Thursday, September 10, 2009

Tunneling IP traffic over ICMP


We all hate it when we find an unencrypted WiFi network at our favorite coffee shop, restaurant, airport, or other venue, only to discover that there are traffic restrictions. Most limited networks allow HTTP and HTTPS traffic only, or so is the common misconception. In the majority of cases, ICMP traffic is also allowed, permitting the users to ping websites and IP addresses. You may be asking, “Ok, so why does that matter?” Well, all of your IP traffic can be piped through an ICMP tunnel, disguising all your surfing as simple ping packets. [Thomer] has a detailed guide on how to create and utilize such a tunnel using ICMPTX. So the next time you are at the local cafe and want to fire up VLC to watch TV shows from your home PC, give this guide a quick read.

Wireless electricity


[Eric Giler] has a talk available over at TED that discusses and demos delivering electricity without wires. Called WiTricity, these methods were developed by a team at MIT a few years ago who were working off of the concepts of Nicolai Tesla. The facts shared about our current energy delivery system are a bit shocking; we’ve spent over $1 trillion in infrastructure and produce more than 40 billion disposable batteries each year.

The demonstration in the video starts about 6:30 into it. At first we see a flat panel television powered wirelessly from about 6 feet away, then the T-Mobile G1 powered from the same distance. The thought of new TVs coming with WiFi and WiTricity standard would mean just hanging it on the wall with no cords to run. We can also image cellphones that have a battery only for backup purposes when you were not near a transmitter.

The power transfer occurs between two coils that resonate at the same frequency and only that frequency. This remind us a bit of Orson Scott Card’s fantasy communications device from the Ender’s Saga.

Cheap wireless for microcontrollers

Everybody loves microcontrollers, including the Arduino, allowing you to create whatever you imagine. That is unless you want to hack together something wireless. Originally you had to rely on the expensive XBee protocol or other wireless options, but no longer. Hobby Robotics found an extremely cheap transmitter and receiver and wrote a quick guide for wiring them up to an Arduino. Now your wireless projects can come to life, as long as you are within 500 feet and don’t mind 2400bps; minor trade offs compared to the gains of wireless freedom. Final note: You aren’t limited to Arduino, we would love to see someone modify this to work with a PIC or other microcontroller.

Thursday, June 18, 2009

Keykeriki: wireless keyboard sniffer

Keyboard Sniffer Keykeriki from Max Moser on Vimeo.

Remote-Exploit.org is releasing Keykeriki, a wireless keyboard sniffer. The project is both open source hardware and software. you can download the files on their site. Right now you can’t get a pre made board, but they plan on releasing one soon. The system can be upgraded with “backpacks” or add on modules. One of these is going to be an LCD that displays the keystrokes of the keyboard you are sniffing. Another is supposed to serve as an interface to your iPhone. Right now it has the ability to decode Microsoft wireless keyboards, but the Logitech pieces should be added soon.

Wednesday, June 3, 2009

USB GPS

[Florin] was given the task of repairing a GPS unit that wouldn’t boot up. What he found was unfortunately a bad processor. Fortunately, he was able to make a project out of it. After scavenging the good bits, the GPS module and the LCD, he set about making it a USB device. He now has an EEEpc with GPS.

WiNet, wireless Arduino touchscreen


Liquidware has put together an interesting kit called the WiNet. It has a battery powered touchscreen controlled by an Arduino. Using an XBee shield, it can send commands to a paired XBee and Arduino attached to a computer. The computer can also update the touchscreen display. This is demoed in the video below. It’s a unique interface, but the TouchShield alone costs $174 so we’re guessing you’re going to be pretty damn confident in your project before you go this route.

Read the rest of this entry »

Wednesday, May 13, 2009

Criminals steal credit card data just by wardriving




A federal grand jury in Boston has charged eleven people with the theft of more than 41 million credit and debit card numbers from retail stores. What makes this case interesting is that, although the defendants stole the data from retail establishments, they did so without ever having to leave their cars; they stole the numbers while wardriving. While the report doesn’t make it clear whether the targeted networks used weak encryption or were simply unsecured, it’s obvious that the security of your data is still not a top priority for many companies.

GPS logger with wireless trigger


[Matthew] sent us his group’s final project, where they built a nice GPS logging system. Not only can it simply log the GPS coordinates on a predetermined interval, it can also be triggered to make an entry by a wireless device. In this example, they use a camera. This allows them to then upload all the GPS information and pictures to places like Google Earth.

