The WiFi Pumpkin Is The WiFi Pineapple We Have At Home

While networking was once all about the Cat 5 cables and hubs and routers, now most of us connect regularly in a wireless manner. Just like regular networks, wireless networks need auditing, and [Brains933] decided to whip up a tool for just that, nicknaming it the PumpkinPI_3.

The build is inspired by the WiFi Pineapple, which is a popular commercial pentesting tool. It runs the WiFi Pumpkin framework which allows the user to run a variety of attacks on a given wireless network. Among other features, it can act as a rogue access point, run man-in-the-middle attacks, and even spoof Windows updates if so desired.

In this case, [Brains933] grabbed a Raspberry Pi Zero W to run the framework. It was stuffed in a case with a Alfa Network AWUS036NHA wireless card due to its ability to run in monitoring mode — a capability required by some of the more advanced tools. It runs on a rechargeable LiPo battery for portability, and can be fitted with a small screen for ease of operation.

It should prove to be a useful tool for investigating wireless security on the go. Alternatively, you can go even leaner, running attacks off an ESP32.

Continue reading “The WiFi Pumpkin Is The WiFi Pineapple We Have At Home”

HunterCatNFC tool

Hunt Down NFC Signals With This NFC Multi Tool

NFC hacking can be a daunting task with many specialized tools, a proliferation of protocols, and a multitude of different devices. [ElectronicCats] has done a lot of work to try to make this investigation accessible by creating an open-source, hardware-certified NFC tool called the HunterCatNFC that can read and emulate a multitude of NFC devices.

The HunterCatNFC device is meant to be portable and self contained, with LED indicator lights that can give information about the various modes, and feedback about what data is being received. At its core, the HunterCatNFC has an NXP PN7150 NFC controller chip to handle the NFC communication. The main processing controller is a Microchip SAMD21 which also provides USB functionality, and the whole device is powered by a 3.7V 150mAh Li-ion battery.

The HunterCatNFC has three main modes, ’emulation’, ‘read/write’ and ‘peer-to-peer’. Emulation mode allows the HunterCatNFC to mimic the functionality of a passive NFC device, only responding when an NFC reader issues a request. The read/write mode allows it to emulate an NFC reader or writer, with the ability to communicate with nearby passive NFC devices. The peer-to-peer mode gives the device the ability to have two way communication, for instance, between two HunterCatNFC devices.

We’ve covered NFC hacking before, including the Flipper Zero. The HunterCatNFC is a fine addition to the NFC hackers arsenal of tools with some very nice documentation to learn from. For those not wanting to send out their own boards to be printed and assembled, [ElectronicCats] has them for sale.

Video after the break!

Continue reading “Hunt Down NFC Signals With This NFC Multi Tool”

Seeing If Cheating At Chess The Hard Way Is Even Possible

With all the salacious stories about a cheating scandal rocking the world of championship-level chess, you’d think that we’d have delved into the story at least a bit here on Hackaday, especially given the story’s technical angle. But we haven’t, and it’s not because we’re squeamish about the details of the alleged cheat; rather, it’s because it’s just too easy to pun your way through a story like this. The lowest-hanging fruit isn’t always the sweetest.

But, we’ll give it a go, and play this one completely straight as we look at an experiment to determine if it’s even possible to cheat in the specific way that has been alleged. For the uninitiated, 19-year-old grandmaster [Hans Niemann] stands accused of cheating, possible through the use of a remote-controlled sex toy secreted in his rectum. The idea would be for an accomplice to use the toy, which contains a vibrating motor that’s controlled by an app either via Bluetooth or WiFi, to send suggested moves to [Niemann] based on a chess-playing AI’s analysis of the game.

Whether [Niemann] cheated or not is not the concern here, but rather [Captain Steel]’s experiment is just a first-pass look at whether it would be possible to cheat using the proposed technology — and most importantly, not get caught. He tried to replicate the scanning regime [Niemann] is now subject to at tournaments based on the allegations to see if a stand-in for the sex toy — a haptic motor attached to an ESP32 — would be detectable through various thicknesses of flesh. Rather than showing the same dedication to craft that [Niemann] is alleged to have shown, [Captain Steel] used slices of baloney as a stand-in for human flesh. He then tried scanning for RF emissions from the device through increasing layers of luncheon meat. We won’t spoil the results, other than to say that baloney turns out to actually be good for something.

We’ve covered another less-invasive method of cheating before, which given the results above is probably more likely to be discovered.

Continue reading “Seeing If Cheating At Chess The Hard Way Is Even Possible”

A person sits on a couch in the background wearing a VR headset. A keyboard is on their lap and a backpack studded with antennas and cables sits in the foreground.

2022 Cyberdeck Contest: Cyberpack VR

Feeling confined by the “traditional” cyberdeck form factor, [adam] decided to build something a little bigger with his Cyberpack VR. If you’ve ever dreamed of being a WiFi-equipped porcupine, then this is the cyberdeck you’ve been waiting for.

Craving the upgradability and utility of a desktop in a more portable format, [adam] took an old commuter backpack and squeezed in a Windows 11 PC, Raspberry Pi, multiple wifi networks, an ergonomic keyboard, a Quest VR headset, and enough antennas to attract the attention of the FCC. The abundance of network hardware is due to [adam]’s “new interest: a deeper understanding of wifi, and control of my own home network even if my teenage kids become hackers.”

The Quest is setup to run multiple virtual displays via Immersed, and you can relax on the couch while leaving the bag on the floor nearby with the extra long umbilical. One of the neat details of this build is repurposing the bag’s external helmet mount to attach the terminal unit when not in use. Other details we love are the toggle switches and really integrated look of the antenna connectors and USB ports. The way these elements are integrated into the bag makes it feel borderline organic – all the better for your cyborg chic.

