A home-made wireless game controller

ColecoVision Barn Find Gets Wireless Makeover

Few things are more satisfying than finding an old, forgotten piece of technology somewhere and bringing it back to life. And while it’s great to see a rare sports car or an Apollo Flight Computer being restored, even not-very-successful game consoles from the 1980s can make for some great repair stories. Just look at how [Discreet Mayor] describes his restoration and modification efforts on a ColecoVision that he literally found in a barn.

Given that the ColecoVision was on the market between 1982 and 1985, we can assume that [Discreet Mayor]’s console had been sitting on a shelf for at least three decades, and the machine was definitely showing its age. Several components had failed due to corrosion, including the clock crystal, a 7400 series logic chip and a capacitor in the power supply, but since these are all standard components it was rather straightforward to replace them.

The controllers however were sadly beyond repair. Replacing them with standard joysticks wasn’t really an option because the ColecoVision controllers included a numeric keypad, which was mainly used to select game options. Making something completely new was the way to go, and [Discreet Mayor] decided to go for a wireless system while he was at it. After all, he had already developed a modular wireless IoT system based on the IEEE 802.15.4 standard, which turned out to be a perfect fit for this system.

The splash screen of ColecoVision's Venture[Discreet Mayor] built a simple joystick-plus-fire-button setup on a piece of MDF and equipped it with his IoT transmitter. Instead of adding a replacement numeric keypad he decided to use the joystick to simulate the most commonly-used buttons: “right” for “1”, “down” for “2” and so on. The receiver module uses digital switches to mimic keypresses to the console’s input port. The end result might look a bit hacky, but the console is fully functional again and runs its games just like it did over thirty years ago.

We’ve seen several projects that add wireless controllers to a variety of classic consoles. If you’ve got a ColecoVision that turns out to be beyond salvaging, you can always just build your own from scratch.

RFID Sticker On Bike Helmet Grants Garage Access

[Glen] might describe his project of opening his garage door by way of an RFID sticker on his bike helmet as simple, but some of the interfacing he needed to do was quite complex. He walks through the project from beginning to end, and there’s plenty to learn from.

When designing an RFID access control system, one has to decide what kind of reader and what kind of tags one wishes to use. They all function more or less the same way, but there are a lot of practical considerations to take into account such as cost, range, ease of use, and security options. After a lot of research, [Glen] decided on inexpensive sticker-style tags and a compatible reader supporting credentials with an ISO14443 UID that could be suitably mounted on a building’s exterior.

The actual opening of the door was the simple part, done by interfacing to a spare remote.

Breakout boards with ready-to-use code libraries exist for some RFID readers, but that wasn’t the case for the reader [Glen] had. He ended up rolling his own code to handle communication with the reader, with a Microchip PIC18F45K50 doing all the work of reading tags and performing access control. His code is on the project’s GitHub repository, and if you also find yourself needing to interface to a reader that uses the Wiegand protocol, you might want to give it a look.

Controlling the actual garage door was the easy part. All that took was soldering two wires across the switch contacts of a spare garage door opener remote, and using a relay to close the contacts. Simple and effective. You can see it in action in the short video, embedded below the break.

Overhead door access control might be a simple concept, but it comes in all shapes and sizes when enterprising hackers start looking for solutions. We’ve seen garage doors given the DIY IoT treatment, and even seen access controlled by a car’s headlamp flashes, which actually turned out to be more secure than it sounds.

Continue reading “RFID Sticker On Bike Helmet Grants Garage Access”

The WiFi Pumpkin Is The WiFi Pineapple We Have At Home

While networking was once all about the Cat 5 cables and hubs and routers, now most of us connect regularly in a wireless manner. Just like regular networks, wireless networks need auditing, and [Brains933] decided to whip up a tool for just that, nicknaming it the PumpkinPI_3.

The build is inspired by the WiFi Pineapple, which is a popular commercial pentesting tool. It runs the WiFi Pumpkin framework which allows the user to run a variety of attacks on a given wireless network. Among other features, it can act as a rogue access point, run man-in-the-middle attacks, and even spoof Windows updates if so desired.

In this case, [Brains933] grabbed a Raspberry Pi Zero W to run the framework. It was stuffed in a case with a Alfa Network AWUS036NHA wireless card due to its ability to run in monitoring mode — a capability required by some of the more advanced tools. It runs on a rechargeable LiPo battery for portability, and can be fitted with a small screen for ease of operation.

It should prove to be a useful tool for investigating wireless security on the go. Alternatively, you can go even leaner, running attacks off an ESP32.

Continue reading “The WiFi Pumpkin Is The WiFi Pineapple We Have At Home”

HunterCatNFC tool

Hunt Down NFC Signals With This NFC Multi Tool

NFC hacking can be a daunting task with many specialized tools, a proliferation of protocols, and a multitude of different devices. [ElectronicCats] has done a lot of work to try to make this investigation accessible by creating an open-source, hardware-certified NFC tool called the HunterCatNFC that can read and emulate a multitude of NFC devices.

The HunterCatNFC device is meant to be portable and self contained, with LED indicator lights that can give information about the various modes, and feedback about what data is being received. At its core, the HunterCatNFC has an NXP PN7150 NFC controller chip to handle the NFC communication. The main processing controller is a Microchip SAMD21 which also provides USB functionality, and the whole device is powered by a 3.7V 150mAh Li-ion battery.

The HunterCatNFC has three main modes, ’emulation’, ‘read/write’ and ‘peer-to-peer’. Emulation mode allows the HunterCatNFC to mimic the functionality of a passive NFC device, only responding when an NFC reader issues a request. The read/write mode allows it to emulate an NFC reader or writer, with the ability to communicate with nearby passive NFC devices. The peer-to-peer mode gives the device the ability to have two way communication, for instance, between two HunterCatNFC devices.

