«
Expand/Collapse
22 items tagged "goodspeed"
Related tags:
travis [+],
hacks [+],
black hat [+],
usa [+],
microcontroller [+],
im me [+],
wireless sensors [+],
video [+],
side channel [+],
exploiting [+],
audio [+],
Wireless [+],
radio [+],
device [+],
open [+],
microcontrollers [+],
michael ossmann [+],
jtag debugger [+],
classic [+],
chaos communication congress [+],
travis goodspeed [+],
zombie [+],
wireless radio [+],
wireless keyboard [+],
video side [+],
usb device controller [+],
usb [+],
toorcon [+],
timing [+],
study [+],
sprites [+],
sprite [+],
spot [+],
spectrum analyzer [+],
spectrum [+],
sniffing [+],
slides [+],
security [+],
rgb [+],
reverse engineering [+],
proof of concept [+],
project [+],
practical applications [+],
paper [+],
operating system [+],
msp [+],
manipulation [+],
machine [+],
led [+],
law [+],
knitting machine [+],
knitting [+],
keypad [+],
jtag [+],
hope [+],
hacking [+],
guitar tuner [+],
guitar [+],
graphic manipulation [+],
game [+],
freescale [+],
firmware [+],
fabienne serriere [+],
fabienne [+],
example [+],
easy [+],
doo dads [+],
digital radios [+],
debugger [+],
dave [+],
cons [+],
bsl [+],
bootstrap loader [+],
bluetooth communications [+],
bluetooth [+],
becky stern [+],
arduino [+],
apco 25 [+],
android [+],
analyzer [+],
Hardware [+]
-
-
21:43
»
SecDocs
Authors:
Travis Goodspeed Tags:
locating Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: The Texas Instruments MSP430 low-power microcontroller is used in many medical, industrial, and consumer devices. When its JTAG fuse is blown, the device's firmware is kept private only a serial bootstrap loader (BSL), certain revisions of which are vulnerable to a side-channel timing analysis attack. This talk continues that from Black Hat USA by describing the speaker's adventures in creating a hardware device for exploiting this vulnerability.
-
-
21:37
»
SecDocs
Authors:
Travis Goodspeed Tags:
microcontroller Event:
Chaos Communication Congress 25th (25C3) 2008 Abstract: USB devices are sometimes composed of little more than a microcontroller and a USB device controller. This lecture describes how to reprogram one such device, greatly expanding its potential.
-
-
11:13
»
Hack a Day
[Travis Goodspeed] wrote in to tell us about his work reverse engineering the Bluetooth communications on this SPOT module. He’s targeted the post as a general guide to sniffing Bluetooth transmissions, but was inspired to use the SPOT as an example after seeing this other SPOT hack. We know he’s a fan of getting things [...]
-
-
15:01
»
Hack a Day
Would you believe you can track, and even jam law enforcement radio communications using a pretty pink pager? It turns out the digital radios using the APCO-25 protocol can be jammed using the IM-ME hardware. We’ve seen this ‘toy’ so many times… yet it keeps on surprising us. Or rather, [Travis Goodspeed's] ability to do amazing [...]
-
-
9:09
»
Hack a Day
[Travis Goodspeed] recently tore down the Freescale MC13224 wireless radio chip in an effort to demonstrate how the device’s firmware could be read, even when locked down in “secure” mode. While you might not recognize the Freescale MC13224 radio by name alone, you are certainly familiar with some of its practical applications. Found in the [...]
-
-
10:04
»
Hack a Day
[Travis Goodspeed] put together a proof of concept hack that sniffs wireless keyboard data packets. He’s using the Next HOPE badge that he designed as the hardware platform for these tests. It has an nRF24L01+ radio on-board which can easily communicate with 2.4 GHz devices. The real trick comes in getting that radio to listen for [...]
-
-
11:27
»
Hack a Day
[Travis Goodspeed] and Hackaday alum [Fabienne Serriere] joined forces to develop an alternative interface for a knitting machine. They’re working with the Brother KH-930E machine. We saw [Becky Stern] use the same model by manipulating data on an emulated floppy drive for the device. [Travis] and [Fabienne] went a different route, and are emulating the keypad using an Arduino [...]
-
-
10:00
»
Hack a Day
This is [Michael Ossmann's] RGB LED stroboscopic guitar tuner. If his name is familiar that’s because we mentioned he’d be giving a talk with [Travis Goodspeed] at ToorCon. But he went to DefCon as well and spent the weekend in his hotel room trying to win the badge hacking contest. Despite adversity he did get [...]
-
-
10:00
»
Hack a Day
It’s fun to pick apart code, but it gets more difficult when you’re talking about binaries. [Joby Taffey] opened up the secrets to one of [Travis Goodspeed's] hacks by disassembling and sniffing the data from a Zombie Gotcha game binary. We looked in on [Travis'] work yesterday at creating a game using sprites on the IM-ME. He [...]
-
-
10:00
»
Hack a Day
Here’s a study in sprite animations that [Travis Goodspeed] put together. He’s working with one of his favorites, the pink IM-ME device that he’s been hacking on for a while now. But if you don’t have this hardware that shouldn’t discourage you. There’s a lot to be learned from his methods which will translate to [...]
-
-
9:00
»
Hack a Day
[Michael Ossmann] rolled out some firmware that makes his IM-ME into a Spectrum Analyzer. He met up with [Travis Goodspeed], who authored the IM-ME flashing guide, at SchmooCon and spent some time hacking wireless doo-dads in the hotel bar. Once he arrived home the new firmware was just a few coding sessions away from completion. [...]
-
-
13:00
»
Hack a Day
[Travis Goodspeed] wrote a guide to firmware flashing for the IM-ME. He’s using a GoodFET open-source JTAG adapter that he designed to do the programming. This is really taking [Dave's] work on the device and running with it. The end goal being to develop an operating system for the device. If you haven’t read the [...]