Photo Hardware That Automatically Produces Rotating GIFs

[Fergus Kendall’s] company is making development and breakout boards targeting electronic hobbyists. As with any endeavor that involves selling something, they need marketing. It sounds like [Fergus] was put in charge of getting some nice animated 360 degree images of each component. Instead of going through the drudgery of snapping frames by hand in a stop-motion-style, he whipped up a rotating platform that does the work for him.

The brain of the operation is a Boobie Board, a microcontroller breakout board that is one of their products. It controls a stepper motor attached to the cardboard platform via a quartet of power transistors. [Fergus] mentions in passing that their digital camera didn’t have a connection for a shutter trigger attachment. But they modded it to make things work. There’s no detail on that part of the hack but we’d wager that they soldered a transistor to the contacts for the shutter button.

The stepper motor has 48 steps, so the hardware is programmed to take 48 pictures which become the frames of an animated GIF – embedded after the break – to show off the product.

Continue reading “Photo Hardware That Automatically Produces Rotating GIFs”

The GIFAR Image Vulnerability


Researchers at NGS Software have come up with a method to embed malicious code into a picture. When viewed, the picture could send the attacker the credentials of the viewer. Social sites like Facebook and Myspace are particularly at risk, but the researchers say that any site which includes log ins and user uploaded pictures could be vulnerable. This even includes some bank sites.

The attack is simply a mashup of a GIF picture and a JAR (Java applet). The malicious JAR is compiled and then combined with information from a GIF. The GIF part fools the browser into opening it as a picture and trusting the content. The reality is, the Java VM recognizes the JAR part and automatically runs it.

The researchers claim that there are multiple ways to deal with this vulnerability. Sun could restrict their Virtual Machine or web applications could continually check and filter these hybrid files, but they say it really needs to be addressed as an issue of browser security. They think that it is not only pictures at risk, but nearly all browser content.
More details on how to create these GIFARs will be presented at this week’s Black Hat conference in Las Vegas.