At the beginning of the Month we came across a coupon code for a free eZ430-F2013 development stick. TI has given these things now and again so we took the opportunity to acquire one. It arrived yesterday and we’ve spent just a bit of time looking it over. Above you can see the first project completed; Hello World on a salvaged Nokia cell phone screen. Join us after the break for our thoughts on the device, as well as more pictures and details.
usb656 Articles
Security Audit Kit In A Mouse

Sometimes it helps to have an entire set of tools with you to tackle a problem, and sometimes it helps to take the discreet route. [StenoPlasma] took the latter of these approaches, and stuffed a USB hub, a 16 GB flash drive, and an Atheros based USB wireless adapter into a regular looking USB mouse to make a Linux bootable system in a mouse. Because he chose the Atheros adapter, he is also capable of doing packet injection with tools like Aircrack-ng, which can invaluable in a security audit or (white hat) hacking situation.
This is the only photo we have, so it could be possible that the mouse is no more than a mouse, however we know all of what [StenoPlasma] claims is 100% possible, so we’ll give him the benefit of the doubt, and hope this inspires others to hack up your own mouse kits. Be sure to check out the full parts list after the break.
Plug And Prey: Malicious USB Devices
This very informative talk given at Shmoocon 2011 has been posted over at IronGeek. Covering all kinds of angles that a person could attack someones computer through the USB port, this should be read by anyone who is security minded at all. No matter which side of the port you tend to be on, this article has great information. They cover some common attack methods such as keyloggers and fake keyboards as well as some common methods of securing your system against them. We’ve actually seen this in the news a bit lately as people have been using the keyboard emulation method in conjunction with android phones to hack into systems.
[thanks Adrian]
MCP2200 USB To Serial Chip Hacked To Do Your Bidding

Mircrochip has a new USB to Serial converter available called the MCP2200. [Sjaak] suspected that it may have been made from an existing 20-pin PIC and found that reading the device signature with the PICKIT3 shows that the chip is an 18F14K50. Most likely this is running Microchip’s USB stack but it’s hard to tell because chip is code-protected, reading back all zeros. So he set out to write some replacement firmware which would provide the same functionality and give you access to the rest of the chip’s features.
There were some speed bumps along the way. The first one is that Microchip’sĀ licensingĀ for their USB stack won’t allow you to open source your firmware. That’s okay, it seems there is already a USB stack that can be ported which doesn’t have this restriction. The second wrinkle in the plan is that [Sjaak’s] code doesn’t come with a VID/PID pair that you can use like V-USB does for AVR chips. But that doesn’t diminish the accomplishment of getting the device to work by echoing back characters it receives. Full USB to serial support with the replacement firmware is on the way.
[Thanks Chris]
Reverse Geocache Features UI And Is Reprogrammable

Classic Game Emulation On The Dockstar

[Hunter Davis] is playing games like Contra, Monkey Island, and Quake 3 by running them on a Seagate Dockstar. We were shocked after seeing how well these run in the video after the break. [Hunter], who used the ZipIt for game emulation in the past, added a couple of hardware peripherals to get everything running. For sound he picked up an inexpensive USB sound card which was no problem to get up and running. Next he picked up a USB to DVI adapter and fired up the Linux USB DisplayLink driver. With the peripherals running he loaded up Fluxbox and the rest was history. Not bad for a small network storage adapter. Continue reading “Classic Game Emulation On The Dockstar”
Building A Security Access Panel

It turns out that hacking together a security keypad is remarkably simple if you know what you’re doing. [Don] needed to add a keypad with an RFID reader on it. He had previously built a USB RFID reader and thought he could integrate those concepts into the new unit.
He once again started with a serial to USB converter and removed the voltage converter IC for later use since he doesn’t need TTL levels for this project. The keypad is a USB product and it turns out there’s a hub inside. With plenty of space inside for the serial converter PCB and a blank spot at the top where he mounted the RFID reader, he adding a few passive components to wire it up and connect it to the hub. The only connection is the original USB cord but the PC will detect both the keypad and the converter.

