«
Expand/Collapse
196 items tagged "usb"
Related tags:
tool [+],
security [+],
host [+],
linux kernel [+],
linux [+],
classic [+],
hacks [+],
usb interface [+],
stack overflow [+],
solaris [+],
kernel stack [+],
controller [+],
chaos communication congress [+],
bt4 [+],
arduino [+],
android [+],
Support [+],
Hardware [+],
video [+],
quot [+],
misc [+],
hub [+],
host mode [+],
cellphones [+],
attiny [+],
adrian crenshaw [+],
wifi [+],
usb keyboard [+],
usb hub [+],
usb devices [+],
usb device [+],
usb c [+],
universal serial bus [+],
stick [+],
simon inns [+],
root [+],
protocol [+],
privilege escalation vulnerability [+],
physical security [+],
penetration [+],
microcontroller [+],
materiel [+],
kernel [+],
information disclosure vulnerability [+],
hfc [+],
escalation [+],
debutant [+],
crenshaw [+],
connectivity [+],
audio [+],
adapter [+],
Espace [+],
wireless extensions [+],
vulnerability [+],
vega tags [+],
vega [+],
usb protocol [+],
usb ports [+],
unauthorized access [+],
ubuntu [+],
transmission protocol [+],
thumb drive [+],
testing [+],
storage [+],
solaris versions [+],
software defined radio [+],
root hub [+],
reverse engineer [+],
reverse [+],
rafael dominguez [+],
radio [+],
project [+],
pic [+],
nintendo [+],
nes [+],
mouse [+],
monta elkins [+],
login [+],
led [+],
keystroke [+],
keyboard emulation [+],
hacking [+],
hack [+],
gain root privileges [+],
energizer [+],
duo [+],
drive [+],
drew fisher [+],
dongles [+],
device [+],
control transmission [+],
configuration [+],
cl [+],
cable [+],
boot [+],
battery charger [+],
attacks [+],
arbitrary code execution [+],
andy davis [+],
Software [+],
NON [+],
Ecke [+],
Anfnger [+],
wvdial [+],
working [+],
wireless adapter [+],
wicd [+],
wep [+],
usb tv tuner [+],
usb thumb drive [+],
usb stack [+],
usb peripherals [+],
usb memory stick [+],
usb host [+],
usb connection [+],
usb adapter [+],
usa [+],
unetbootin [+],
typewriter [+],
travis goodspeed [+],
temperature logger [+],
temperature [+],
speed [+],
sided pcb [+],
sensors [+],
removable storage devices [+],
remote control software [+],
pppd [+],
power supply cable [+],
power [+],
port [+],
plug [+],
phone [+],
peter stuge [+],
perpose [+],
pcb [+],
omni antenna [+],
modeswitch [+],
mass storage devices [+],
logger [+],
live usb [+],
laptop [+],
jon larimer [+],
ikea [+],
home [+],
hardrive [+],
harddrive [+],
hackaday [+],
ftdi usb [+],
firmware [+],
entertainment [+],
droid [+],
digital [+],
dev board [+],
dev [+],
dei [+],
converter [+],
control [+],
chipset driver [+],
chip [+],
charger [+],
cellphone [+],
card [+],
business card [+],
business [+],
bus [+],
brad antoniewicz [+],
box [+],
bootloader [+],
boot record [+],
board [+],
avr programmer [+],
avr [+],
avalible [+],
autorun [+],
attacker [+],
arbitrary files [+],
alpha [+],
alfa [+],
adrian [+],
Generali [+],
Discussioni [+],
Angolo [+],
ARM [+],
Newbie [+],
Area [+],
microcontrollers [+],
zipit [+],
zhaohui wang [+],
xubuntu [+],
wusb [+],
wpa [+],
wouter van der [+],
wouter [+],
worms [+],
work [+],
wordlist [+],
wireless usb adapter [+],
wireless usb [+],
wireless headset [+],
wireless connectivity [+],
wireless connections [+],
windows [+],
wii remote [+],
wi fi [+],
whick [+],
webkeys [+],
webkey [+],
web cams [+],
weather satellites [+],
weather [+],
watchdog [+],
vu meter [+],
voltage signals [+],
voltage protection [+],
vodafone [+],
vmware thanks [+],
vmware [+],
virtual box [+],
vintage keyboards [+],
video usb [+],
video cameras [+],
victorinox [+],
vic [+],
v usb [+],
usernames and passwords [+],
usbs [+],
usb to rs232 cable [+],
usb switch [+],
usb stick booten [+],
usb stick [+],
usb port [+],
usb plug [+],
usb phone charger [+],
usb pen drive [+],