They are using an ATmega644, with an LCD, SD card, and GPS unit. They had to do a little hacking on their camera to add the wireless transmitter, which triggers the logger. You can see not only the cost break down and source code for the project, but also a map with lots of geotagged photos. This is the kind of thing we can almost see as a standard item in the future.

Friday, May 8, 2009

Linksys IP cam hacking


GNUCITIZEN has posted information on linksys wireless IP camera hacking. It turns out that some models send the administrator user name and password to the computer when the setup wizard requests a connection. In theory, someone could send the request and harvest your passwords wirelessly. This seems like a pretty careless oversight. We would think that linksys will probably remedy this before too long.

Update: Part 2 has been posted.

Update: Part 3 has been posted.

Thursday, May 7, 2009

Bioloid hacking with Johnny Lee

Though we usually think of Wii projects when we see him, [Johnny Lee] is showing us some Bioloid fun. He’s decided to pick one up to play with, wanting to write his own control programs for it. Unfortunately what he found was that it doesn’t do wireless communication for control. Even after installing a bluetooth module, he found it was only used to trigger different predetermined motions. After some research, he found how to connect the bluetooth module to the main PC link which allows him direct control of the Bioloid via the PC. Unfortunately, the communication speed leaves a lot to be desired, but it’s a good start. We’ll keep our eye on this one.

Wednesday, April 15, 2009

FIELD a fluorescent array, wirelessly powered



What would you do if you were driving along the highway and you glanced into a field to see a giant array of fluorescent tubes lit wirelessly from the electromagnetic fields of power lines. Back in 2004, [Richard Box] set up this display after hearing about a friend playing “light saber” with fluorescent tubes under power lines. The tubes can be lit pretty easily by have a variation in voltage between the ends. By sticking one end in the ground and the other up in the air, he’s harnessing the strong magnetic field from the power lines. Though some thought the display was made to bring people’s attention to possible hazards of living near the lines, [Box] states that he did it just because it looked cool.

Friday, March 13, 2009

Netgear open source router

Netgear recently launched the WGR614L wireless router targeted specifically at open source firmware enthusiasts. It can use Tomato, DD-WRT, and soon OpenWRT. The core is a 240MHz MIPS processor with 16MB of flash and 4MB of RAM. You’ll probably remember when Linksys decided to dump Linux from their iconic WRT54G line in favor of VxWorks; they released the similarly speced WRT54GL for enthusiasts. Netgear seems to be arriving pretty late in the game, but they’ve set up a community specifically for this router. Time will tell whether community support is enough to make this the router of choice for hackers. We wish someone would release an x86 based router in the same price range just to make porting stupidly simple.

Monday, March 9, 2009

wireless bootloading


Wireless Bootloader Demonstration from Nathan Seidle on Vimeo.
Tired of having to physically connect to your microprocessor to upload new code? Just do it over a wireless connection. [Nathan] takes us through the process of setting up a wireless bootloader for the ATmega168. He is using the XBee base and remote modules for the wireless communication. While people have been doing wireless bootloading with the Arduino already, [Nathan] found that it was common for them to have timeout issues. His remedy was to make his own custom one that is much faster. He’s asking for help though. At this point it is tested and working, but he needs someone with more programming knowledge to help him make it “drop-in” compatible with the Arduino IDE.

Sunday, March 8, 2009

N8VEM computer with a 3Km wireless link

[James] sent in this project in which he built a tiny computer with text based OS and a 3Km wireless link. The details are a bit scarce, but he used an N8VEM, a Propeller Pocket Term, a 4 line LCD and an RF Transceiver to build it. It runs CP/M, the text based operating system and uses less than a half of a watt, without the vga monitor. With a total cost of 145 and 4 serial ports for sensors, this thing could come in handy. Especially since its low power consumption could allow it to be solar powered. You may recall the N8VEM from an earlier post we did.

Thursday, March 5, 2009

External antenna on Panasonic CF-R1



[Steven] managed to get his hands on a Panasonic CF-R1 for pretty cheap. Though it is a decently powerful machine, it was built in 2002 and didn’t come with an internal wireless card. It did, however have a mini-PCI slot. [Steven] promptly installed a wireless card, but found the internal antenna lacking. The solution was to custom mount an external antenna. Mounting it was fairly easy, he removed the phone jack and epoxied the connector in its place. The reception was greatly improved. He says he went from seeing 6 access points to 31 as soon as he installed it. Similar things have been done to the Eee PC 900.

