Portable WiFi Penetration Testing

Inside this box you’ll find a La Fonera wireless access point. [Emeryth] and his band of miscreants built this portable device for WiFi security testing. The AP is running OpenWRT and has been set up to use the 16×4 character display as a terminal. An ATmega88 connects the LCD as well as six buttons to the UART of the La Fonera. From there, a set of Ruby scripts takes care of the communication protocol. As you can see after the break, this setup allows you to scan the area for WiFi, showing channel, SSID, and MAC information. Although not specifically outlined in the video we suspect there’s some more devious tricks up its sleeve too.

Continue reading “Portable WiFi Penetration Testing”

Chipophone Plays Video Game Classics

This thrift shop organ gets a new life as an 8-bit music maker. Called the Chipophone, it relies on an ATmega88 to produce sounds that you might associate with classic video gaming. [Linus Akesson] takes us through all of the different sound settings in the video after the break, including performances of your theme music favorites.

The original organ uses transistor logic making it rather easy to patch into the hardware. Thanks to the build log we know that [Linus] used 74HC165 input latches to monitor each of the switches for the 120 inputs. Fifteen of these latches work like a backwards shift register 74HC595, cascading all of the parallel inputs into one serial signal. From there the microcontroller takes over, monitoring the keys, pedals, switches, and potentiometers and outputting the appropriate sounds.

Continue reading “Chipophone Plays Video Game Classics”

Unlocking The Crippled Potential Of An Unmanaged Switch

[Sprite_TM] outgrew the features of the cheap unmanaged TL-SG1005D switch he was using on his home network. Instead of buying a new and much more costly switch he cracked the cheap one open and found that the RTL8366SB chip inside possessed the ability to work harder but was crippled for sale as a low-end model. It wasn’t as easy as that oscilloscope firmware upgrade we saw a while back. He had to add an AVR ATmega88 to send I2C commands to the switch. Turns out that the I2C protocol wasn’t standard and after much head scratching he found some Linux drivers for the chipset that gave him enough info to send the configuration commands he needed. Now he’s go the managed switch he needed for his VLAN for the cost of a microcontroller and some wire.

Vehicle Information Display Hacks

We’ve had a few folks send us info about their vehicle display hacks after seeing [Will O’Brien’s] motorcycle computer a few days ago.

On the left we have a display for an electric vehicle. [S1axter] is using a 4.3″ TFT screen to display charge information for each battery cell in the car. An ATmega88 collects the data and sends it to a breakout board with an LCD controller on it.

To the right is a display from a Formula Student project. a Matrix Orbital GLK19264-7T-1U LCD display provides a lot of real estate for displaying data. Right now [Alan] is still in the early prototyping stages, but the video after the break demonstrates the RPM readout using a function generator. It’s not shown in the video, but he tells us that he’s since tried it out with the engine and has a PIC 16f877 reading temperate data from the electronic control transmission sensors in addition to the RPM data.

Correction: Thanks to [j] for correcting our mistake. This is a Formula Student car.

Continue reading “Vehicle Information Display Hacks”

Phasor A/V PAL Demo Uses ATmega88

[youtube=http://www.youtube.com/watch?v=sCN1bqRG-7o]

Above is a new demo video called Phasor developed by [Lft]. It is run from an AVR ATmega88 and a few passive components, and the result is pretty amazing. [Lft] goes into detail about the tricks he used to get this up and running. The chip is clocked at 17.73447 MHz which is exactly four times the frequency of the PAL color carrier wave which allows him to fake a smooth signal. He also uses a timer trick to get the voltages that he needs. The work done here is beyond hardcore and quite frankly we can’t believe he managed to fit all of this into 8.5 KB of program space with just 1 KB or RAM. We wonder if there’s enough room there to add sound and color to the AVR Tetris project.

[Thanks Sprite_tm]

Emulating A Z80 Computer With An AVR Chip

[Sprite_tm] dusted off his assembly skills and managed to emulate a Z80 computer using an AVR ATmega88. He’s using an SD card in place of the floppy and a 128 KB DRAM chip to handle the memory for the emulated machine. An FT232 board gives him terminal access which he uses for input and display. As you can see, the hardware is much simpler than building the original would have been. He makes up for this with complicated firmware. In the end, the emulated core occupies about 2 KB of programming space after he followed the Z80 Propeller project’s idea of dividing the instructions into different modules and using a lookup table to access them.

IPod Shuffle Headphone Remote Reverse Engineered

The headphone remote for the third generation iPod shuffle has a special chip that identifies it to the iPod itself. [David Carne] posted an in-depth report about the process he used to reverse engineering that protocol. He’s discovered that the remote uses a peculiar signal to identify it as authentic when the device powers up. We’ve talked about Apple’s use of peripheral authorization before and it seems this is no different. [David] did manage to emulate the authentication using an ATmega88. If you’ve got a shuffle 3G sitting around this info will allow you to operate it with a microcontroller in your next project.