usb otg [+],
usb network adapter [+],
usb memory [+],
usb mass [+],
usb library [+],
usb hard drive enclosure [+],
usb hard drive [+],
usb flash drive [+],
usb firmware [+],
usb dongle [+],
usb device controller [+],
usb conversion [+],
usb 1 [+],
uno [+],
unknown origins [+],
unit [+],
undetectable [+],
u boot [+],
type login [+],
type [+],
tv capture card [+],
tuto [+],
ttyusb [+],
ttl levels [+],
triad [+],
trackpad [+],
tracked [+],
toshiba satellite [+],
tiny components [+],
test hardware [+],
terabyte hard drive [+],
television [+],
tcp [+],
t. s. eliot [+],
system programmer [+],
system [+],
sven killig [+],
supercaps [+],
stock controller [+],
stock appearance [+],
steve [+],
step guide [+],
step [+],
status indicator [+],
station [+],
startx [+],
standard usb [+],
spoon fed [+],
spka [+],
spent three [+],
sound [+],
something [+],
software side [+],
snes [+],
snega [+],
smd components [+],
smd [+],
smartphones [+],
slingshot [+],
slides [+],
sjaak [+],
sixaxis [+],
simon ford [+],
silk screen [+],
shot 1 [+],
shield [+],
shawn mccombs [+],
service menus [+],
serial converter [+],
sega genesis [+],
security exploits [+],
second time [+],
script [+],
screen [+],
scott [+],
sayings [+],
satellite [+],
samsung firmware [+],
salve [+],
s driver [+],
rupin [+],
rs 485 [+],
rs 232 [+],
rotary tool [+],
root partition [+],
rikard lindstrm [+],
richard rushing [+],
rgb leds [+],
revolutionary device [+],
resistors [+],
reseau [+],
repurposed [+],
reprogramming [+],
replace [+],
reconnaissance [+],
receiver [+],
real time satellite pictures [+],
read [+],
ralink technology [+],
radio scene [+],
quick [+],
quality electronics [+],
qos [+],
python programs [+],
pwm [+],
psu [+],
ps3 sixaxis controller [+],
ps3 controllers [+],
ps2 keyboard [+],
ps 2 [+],
prototype board [+],
propeller [+],
promotional item [+],
programmable [+],
program [+],
process [+],
probleme [+],
printer [+],
predefined functions [+],
prankster [+],
power supply [+],
power plant [+],
power adapter [+],
portable [+],
point [+],
playstation 3 [+],
playstation [+],
playback [+],
pic microcontroller [+],
pic master [+],
pic chips [+],
penna [+],
penetration test [+],
pcs [+],
pc side [+],
paul [+],
password [+],
parts bin [+],
particulars [+],
p.s. vboxguestadditions [+],
oscilloscope project [+],
oscilloscope [+],
optocoupler [+],
optical disk [+],
open source code [+],
nuclear [+],
ntfs partition [+],
ntfs [+],
nokia usb cable [+],
nokia n900 [+],
nokia [+],
night [+],
nexus [+],
next [+],
new business [+],
network proxy [+],
network mapping [+],
network bridge [+],
netbook [+],
neal [+],
name [+],
n draft [+],
msp [+],
money [+],
modem driver [+],
modem [+],
mode [+],
modchip [+],
mobile phone manufacturers [+],
mkfs [+],
mini usb [+],
mike [+],
microprocessors [+],
microchip [+],
micro controller [+],
michele bavaro [+],
michael [+],
micah dowty [+],
mess [+],
meseta [+],
merci [+],
memory test [+],
memory [+],
mcp [+],
matthias hullin [+],
mathieu [+],
mark bog [+],
manuel [+],
malicious [+],
macbook [+],
mac [+],
m nic [+],
lufa [+],
lose [+],
longest time [+],
london [+],
logitech usb headset [+],
logitech g5 gaming mouse [+],
localhost [+],
linuxlive [+],
linux system [+],
linux infrared remote control [+],
library [+],
lg televisions [+],
leonardo [+],
legal [+],
lcd screen [+],
laptop toshiba [+],
ladyada [+],
kinds of angles [+],
killswitch [+],
kickstarter [+],
kicad [+],
key to the kingdom [+],
key loggers [+],
key logger [+],
junk box [+],
joyce [+],
jon [+],
johan von konow [+],
jeri ellsworth [+],
jenna [+],
jean [+],
jason [+],
jamie [+],
iwconfig [+],
isostick [+],
iso file [+],
ip stacks [+],
internet signal [+],
internet [+],
internal oscillator [+],
