SMD Soldering Challenge Lands At DEF CON

Strap on the jeweler’s loupe and lay off the caffeine for a few days. You’ll need to be at your peak for the SMD Soldering Challenge at this year’s DEF CON (number 26 for those counting).

It’s exciting to see that a Soldering Skills Village has been added to the conference this year. It will be in the same room as the Hardware Hacking Village. After all, who doesn’t want to solder at a conference? This soldering challenge is a great way to ring in the new village, and will take place in eight heats of six people for a total of 48 contestants. If you want to compete, make sure you get to the village right away and sign up for a slot!

A familiar board is being used for the contest. It’s the SMD Challenge board which MakersBox developed. You can check out the Hackaday.io project page and even order one from their Tindie store if you like. The contest will be scored based on time, completion, functionality, precise orientation, and quality of the joints.

The SOIC ATtiny85 is a snap to place on the board, but things get harder with each step. To successfully complete it you need to solder both a resistor and an LED in 1206, 0805, 0603, 0402, and 0201 packages. Those oh-two-oh-ones are basically grains of sand… good luck with that! We’re really excited that MakersBox rolled some custom Hackaday and Tindie boards (pictured above) for this contest which we’re honored to sponsor. It sounds as if the winners will be announced during Hackaday and Tindie’s traditional Breakfast at DEF CON which is happening at 10:30am on Sunday in the HHV.

We plan to spectate during some of the heats and if you’re at the con you should too! For those participating, here’s our advice. Practice soldering the smallest of parts ahead of time (watch some videos on it at the very least). Bring a multimeter to test the diode polarity because you won’t be able to see the symbols on the smallest parts. You may even consider bringing some custom tools; this surface mount “clamp” comes to mind, you’ll just need a much smaller version.

If you have advice of your own, we’d love to hear it in the comments below!

Video Review: AND!XOR DEF CON 26 Badge

The AND!XOR team have somehow managed to outdo themselves once again this year. Their newest unofficial hardware badge for DEF CON 26 just arrived. It’s a delightful creation in hardware, software, and the interactive challenges built into both.

They call this the “Wild West of IoT”, a name that draws from the aesthetic as well as the badge-to-badge communications features. Built on the ESP32-WROVER module which brings both WiFi and Bluetooth to the party, the badges are designed to form a wireless botnet at the conference. Anyone with a badge can work to advance their level and take more and more control of the botnet as they do.

Check out the video overview and then join me below for a deeper dive into all this badge has to offer.

Continue reading “Video Review: AND!XOR DEF CON 26 Badge”

Retro DEF CON Badge Made From ’80s Parts

DEF CON 25’s theme was retro-tech, and [xres0nance] wasn’t kidding around in the retro badge he built for the convention. The badge was mostly built out of actual parts from the ’80s and ’90s, including the perfboard from Radio Shack—even the wire and solder. Of the whole project just the resistors and 555 were modern parts, and that’s only because [xres0nance] ran out of time.

[xres0nance]  delayed working on the badge until his flight, throwing the parts in a box, and staggering to the airport in the midst of a “three-alarm hangover”. He designed the badge on the plane, downloading datasheets over in-flight WiFi and sketching out circuits in his notebook.

The display is from an old cell phone, and it uses a matrix of diodes to spell out DEFCON without the help of a microcontroller. Each letter is powered by a transistor, with specific pins blocked out to selectively power the segments. He used a shift register timed by a 555 to trigger each letter in turn, with the display scrolling the resulting message.

We publish a lot of posts about con badges. See our DEF CON 2015 badge summary for a bunch of badges that we encountered at in Vegas.

Inside This Year’s Queercon Badge

At this point, it’s not really correct to describe DEF CON as a single, gigantic conference for security, tech, and other ‘hacky’ activities. DEF CON is more of a collection of groups hosting villages, get-togethers, meetups, and parties where like-minded individuals share their time, company, electronic war stories, and whiskey. One of the largest groups measured by the number of rideable, inflatable unicorns is Queercon, a ‘conference within a conference’ dedicated to LGBT causes, a rager of a party, and a killer conference badge.

The Queercon badge is always a work of art, and this year is no exception. Last year, we took a look at an immaculate squid/cuttlefish badge, and a few years before that, the Queercon badge was a beautiful 3.5″ floppy embedded with far too many RGB LEDs. This year’s Queercon badge was equally as amazing, quite literally pushing badgecraft into another dimension. The folks behind the Queercon badge just wrote up their postmortem on the badge, and it’s an excellent example of how to push PCBs into the space of human interaction.

The development of the 2017 Queercon badge had a really tough act to follow. Last year’s Blooper squid/cuttlefish badge is a high point in the world of functional PCB art, and by January of this year, the team didn’t know where to take badgecraft next.

In the end, the QC badge team decided on a ‘failsafe’ design — it wasn’t necessarily going to be the best idea, but the design would minimize risk and development time.

A single 2017 Queercon badge

The two obvious features of this badge are an incredible number of tiny RGB LEDs, and very strange hermaphroditic edge connectors, allowing these badges to be plugged together into a panel of badges or a cube. What does this badge do? It blinks. If you have five friends, you can make something that looks like the Companion Cube from Portal.