For more WiFi backpacking goodness you may be interested in the Pwnton Pack. We’ve also covered other non-traditional cyberdecks including the Steampunk Cyberdeck and the Galdeano. If you have your own cyberdeck, you have until September 30th to submit it to our 2022 Cyberdeck Contest!

Card's author typing on the IBM PC110's keyboard, with the Pico W-based card plugged into the PCMCIA slot on the left. PC110's screen shows successful ping 8.8.8.8.8.

Pi Pico W Does PCMCIA, Gets This IBM PC110 Online

Bringing modern connectivity to retro computers is an endearing field- with the simplicity of last-century hardware and software being a double-edged sword, often, you bring a powerful and tiny computer of modern age to help its great-grandparent interface with networks of today. [yyzkevin] shows us a PCMCIA WiFi card built using a Pi Pico W, talking PCI ISA. This card brings modern-day WiFi connectivity to his IBM PC110, without requiring a separate router set up for outdated standards that the typical PCMCIA WiFi cards are limited by.

The RP2040 is made to talk PCI ISA using, of course, the PIO engine. A CPLD helps with PCI ISA address decoding, some multiplexing, and level shifting between RP2040’s 3.3V and the PCI 5 V levels. The RP2040 software emulates a NE2000 network card, which means driver support is guaranteed on most OSes of old times, and the software integration seems seamless. The card already works for getting the PC110 online, and [yyzkevin] says he’d like to improve on it – shrink the design so that it resembles a typical PCMCIA WiFi card, tie some useful function into the Pico’s USB port, and perhaps integrate his PCMCIA SoundBlaster project into the whole package while at it.

This is a delightful project in how it achieves its goal, and a pleasant surprise for everyone who’s been observing RP2040’s PIO engine conquer interfaces typically unreachable for run-of-the-mill microcontrollers. We’ve seen Ethernet, CAN and DVI, along many others, and there’s undoubtedly more to come.

We thank [Misel] and [Arti] for sharing this with us!

A black PCB with an ESP32 and an SBM-20 geiger counter

Flexible Radiation Monitoring System Speaks LoRa And WiFi

Radioactivity has always been a fascinating phenomenon for anyone interested in physics, and as a result we’ve featured many radioactivity-related projects on these pages over the years. More recently however, fears of nuclear disaster have prompted many hackers to look into environmental radiation monitoring. [Malte] was one of those looking to upgrade the radiation monitor on his weather station, but found the options for wireless geiger counters a bit limited.

So he decided to build himself his own Wifi and LoRa compatible environmental radiation monitor. Like most such projects it’s based on the ubiquitous Soviet-made SBM-20 GM tube, although the design also supports the Chinese J305βγ model. In either case, the tube’s operating voltage is generated by a discrete-transistor based oscillator which boosts the board’s 5 V supply to around 400 V with the help of an inductor and a voltage multiplier.

Graphs showing temperature, humidity and radiation levels
Data can be visualized in graphs, together with other data from the weather station like temperature and humidity

The tube’s output signal is converted into clean digital pulses to be counted by either an ESP32 or a Moteino R6, depending on the choice of wireless protocol. The ESP can make its data available through a web interface using its WiFi interface, while the Moteino can communicate through LoRa and sends out its data using MQTT. The resulting data is a counts-per-minute value which can be converted into an equivalent dose in Sievert using a simple conversion formula.

All design files are available on [Malte]’s website, including a PCB layout that neatly fits inside standard waterproof enclosures. Getting more radiation monitors out in the field can only be a good thing, as we found out when we tried to detect a radiation accident using community-sourced data back in 2019. Don’t like WiFi or LoRa? There’s plenty of other ways to connect your GM tubes to the internet.

DIY Video Transmitter Turned WiFi Jammer

The proliferation of FPV drones has brought a flood of cheap wireless video tech. After flying and crashing a cheap FPV drone for a bit, [GreatScott] decided to try his hand at building his own video transmitter, which turned out to be a lot harder than expected.

While digital technology has caught up to the FPV world, a lot of systems still use analog video, especially for drone racing. The video quality isn’t great, but it has the advantage of very low latency. The technology is very similar to the old analog TV broadcasts, but mainly uses the 5.8 GHz license-free bands. It is essentially analog video signal, frequency modulated onto a 5.8 GHz carrier signal transmitted through an appropriately sized antenna.

After a brief failed experiment with a simple circuit built from discrete components, [GreatScott] turned his attention to voltage-controlled oscillators (VCO). He bought a couple of 5.8 GHz VCOs from Aliexpress, and created and used a simple opamp circuit to boost the FPV camera video signal to the required input level for the VCO. This failed to produce any identifiable image on his video receiver goggles. In an attempt to confirm that the VCOs produced the desired frequency, he ordered a similar 2.4 GHz VCOs and built a short range (20 cm) WiFi jammer. With a signal generator to create a simple input signal, and confirmed that it interfered with his laptop’s WiFi connection.

After more experimentation with other VCOs, the closest [GreatScott] came to success was a barely identifiable image transmitted using a Maxim 2.4 GHz VCO. If you have any ideas on what is missing in the VTX circuit, drop them in the comments below.

Building RF circuits that interfere with the legitimate signal around you, or broadcasting out of band, is generally not a great idea, and could earn you an unpleasant visit from the authorities. If you want to build your own digital video transmission, take a look at the Wifibroadcast project.

Continue reading “DIY Video Transmitter Turned WiFi Jammer”