interface design [+],
interface cable [+],
insta [+],
input devices [+],
input [+],
infrared remote control [+],
inexpensive tv [+],
im me [+],
il tempo [+],
hwug [+],
human interface device [+],
htc [+],
hospital [+],
hobby servos [+],
hobbiest [+],
hire [+],
high performance [+],
hid [+],
hey [+],
heavy traffic [+],
heavy lifting [+],
heart of the matter [+],
headset [+],
hardware setup [+],
hardware modification [+],
hardware hacking [+],
hard drive enclosure [+],
handy piece [+],
handhelds [+],
handheld devices [+],
hammers strike [+],
gui [+],
green [+],
great american novel [+],
grammar [+],
gpsd [+],
gps data [+],
gps [+],
goodspeed [+],
girl tech [+],
gig [+],
germany [+],
george mason university [+],
geiger counter [+],
geiger [+],
gaming [+],
gamepad [+],
gameboy [+],
game boy printer [+],
g internet [+],
full [+],
ftdi chip [+],
ftdi [+],
fritz [+],
frequency counter [+],
frank zhao [+],
frank herbert [+],
forum member [+],
forum entries [+],
forrest [+],
formatear [+],
footprint [+],
flood gates [+],
flavors [+],
flashlight [+],
flashdrive [+],
first [+],
finishing touches [+],
filer [+],
festplatte [+],
fare una presentazione [+],
facedancer [+],
f pic [+],
extra power [+],
external hd [+],
exact model [+],
ethernet device [+],
essid [+],
error [+],
epping forrest [+],
englisch [+],
engineer [+],
encryption [+],
emulator games [+],
egg problem [+],
ebay [+],
eat [+],
easy hack [+],
dvd [+],
dunk [+],
dual booting [+],
dslr [+],
dropper [+],
doubling [+],
doodads [+],
dongle hack [+],
don [+],
doing the rounds [+],
dlsr [+],
disque dur [+],
dispositivo usb [+],
disposable cells [+],
disk image [+],
disk encryption [+],
disassembling [+],
dirty [+],
dip switches [+],
desk [+],
design authors [+],
denke [+],
dbi [+],
david dewey tags [+],
david dewey [+],
datum [+],
data loggers [+],
dan fruzzetti [+],
dan [+],
custom urls [+],
custom [+],
creator [+],
crack [+],
coversion [+],
counter hack [+],
counter [+],
cortex [+],
core concept [+],
copper fingers [+],
copper clad board [+],
converter chip [+],
controller usb [+],
conductors [+],
compatibile [+],
company computer [+],
company [+],
compability [+],
communication protocols [+],
communication class [+],
commodore 64 [+],
command [+],
com [+],
client [+],
cle [+],
class [+],
claims [+],
circuitry [+],
chipset [+],
chip usb [+],
chibimo [+],
cheap cable [+],
che [+],
changde [+],
cerco [+],
carte [+],
capabilities [+],
cameras [+],
build [+],
bssid [+],
brute [+],
brian [+],
breadboard [+],
bootloaders [+],
bootet [+],
boote [+],
bootable usb [+],
boot partition [+],
boot error [+],
bluetooth dongle [+],
bluetooth [+],
blinkm [+],
bit [+],
benchtop tools [+],
ben [+],
belgium [+],
beerninja [+],
battery [+],
backdoor trojan [+],
awus [+],
awesome tutorial [+],
avr programmers [+],
avr microcontroller [+],
austyn [+],
atmel [+],
atmega8 [+],
atmega32 [+],
atheros [+],
asus eeepc [+],
asus [+],
arthur [+],
arm processors [+],
arm processor [+],
arcade controller [+],
arcade [+],
apple usb keyboard [+],
apple [+],
anything [+],
anyone [+],
antoine [+],
andrew filer [+],
andrew [+],
andres [+],
and [+],
ambilight [+],
alec [+],
aka [+],
aes [+],
advent [+],
adaptor [+],
access to data [+],
access [+],
aa batteries [+],
Wireless [+],
Tutoriales [+],
Rasberry [+],
Learn [+],
Issues [+],
Howto [+],
HackIt [+],
Guias [+],
General [+],
Fixes [+],
Bugs [+],
4ghz [+],
16gb flash drive [+],
BackTrack [+],
peripherals [+],
keyboard [+],
dongle [+]
-
-
8:01
»
Hack a Day
Several times a day, a NOAA weather satellite passes over your head, beaming down pictures of weather systems and cloud formations. These transmissions aren’t encrypted, and given the requisite hardware it’s possible for you to download these images from space as [Lovro] shows us in a tutorial video. To get these near real-time satellite pictures, [...]
