ESP-01 Bridges the Gap Between IR and WiFi

[Emilio Ficara] dropped us a line recently about his efforts to drag his television and receiver kicking and screaming into the modern era. His TV is old enough that it needs an external tuner, which means it requires two separate remotes to properly channel surf. He wanted to simplify the situation, and figured that while he was at it he might as well make the whole thing controllable over WiFi.

To begin the project, [Emilio] had to capture the IR signals from the two remotes he wanted to emulate. He put together a quick little IR receiver out of parts he had in the junk bin which would connect up to his computer’s microphone port. He then used an open source IR protocol analyzer to capture the codes and decode them into hex values.

As a proof of concept he came up with a little device that combines an ESP-01 with an ATmega88. The ESP-01 runs a minimal web server that receives hex codes as URL query strings. These hex codes are then interpreted by the ATmega88 and sent out over the IR LED. [Emilio] notes that driving the IR LED directly off of the ATmega pin results in fairly low range of around one meter, but that’s good enough for his purposes. If you want to drive the IR LED with more power, you’ll need to add a transistor to do the switching.

Passing the hex code 0x0408 to turn off the TV

Now that he can decode the signals from his original remotes and transmit them over WiFi via his bridge device, he has all the groundwork he needs to come up with a streamlined home entertainment controller. A native application for his smartphone or perhaps a minimal web interface is the last piece of the puzzle.

This project reminds us of a similar attempt at controlling legacy IR devices from a smartphone via Bluetooth. If you’re looking for more information about wrangling IR signals from your microcontroller, this primer from 2013 is still a great look at the subject.

How To Control the Lights with a TV Remote

In this day and age of the Internet of Things and controlling appliances over the internet, the idea of using an old-fashioned television remote to do anything feels distinctly 2005. That doesn’t mean it’s not a valid way to control the lights at home, and [Atakan] is here to show us how it’s done.

To the experienced electronics maker, this is yesterday’s jam, but [Atakan] goes to great lengths to hash out the whole process from start to finish, from building the circuitry to switch the lights through to the code necessary to make a PIC do your bidding. It’s rare to see such a project done with a non-Arduino platform, but rest assured, such things do exist. There’s even some SPICE simulation thrown in for good measure, if you really want to get down to the nitty-gritty.

Perhaps the only thing missing from the writeup is a primer on how to execute the project safely, given that it’s used with a direct connection to live mains wiring. We’d love to hear in the comments about any changes or modifications that would be necessary to ensure this project doesn’t hurt anyone or burn an apartment complex down. Sometimes you can switch lights without a direct connection to the mains, however – like this project that interfaces mechanically with a standard light switch.

Cryptanalyse Your Air Con

Infrared remote controls are simple and ubiquitous. Emulating them with the aid of a microcontroller is a common project that hackers use to control equipment as diverse as televisions, cable boxes, and home stereos. Some air conditioners can be a little more complicated, however, but [Ken]’s here to help.

The root of the problem is that the air conditioner remote was using a non-obvious checksum to verify if commands received were valid. To determine the function generating the checksum, [Ken] decided to bust out the tools of differential cryptanalysis. This involves carefully varying the input to a cryptographic function and comparing it to the differences in the output.

With 35 signals collected from the remote, a program was written to find input data that varied by just one bit. The checksum outputs were then compared to eventually put together the checksum function.

[Ken] notes that the function may not be 100% accurate, as they’re only using a limited sample of data in which not all the bytes change significantly. However, it shows that a methodical approach is valuable when approaching such projects.

Thirsty for more checksum-busting action? Check out this hacked weather station.

Car Lights for Reflow Heat Source

If you only have a car and you need to unsolder some tricky surface mount components: what would you do? If you’re Kasyan TV, you’d remove your car’s halogen lights and get to town. That’s right: car lights for reflow.

When the friend of the host of Kasyan TV needed to remove some roasted toasted FETs from his motherboard but didn’t have anything for reflowing, she took some headlights and used them as an infrared source to desolder the FETs. Powered by a lab supply (although car batteries work too), the process works with 60 and 100-watt bulbs.

