pack. In his original version, he did some slight modification to the dock that powers the USB dongle, adding his own battery pack too. He notes that this whole project can be done without the effort he put into it, at a little more expense.  The only improvement we think would be nice would be a better way to package it to keep it out of the way while you shoot.

D-Link Router Captcha Broken

d-link

We reported last week that D-Link was adding captchas to their routers to prevent automated login by malware. Unsurprisingly, it doesn’t work all time. The team from SourceSec grabbed the new firmware and began poking at it. They found that certain pages don’t require the authentication to be passed for access. One of these is WPS activation. WPS lets you do push button WPA configuration. Once activated, any nearby client can request the WPA key using a tool like WPSpy. Only user level credentials are needed to pull this off, so changing just the admin password won’t prevent it.

[photo: schoschie]

Magic Wands For Disney

[NRP] sent us a few of his projects. The most notable of the bunch was a school project funded by Disney. They were to make some kind of interactive entertainment for people waiting in line for rides. They decided on a wand style interface. Each wand has an accelerometer, an IR LED for tracking, an XBee unit, and a few buttons for interaction. They wrote some custom games and a multi person white board to test it all out.  You can see those in action, along with a space themed pong game in the video after the break. Even though this was funded by Disney, you can still find all the source code and schematics, available for free.

Continue reading “Magic Wands For Disney”

D-Link Adds Captcha To Routers

D-Link is adding captcha support to its line of home routers. While default password lists have been abundant for many years, it was only recently that we started seeing the them implemented in malware. Last year, zlob variants started logging into routers and changing their DNS settings. It’s an interesting situation since the people who need the captcha feature are the ones who will never see it, since they won’t log in to change the default password.

[photo: fbz]