Hardware

The killer feature for this badge is a vast array of RGB LEDs. Instead of going with WS2812s or APA101s, the Queercon badge team found simple, 0604 RGB LEDs, priced at about $0.026 a piece. There are 73 LEDs in total, all driven by the same TI LED driver used in previous years, combined with two shift registers and 15 FETs to control the LED commons. Although the LED driver is able to address all 219, and even though the badge is powered by a 32-bit ARM Cortex M3 microcontroller, this is pretty much the limit of how many LEDs can be controlled with this setup.

The Queercon badge always has a bit of interconnectedness built in, and this year is no exception. This year the badge uses a strange universal connector mounted along the four sides of the badge. When one badge is plugged into the other, they mate producing a ‘fabric’ of glowing badges. The range of motion on this connector allows for 180 degrees of rotation, but surprisingly most Queercon badge holders only assembled single planes of badges. It took a bit of cajoling from the badgemakers to get people to assemble a cube, and no other weird shapes were constructed out of multiple badges. If anyone likes this idea of interconnected badges, I would like to personally suggest equilateral triangles — this would allow for icosahedrons or hexagon-based solids.

A Game

A badge wouldn’t be complete without a game, and the Queercon badge has it in spades. The UI/UX/graphics designer [Jonathan] came up with a game loosely based on a game called ‘Alchemy’. Every badge comes loaded with a set of basic elements (air, fire, water, earth), represented as pixel art on the 7×7 RGB LED matrix. Combining these elements leads to even more elements — water plus fire equals beer, for example. Think of it as crafting in Minecraft, but with badges.

Starbucks was responsible for sponsoring a portion of Queercon this year, so ten special badges were loaded up with a fifth element: coffee. Elements derived from the coffee element required a Starbucks sponsor badge.

As we all expect from a DEF CON badge, there was a crypto challenge and contest. The full write up is available here, with the solution somewhat related to a cube of badges.

A Complete Success

When the badges came back from the fab house, the failure rate for this year’s Queercon badge was 0.7%. That’s an amazing yield for any independent hardware badge, and is honestly one of the most impressive aspects of this year’s Queercon. Failure modes during the con were probably related to spilling a drink on a badge, although there was a rash of failed CPUs. This is probably related to ESD, and during the con rework of failed badges was basically impossible because of drunk soldering in a dimly lit hotel room.

If there’s one failure of this year’s Queercon, it’s simply that it’s becoming too popular. From last year, Queercon saw 200% growth for the main party, which meant not everyone got a badge. That’s unfortunate, but plans are in the works for more inventory next year, providing DEF CON 26 isn’t cancelled, which it is. A shame, really.

Badgelife image by @catmurd0ck

All The Hardware Badges Of DEF CON 25

Hardware is the future. There is no better proof of this than the hardware clans that have grown up around DEF CON, which in recent years has become known as Badgelife. I was first drawn to the custom hardware badges of the Whiskey Pirates at DC22 back in 2014. Hardware badges were being made by several groups at that time but that was mainly happening in isolation while this year the badge makers are in constant contact with each other.

A slack channel just for those working on their own DEF CON badges sprung up. This served as tech support, social hour, and feature brainstorming for all on the channel. In the past badges were developed without much info getting out during the design process. This year, there was a huge leap forward thanks to a unified badgelife API: the badge makers colluded with each on a unified communcations protocol. In the multitude of images below you frequently see Rigado modules used. These, and some others using different hardware, adopted a unified API for command and control, both through makers’ “god mode” badges, and for wireless gaming between participant badges.

I was able to get into the badge makers meetup on Thursday of DEF CON. What follows is the result of a frantic few hours trying to get through the sheer volume of badges and people to share with you all the custom hardware on display. One thing is for sure — there were literally thousands of custom badges built and sold/distributed during DEF CON. I can’t wait to see what the artisanal hardware industry will look like in five years time.

Continue reading “All The Hardware Badges Of DEF CON 25”

Look What People Brought To Breakfast At DEF CON

Sunday was our Breakfast at Hackaday meetup and a swarm of folks showed up, take a look at the hardware they brought with them! Vegas can be a tough place to set up a meetup — especially if you don’t want to rent a room. We filtered into a Starbucks across the street from Caesar’s and ended up packing the high-top table areas. It turns out you get a really funny look from the baristas when you go through the coffee line and ask for four dozen pastries and a few buckets of coffee.

The size of the space made it hard to get a picture of the entire crowd. I did manage to get a posed photo with the people who showed up about a half hour early. Once it filled up all I got for crowd shots were people with their back to me and heads down comparing hardware projects — that might actually be more appropriate for DEF CON where people generally don’t want to be photographed (case in point our bandanna wearing friend).

 

There was a ton of different hardware on hand. If you look at a picture of the swag and pastries tables, look closely at the high-top behind that. There were a couple of people hacking on RTL-SDRs before we arrive (which means they were at least 45 minutes early).