Eye-Fi teardown



[les robots] had a defective Eye-Fi card on his hands and when a replacement was sent, he was told to destroy the original. What better way to ‘destroy’ something than opening the case? The Eye-Fi is an SD card with a builtin WiFi radio so it can upload images while remaining in camera. One version uses Skyhook’s location service to geotag photos. You can see a few photos of the dismantled card on Flickr. The board is manufactured by Wintec. The wireless side is handled by Atheros’ ROCm, the same low power Radio-on-Chip module you would find in a mobile phone. The flash memory comes from Samsung and the antenna is along the back edge, where it has the best chance of getting signal.

Wireless TAC-2 joystick



[Aki] had a broken TAC-2 joystick that was just begging for some new and improved use. Since it was the cable that was broken, [Aki] had the idea to make it wireless. He designed custom boards for the transmitter and receiver. Each is controlled by an ATTiny2313. He fitted it with the stock connector so it could possibly even still work on a commodore 64. He hasn’t tested that yet though.

[via the Hack A Day flickr pool]

WiFi and Bluetooth tethering on Android



Many G1/ADP1 owners have been using the app Tetherbot to get internet access on their laptop via USB to the phone’s data connection. The app relied on the Android Debug Bridge to forward ports. It worked, but people wanted a solution better than a SOCKS proxy. The community figured out a way to create a properly NAT’d connection using iptables and then [moussam] rolled them up into easy to use applications. There’s one for setting up a PAN device on Bluetooth and another for adhoc WiFi networking. It requires you to have root on your phone, but hopefully you’ve achieved that and are already running the latest community firmware.

Vaio P HSDPA mod



[tnkgrl] has concluded her Sony Vaio P by adding GSM support. We covered the switch to XP earlier, but this should work on Vista too. The Vaio P is sold in the US with support for Verizon’s EVDO wireless broadband, but it uses the same hardware as the European model that uses GSM. This is possible because of the the Qualcomm Gobi radio module. To get GSM support, you trick the VZAccess Manager into loading a different firmware than the stock EVDO. The difficult part is that the Vaio P doesn’t come with a SIM card slot, so you’ll have to solder in your own. When you’ve got the computer reassembled, just change VZAccess Manager to use your carrier.

UPDATE: Wired has an article on the Gobi chipset.

QRSS: Radio amateurs’ slow-speed narrowband


While the rest of the world is moving toward high speed broadband, some hams—including one Nobel Prize winner—are going in exactly the opposite direction. Our ‘QRSS’ mode makes use of an unusual mixture of modern digital signal processing (DSP), ancient Morse code, and simple homebrewed transmitters. Very narrow bandwidth is desirable because this reduces the noise in the radio communication channel, greatly improving the S/N ratio. But Shannon’s communication theory tells us that narrow bandwidth comes with a cost: slow data rates. In QRSS, beacon transmitters using only milliwatts churn out slow speed Morse ID signals on 10.140 MHz that are routinely picked up by DSP-based receivers on the other side of the globe. Many of the receivers, ‘grabbers’, have visual outputs that are available online in real time. QRSS has been getting a lot of attention on the Soldersmoke podcast and on the Soldersmoke Blog. For more information check out this overview and the hardware involved. Here’s a gallery of received signals.

Tweet-a-Watt wins Greener Gadgets design competition



The team behind the the Tweet-a-Watt/Wattcher just won first prize at the Greener Gadgets design competition. The device is a hacked Kill A Watt that transmits power consumption using an XBee. After checking out DVICE’s preview of the competitors yesterday, we’re happy to see a prototype win instead of just a concept sketch.

Hackit: Consumer RFID

RFID seems to have invaded every part of our lives. Sure, the technology has been primarily used in government and industry, but that doesn’t mean that it doesn’t have consumer applications. Recently, we posted about [max's] RFID dorm room lock, that he built to provide a safe, convenient way to access his room. A while back, we talked about an RFID spatially aware address book that used a combination of rfid tags and post-it notes to control the NFC enabled Nokia 3220 cell phone. Both of these projects highlight unique applications where RFID is used. We bash on RFID from time to time, mostly due to its security (or lack there of). That said, there is an interesting consumer solution out there for people who want to voluntarily use RFID called Touchatag (formerly known as Tikitag). The cool thing about Touchatag is that it uses a combination of RFID and QR (2-D barcode) tags to trigger applications on the Touchatag website. The starter kit, which includes 10 tags and a USB RFID reader, goes for about $40; a decent price considering the hacking potential for the RFID reader. In addition to using the reader, you can also use any NFC enabled phone to read the tags. While NFC enabled phones are currently few and far between, the technology will likely be implemented in many of the new phones released in the coming year.

We’re curious, what do you think is next for consumer RFID? What kind of innovative project ideas do you have?