We’ve covered NFC hacking before, including the Flipper Zero. The HunterCatNFC is a fine addition to the NFC hackers arsenal of tools with some very nice documentation to learn from. For those not wanting to send out their own boards to be printed and assembled, [ElectronicCats] has them for sale.

Video after the break!

Continue reading “Hunt Down NFC Signals With This NFC Multi Tool”

Seeing If Cheating At Chess The Hard Way Is Even Possible

With all the salacious stories about a cheating scandal rocking the world of championship-level chess, you’d think that we’d have delved into the story at least a bit here on Hackaday, especially given the story’s technical angle. But we haven’t, and it’s not because we’re squeamish about the details of the alleged cheat; rather, it’s because it’s just too easy to pun your way through a story like this. The lowest-hanging fruit isn’t always the sweetest.

But, we’ll give it a go, and play this one completely straight as we look at an experiment to determine if it’s even possible to cheat in the specific way that has been alleged. For the uninitiated, 19-year-old grandmaster [Hans Niemann] stands accused of cheating, possible through the use of a remote-controlled sex toy secreted in his rectum. The idea would be for an accomplice to use the toy, which contains a vibrating motor that’s controlled by an app either via Bluetooth or WiFi, to send suggested moves to [Niemann] based on a chess-playing AI’s analysis of the game.

Whether [Niemann] cheated or not is not the concern here, but rather [Captain Steel]’s experiment is just a first-pass look at whether it would be possible to cheat using the proposed technology — and most importantly, not get caught. He tried to replicate the scanning regime [Niemann] is now subject to at tournaments based on the allegations to see if a stand-in for the sex toy — a haptic motor attached to an ESP32 — would be detectable through various thicknesses of flesh. Rather than showing the same dedication to craft that [Niemann] is alleged to have shown, [Captain Steel] used slices of baloney as a stand-in for human flesh. He then tried scanning for RF emissions from the device through increasing layers of luncheon meat. We won’t spoil the results, other than to say that baloney turns out to actually be good for something.

We’ve covered another less-invasive method of cheating before, which given the results above is probably more likely to be discovered.

Continue reading “Seeing If Cheating At Chess The Hard Way Is Even Possible”

A person sits on a couch in the background wearing a VR headset. A keyboard is on their lap and a backpack studded with antennas and cables sits in the foreground.

2022 Cyberdeck Contest: Cyberpack VR

Feeling confined by the “traditional” cyberdeck form factor, [adam] decided to build something a little bigger with his Cyberpack VR. If you’ve ever dreamed of being a WiFi-equipped porcupine, then this is the cyberdeck you’ve been waiting for.

Craving the upgradability and utility of a desktop in a more portable format, [adam] took an old commuter backpack and squeezed in a Windows 11 PC, Raspberry Pi, multiple wifi networks, an ergonomic keyboard, a Quest VR headset, and enough antennas to attract the attention of the FCC. The abundance of network hardware is due to [adam]’s “new interest: a deeper understanding of wifi, and control of my own home network even if my teenage kids become hackers.”

The Quest is setup to run multiple virtual displays via Immersed, and you can relax on the couch while leaving the bag on the floor nearby with the extra long umbilical. One of the neat details of this build is repurposing the bag’s external helmet mount to attach the terminal unit when not in use. Other details we love are the toggle switches and really integrated look of the antenna connectors and USB ports. The way these elements are integrated into the bag makes it feel borderline organic – all the better for your cyborg chic.

For more WiFi backpacking goodness you may be interested in the Pwnton Pack. We’ve also covered other non-traditional cyberdecks including the Steampunk Cyberdeck and the Galdeano. If you have your own cyberdeck, you have until September 30th to submit it to our 2022 Cyberdeck Contest!

Card's author typing on the IBM PC110's keyboard, with the Pico W-based card plugged into the PCMCIA slot on the left. PC110's screen shows successful ping 8.8.8.8.8.

Pi Pico W Does PCMCIA, Gets This IBM PC110 Online

Bringing modern connectivity to retro computers is an endearing field- with the simplicity of last-century hardware and software being a double-edged sword, often, you bring a powerful and tiny computer of modern age to help its great-grandparent interface with networks of today. [yyzkevin] shows us a PCMCIA WiFi card built using a Pi Pico W, talking PCI ISA. This card brings modern-day WiFi connectivity to his IBM PC110, without requiring a separate router set up for outdated standards that the typical PCMCIA WiFi cards are limited by.

The RP2040 is made to talk PCI ISA using, of course, the PIO engine. A CPLD helps with PCI ISA address decoding, some multiplexing, and level shifting between RP2040’s 3.3V and the PCI 5 V levels. The RP2040 software emulates a NE2000 network card, which means driver support is guaranteed on most OSes of old times, and the software integration seems seamless. The card already works for getting the PC110 online, and [yyzkevin] says he’d like to improve on it – shrink the design so that it resembles a typical PCMCIA WiFi card, tie some useful function into the Pico’s USB port, and perhaps integrate his PCMCIA SoundBlaster project into the whole package while at it.

This is a delightful project in how it achieves its goal, and a pleasant surprise for everyone who’s been observing RP2040’s PIO engine conquer interfaces typically unreachable for run-of-the-mill microcontrollers. We’ve seen Ethernet, CAN and DVI, along many others, and there’s undoubtedly more to come.

We thank [Misel] and [Arti] for sharing this with us!