-
-
13:00
»
Hack a Day
Lasik eye surgery is pretty common these days, but there are of course easier and cheaper ways to solder SMD components. [techpawpanda] wanted a video camera to see what was going on when he placed and soldered very tiny components on his board, but commercial SMD video cameras were terribly expensive. He wound up using [...]
-
-
8:01
»
Hack a Day
[Ladyada] and [pt] had an old keyboard from NeXT, but since it used a custom protocol it wasn’t usable with modern hardware. So they built a custom device to convert the NeXT protocol to USB. The device uses a Arduino Micro to read data from the keyboard and communicate as a HID device over USB. It [...]
-
-
14:01
»
Hack a Day
Here’s a rather exciting development for those who work with MSP430 microcontrollers. [M-atthias] worked out a way to implement USB 1.1 on a MSP430G2452. He’s bit banging the communications as this hardware normally doesn’t support the Universal Serial Bus. This is much like using the V-USB stack for AVR micros. The test hardware seen above uses an [...]
-
-
4:00
»
Hack a Day
[Steve] created an AVR programmer using an old USB keyboard. We feature a bunch of AVR programmers, but this one is made from parts that many people will have lying around. There are two components: the controller PCB from a USB keyboard, and an optocoupler for emulating key presses. In order to send data to [...]
-
-
12:01
»
Hack a Day
Wow, that’s a really simple hardware setup to supply your device with a 3G Internet connection. Better yet, the software side is just as simple thanks to the Vodafone USB Modem library for mbed. It will work for any of the cell data plans offered by Vodafone. The only problem you may have is not [...]
-
-
11:01
»
Hack a Day
The USB device seen plugged in on the right of this image was found in between the keyboard and USB port of the company computer belonging to a Senior Executive. [Brad Antoniewicz] was hired by the company to figure out what it is and what kind of damage it may have done. He ended up [...]
-
-
21:55
»
SecDocs
Authors:
Angelos Stavrou Zhaohui Wang Tags:
USB Event:
Black Hat DC 2011 Abstract: The Universal Serial Bus (USB) connection has become the de-facto standard for both charging and data transfers for smart phone devices including Google’s Android and Apple’s iPhone. To further enhance their functionality, smart phones are equipped with programmable USB hardware and open source operating systems that empower them to alter the default behavior of the end-to-end USB communications. Unfortunately, these new capabilities coupled with the inherent trust that users place on the USB physical connectivity and the lack of any protection mechanisms render USB a insecure link, prone to exploitation. To demonstrate this new avenue of exploitation, we introduce novel attack strategies that exploit the functional capabilities of the USB physical link. In addition, we detail how a sophisticated adversary who has under his control one of the connected devices can subvert the other. This includes attacks where a compromised smart phone poses as a Human Interface Device (HID) and sends keystrokes in order to control the victim host. Moreover, we explain how to boot a smart phone device into USB host mode and take over another phone using a specially crafted cable. Finally, we point out the underlying reasons behind USB exploits and propose potential defense mechanisms that would limit or even prevent such USB borne attacks. Angelos Stavrou is an Assistant Professor at George Mason University.