Now, reflowing with halogen bulbs isn’t new, and we’ve seen it done with the run of the mill 100-watt bulbs and a halogen floodlight. However, what we really like about using car lights is that they’re available everywhere and we already own some that we could (temporarily) repurpose. Now, don’t get us wrong – if you’re going to be reflowing more than just a little, there are plenty of alternative methods that don’t involve staring at “rather bright lights” for extended periods of time.

People ’round these parts can’t seem to get enough of reflow: from open source reflow oven controllers to reflowing with a hair straightener we’ve seen quite a bit. If you’re new to the reflow arena, we’ve got zero to hero: reflow style just for you. And if DIY at home reflow isn’t intense enough for you, we’ve got next level reflowing as well.

The full video is after the break, complete with Kasyan TV’s sponsored segment in the middle..

Continue reading “Car Lights for Reflow Heat Source”

Mike Ossmann and Dominic Spill: IR, Pirates!

Mike Ossmann and Dominic Spill have been at the forefront of the recent wave of software-defined radio (SDR) hacking. Mike is the hardware guy, and his radio designs helped bring Bluetooth and ISM-band to the masses. Dominic is the software guy who makes sure that all this gear is actually usable. The HackRF SDR is still one of the best cheap choices if you need an SDR that can transmit and receive.

So what are these two doing on stage giving a talk about IR communication? Can you really turn traffic lights green by blinking lights? And can you spoof a TV remote with a cardboard cutout, a bicycle wheel, and a sparkler? What does IR have to do with pirates, and why are these two dressed up as buccaneers? Watch our video interview and find out, or watch the full talk for all of the juicy details.

Continue reading “Mike Ossmann and Dominic Spill: IR, Pirates!”

Hackaday Prize Entry: Infrared Vein Illumination

Phlebotomy is a fun word, and the fine art of finding veins. While the skill of putting needles in arms is honed by nurses and physicians over the course of decades, there are, of course, technological solutions to finding veins. One of the more impressive medical devices that does this uses near-infrared imaging — basically looking under the skin with almost visible light. These devices cost a fortune.

One project in the Hackaday Prize is looking to change that. It’s a near-infrared vein finder. Instead of the thousands of dollars professional unit costs, this one can be built for under one hundred bucks.

As far as this build goes, veins are illuminated via IR light at about 950nm. The backscatter of this light is captured via a Raspberry Pi NoIR camera, with regular old photography film blocking visible light. From there, it’s just a simple matter of image processing and hitting enhance several times until veins appear on a display.

The team behind this project has already developed a mobile version of the device, complete with 3D printed parts. It’s a handy device and a great entry for the Hackaday Prize.

Another Day, Another Air Gap Breached

What high-tech, ultra-secure data center would be complete without dozens of video cameras directed both inward and outward? After all, the best informatic security means nothing without physical security. But those eyes in the sky can actually serve as a vector for attack, if this air-gap bridging exploit using networked security cameras is any indication.

It seems like the Cyber Security Lab at Ben-Gurion University is the place where air gaps go to die. They’ve knocked off an impressive array of air gap bridging hacks, like modulating power supply fans and hard drive activity indicators. The current work centers on the IR LED arrays commonly seen encircling the lenses of security cameras for night vision illumination. When a networked camera is compromised with their “aIR-Jumper” malware package, data can be exfiltrated from an otherwise secure facility. Using the camera’s API, aIR-Jumper modulates the IR array for low bit-rate data transfer. The receiver can be as simple as a smartphone, which can see the IR light that remains invisible to the naked eye. A compromised camera can even be used to infiltrate data into an air-gapped network, using cameras to watch for modulated signals. They also demonstrated how arrays of cameras can be federated to provide higher data rates and multiple covert channels with ranges of up to several kilometers.

True, the exploit requires physical access to the cameras to install the malware, but given the abysmal state of web camera security, a little social engineering may be the only thing standing between a secure system and a compromised one.

Continue reading “Another Day, Another Air Gap Breached”