Arduino Enigma Portable

meneame.net TRACK TOP
Publicado el 11th Enero, 2018 por KaR]V[aN. Archivado en Sin categoria.
Leido 16,745 veces. Aqui no comenta ni $DEITY.

I recently got an Arduino Enigma on Tinder (https://www.tindie.com/products/ArduinoEnigma/arduino-enigma-i-m3-m4-machine-simulator-w-case/) which is a Arduino Enigma Machine Simulator with touch display. Is pretty handsome with a wooden case and perfectly functioning simulator of the Enigmas 1, M3 and M4.

But to work, it needs external power supply. Either a USB-B cable or a 9v battery with a barrel plug. And I hate having external addons to make it work.

Arduino Enigma Machine with battery

Arduino Enigma Machine with battery

So I put inside the case a lipo battery, a lipo charger and a 5v stepup to power up everything.

ZTE680 Hardware V4.0 (V2?) Hack

meneame.net TRACK TOP
Publicado el 20th Agosto, 2017 por KaR]V[aN. Archivado en Hardware, Linux.
Leido 18,911 veces. 5 comentarios archivados.

I just got recently installed my first FTTH router (pepephone, but same model is used in masmovil and jazztel) and as any network engineer I wanted to have full access to the router. Looking over the vast internet I found a blogpost that used a USB with a symlink to smb.conf so it can be edited to add exec parameters to execute an downloaded busybox to open an alternative telnetd but the article had a big problem that make it imposible to work on my router: the F680 of the article has an ARM architecture. My router has MIPS instead. This is important to know beforehand if using external-downloaded busybox binaries. In the end I skipped the busybox hack to directly allow admin telnet connection instead the buggy limited one. This is how I did it, I will assume that router has IP address 192.168.1.1.

Leer el resto de la entrada »

Expired RSA SecurID Token revival (guerrilla hack)

meneame.net TRACK TOP
Publicado el 25th Enero, 2016 por KaR]V[aN. Archivado en Electrónica, Hardware, Tips.
Leido 21,048 veces. Aqui no comenta ni $DEITY.

I had lying around an expired RSA SecurID with the typical blank display only showing a small 3 in the right.

Looking for some info about expired tokens I found an old topic at flickr (original URL here) where Travis Goodspeed managed to revive one the tokens with a simple trick: apply 3v for a second in two of the pads behind the protective plate.

Here is the diagram:

Expired RSA SecurID Token Revival Diagram

Expired RSA SecurID Token Revival Diagram

Here the revived Token:

Expired RSA SecurID Token Revived

Expired RSA SecurID Token Revived

The token was expired since november 2011 but still got battery to keep working.

I Haven’t tested if token still is valid to autenticate against RSA daemon after revival.

Aribag detonation

meneame.net TRACK TOP
Publicado el 29th Diciembre, 2015 por KaR]V[aN. Archivado en Sin categoria.
Leido 3,377 veces. Aqui no comenta ni $DEITY.

Just an old seat airbag that was found on the garbage. Recorded a 240fps.

VMware Fusion (OSX): Mooltipass in Virtual Machines

meneame.net TRACK TOP
Publicado el 19th Agosto, 2014 por KaR]V[aN. Archivado en Arduino, VMware.
Leido 15,341 veces. Aqui no comenta ni $DEITY.

So, I wanted to test the Mooltipass in different platforms besides my main OS, Mac OS X. The better way is to use virtual machines I already have VMware Fusion. On first try I wasn’t able to associate the Mooltipass to any of my virtual machines because the MP is an HiD device and as so, is always connected to the main OS and then emulated via VMware Fusion in the guest OS (in my case, Windows XP and Windows 8):

vmware_fusion_screenshot_without_usb_mooltipass

Mooltipass is not eligible to be associated to the guest OS

After some googling I found a relevant KB (knowledge base) article about associating HiD devices entirely to a Virtual Machine and disassociating it from the host OS: http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1033435.

The article says that the virtual machine hardware definition file (.vmx extension, usually located at /Users/$USER/Documents/Virtual Machines.localized) has to be manually edited after shutting down the virtual machine and the VMware Fusion to add the two following lines:

usb.generic.allowHID = "TRUE"
usb.generic.allowLastHID = "TRUE"

After adding both lines, you can safely search for the Mooltipass HiD devide to properly associate it to the guest OS:

vmware_fusion_screenshot_with_usb_mooltipass

vmware_fusion_screenshot_with_usb_mooltipass

Update: Since VMware Fusion 7.1.1 it’s necessary to also add usb.generic.allowHID = “TRUE” in the following file: /Users/$USER/Library/Preferences/VMware\ Fusion/preferences