-
-
21:28
»
SecDocs
Authors:
Jon Larimer Tags:
exploiting client side Event:
Black Hat DC 2011 Abstract: Malware has been using the AutoRun functionality in Windows for years to spread through removable storage devices. That feature is easy to disable, but the Stuxnet worm was able to spread through USB drives by exploiting a vulnerability in Windows. In this talk, I’ll examine different ways that attackers can abuse operating system functionality to execute malicious payloads from USB mass storage devices without relying on AutoRun. There’s a lot of code that runs between the USB drivers themselves and the desktop software that renders icons and thumbnails for documents, providing security researchers and hackers with a rich set of targets to exploit. Since the normal exploit payloads of remote shells aren’t totally useful when performing an attack locally from a USB drive, we’ll look at alternative payloads that can give attackers immediate access to the system. To show that these vulnerabilities aren’t just limited Windows systems, I’ll provide a demonstration showing how I can unlock a locked Linux desktop system just by inserting a USB thumb drive into the PC.
-
21:28
»
SecDocs
Authors:
Jon Larimer Tags:
exploiting client side Event:
Black Hat DC 2011 Abstract: Malware has been using the AutoRun functionality in Windows for years to spread through removable storage devices. That feature is easy to disable, but the Stuxnet worm was able to spread through USB drives by exploiting a vulnerability in Windows. In this talk, I’ll examine different ways that attackers can abuse operating system functionality to execute malicious payloads from USB mass storage devices without relying on AutoRun. There’s a lot of code that runs between the USB drivers themselves and the desktop software that renders icons and thumbnails for documents, providing security researchers and hackers with a rich set of targets to exploit. Since the normal exploit payloads of remote shells aren’t totally useful when performing an attack locally from a USB drive, we’ll look at alternative payloads that can give attackers immediate access to the system. To show that these vulnerabilities aren’t just limited Windows systems, I’ll provide a demonstration showing how I can unlock a locked Linux desktop system just by inserting a USB thumb drive into the PC.
-
-
8:01
»
Hack a Day
[Jenna] sent in a very cool bootloader she thought people might like. It’s called Micronucleus and it turns the lowly ATtiny 85 into a chip with a USB interface capable of being upgraded via a ‘viral’ uploader program. Micronucleus weighs in at just over 2 kB, making it one of the smallest USB-compatible bootloaders currently available. The [...]
-
-
13:01
»
Hack a Day
[André Sarmento] needed to connect a computer to an RS-485 bus. A simple converter can be sourced online, but the only thing he could find locally that was even close was a USB to RS-232 converter. He used that component to craft his own USB to RS-485 bridge. RS-485 is often used for remote sensors [...]
-
-
15:01
»
Hack a Day
Webkeys are small, inexpensive USB devices which launch a web browser when plugged into a computer. They’re given out as a promotional item, but they can be fun to hack as well. [Brad Antoniewicz] recently got his hands on one and decided to crack it open to see what he could accomplish. The majority of [...]
-
-
7:00
»
Hack a Day
If you’re a brooding author putting the finishing touches on the next Great American Novel™ while sipping a latte in Starbucks, a MacBook is far too common to impress uncultured proles guzzling caramel macchiatos. No, to impress the next [Joyce] or [T. S. Eliot] sitting at the table next to you, you’ll need something much more [...]
-
-
8:01
»
Hack a Day
For being such a revolutionary device, there are still a few problems with the Raspberry Pi. For one, the USB host ports are only able to source 140 mA per port, while the USB ports on your desktop, laptop, and even tablet are able to send a full 500 mA per port. The official ‘fix’ [...]
-
-
14:01
»
Hack a Day
[Andres] wrote in to share his USB for NES controller project (translated). It enumerates as a USB keyboard and is easily mapped on most emulators. Over the weekend we looked in on an AVR programmer used for this purpose. [Andres] went a different direction, using a PIC microcontroller and eventually incorporating his circuit into the body [...]