I’m a fan of wearing your hardware projects at events and this year was really great for that. First, a Captain Phasma helmet from The Force Awakens. It’s 3D printed in ABS, using an acetone/ABS slurry to glue (actually to weld) the parts before sanding and painting to finish the job.

Most of the hacks on hand were unofficial hardware badges built specifically for DEF CON. I was at the Badge Build’s meetup and have a megapost on everything I saw there coming out a bit later. But here we get a look at the dragonfly badge which [Kerry] brought along with him as well as the rectangular PCB that was the prototype. The AND!XOR crew was in the house and I decided to bug [Hyr0n] about the password hashes I was trying to crack from their badge’s firmware. He pulled up the app and it wasn’t surprising to see so many of the Bender on a bender badges in the area. Their botnet was a huge hit this year!

At some point, I was handed this book-like box which had been laser cut and etched out of plywood. It’s a beautiful piece and I had no idea what I would find inside. Turns out it’s a complete quadcopter-badge fun kit. I must have been so enthralled with the electronics when we covered this badge a few weeks back that I completely missed the beautiful box they built for it.

Inside the box, you’ll find two versions of the badge (one that flies, the other that blinks and has a red PCB handkerchief), a separate PCB that is the controller, and a goodie bag with extra batteries and charging hardware. We didn’t fire this up at the meetup, but we’ll have it at the Hackaday Superconference for you to play with. It was really great to get a group picture with so many of the people who worked on making this badge happen.

There was one high-top over in the corner that had been mobbed with people all morning and I only got a look at it when the crowd started to clear out around noon. [Brian McEvoy] built a custom controller for OpenSCAD and did a great job of bringing along a demo. A tablet is running the software, with the controller connected via USB. There are 3 knobs on the right that allow you to adjust height, width, and depth. The fourth knob is for adjusting precision. That precision is displayed in a very clever way. You can see the LED strip with has a red dot on the right (the decimal point) and three colored pixels to the left of it. These are the tens, hundreds, and thousands, but just turn the crank until the red dot is at the other end of the strip and you’ll be setting precision to tenths, hundreths, etc. [Brian] even added a button you can hold down to 10x the precision without making a permanent adjustment. The project is driven by a Teensy LC board.

Is wonderful to see the Hackaday Community turn out for a meetup like this even though so much other stuff is going on at DEF CON. Thank you to all of you for coming to say hi, share your stories, and show off your handy work!

“Borrow” Payment Cards With NFC Proxy Hardware

Contactless payments are growing in popularity. Often the term will bring to mind the ability to pay by holding your phone over a reader, but the system can also use NFC tags embedded in credit cards, ID card, passports, and the like. NFC is a reasonably secure method of validating payments as it employs encryption and the functional distance between client and reader is in the tens of centimeters, and often much less. [Haoqi Shan] and the Unicorn team have reduced the security of the distance component by using a hardware proxy to relay NFC interactions over longer distances.

The talk, give on Sunday at DEF CON, outlined some incredibly simple hardware: an NFC antenna connected to a PN7462AU, an NRF24L01 wireless transceiver, and some power regulation. The exploit works by using a pair of these hardware modules. A master interfaces with the NFC reader, and a slave reads the card. The scenario goes something like this: a victim NFC card is placed near the slave hardware. The master hardware is placed over a payment kiosk as if making a normal payment. As the payment kiosk reader begins the process to read an NFC card, all of the communications between it and the actual card are forwarded over the 24L01 wireless connection.

The demo video during the talk showed a fast-food purchase made on the Apple Pay network while the card was still at a table out in the dining area (resting on the slave hardware module). The card used was a QuickPass contactless payment card from China UnionPay. According to a 2016 press release from the company, over two billion of these cards had been issued at the time. With that kind of adoption rate there is a huge incentive to find and patch any vulnerabilities in the system.

The hardware components in this build aren’t really anything special. We’ve seen these Nordic wireless modules used in numerous projects over they years, and the NXP chip is just NFC build around an ARM core. The leaps that tie this together are the speed-ups to make it work. NFC has tight timing and a delay between the master and slave would invalidate the handshake and subsequent interactions. The Unicorn team found some speedups by ensuring the chip was waking from suspend mode (150 µS) and not a deeper sleep. Furthermore, [Haoqi] mentioned they are only transmitting “I/S/R Block Data” and not the entirety of the interaction to save on time transmitting over the 24L01 wireless link. He didn’t expand on that so if you have details about what those blocks actually consist of please let us know in the comments below.

To the card reader, the emulated payment card is valid and the payment goes through. But one caveat to the system is that [Haoqi] was unable to alter the UID of the emulator — it doesn’t spoof the UID of the payment card being exploited. Current readers don’t check the UID and this could be one possible defense against this exploit. But to be honest, since you need close physical proximity of the master to the reader and the slave to the payment card simultaneously, we don’t see mayhem in the future. It’s more likely that we’ll see hacker cred when someone builds a long-range link that lets you leave your NFC cards at home and take one emulator with you for wireless door access or contactless payments in a single device. If you want to get working on this, check out the talk slides for program flow and some sourcecode hints.