-
-
6:22
»
Hack a Day
We can’t count the number of projects we’ve seen on Hackaday with a USB port. Unfortunately, most of these builds – from RepRap controllers to wireless data loggers – don’t use the full capabilities offered to them with USB. [Ben] came up with a very cool USB breakout board that allows you to explore the USB [...]
-
-
13:01
»
Hack a Day
Over on the Hackaday forums, [Brian] introduced himself by showing off his new business card. Given his expertise is creating unique circuit boards, we can’t imagine a better way to show off his skills than an ARM-powered business card. [Brian] posted a more detailed write-up on his blog that covers his development process. He decided to use a [...]
-
-
15:30
»
Hack a Day
[Natsfr] was looking for a single-sided PCB to host a PIC 18F4550. Not finding one he designed his own in Kicad and is sharing (translated) the spoils of his labor. This chip has USB capabilities which is why we see it used in a ton of projects. Almost all of them (including this USB input device [...]
-
-
5:01
»
Hack a Day
The USB ports on this work station are locked. In order to use a USB device you’ll need to insert a Smartcard into the reader seen above. The interesting thing here is that this shouldn’t affect your ability to charge a USB device. When you visit the link above make sure to check out the [...]
-
-
10:01
»
Hack a Day
This USB dongle will let you use your unmodified NES controllers on a computer. That’s because it includes the same socket you’d find on the classic console. The image above shows the prototype. Instead of etching the copper clad board, each trace was milled by hand (presumably with a rotary tool). To the left the [...]
-
-
6:01
»
Hack a Day
[TodBot] has a new piece of hardware on the way up. His Blink(1) is currently about 50% funded on Kickstarter. It’s a USB nub that has an RGB LED inside of it. When plugged into a computer it can be used as a status indicator. At first that sounds like a let down, but his [...]
-
-
13:01
»
Hack a Day
This is the prototype board for [Travis Goodspeed's] new USB development tool called the Facedancer. He took on the design with USB security exploits in mind, but we think it’s got a lot of potential for plain old development as well. Kudos on the [Frank Herbert] reference when naming the project. Like the characters from [...]
-
-
4:01
»
Hack a Day
The newly released Arduino Leonardo has a few very interesting features, most notably the ability to act as a USB keyboard and mouse thanks to the new ATmega 32U4 microcontroller. This feature isn’t exclusive to the Leonoardo, as [Michael] explains in a build he sent in – the lowly Arduino Uno can also serve as a [...]
-
-
5:01
»
Hack a Day
[ften] was having plenty of fun running Android on his HP Touchpad, but he soon discovered that the tablet’s micro USB port didn’t provide enough juice to his peripherals when running in host mode. He started digging around and found the perfect means of providing the extra power while maintaining the device’s stock appearance. He [...]
-
-
6:01
»
Hack a Day
[Jean] wrote in eager to share his latest project, a standalone temperature logger with USB connectivity. Back in November, [Jean] found himself wanting a temperature logger that was roughly the size of a USB memory stick. What he found on the market was not quite adequate in terms of price or size, so he decided [...]
-
-
8:01
»
Hack a Day
Impressed by the recent advances in the software defined radio scene, [Jason] picked up a $20 USB TV tuner dongle to check out his local airwaves. Unfortunately, the antenna included with the little USB dongle is terrible at receiving any signal other than broadcast TV. [Jason] wanted to improve his reception, so he got some [...]
-
-
9:01
»
Hack a Day
Using FTDI chips as a USB to Serial solution is nothing new, but this MicroFTX board takes the footprint to a new low. If you’re space limited this should have no problem fitting into your project. But if you plan to use it for prototyping we predict it’ll be lost in the parts bin forever [...]
-
-
21:55
»
SecDocs
Authors:
Peter Stuge Tags:
USB Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Learn about the benefits and limitations of Universal Serial Bus, how communication works on the bus, how and why the right (and sometimes wrong?) driver can be loaded automatically by the operating system, and find out the easiest way to add USB to your washing machine, toaster, or other favorite appliance. The talk goes under the hood of the ubiquitous standard and clarifies many concepts that are important to understand when developing either device firmware or host software for USB; host, device, hubs, low speed, full speed, high speed, super speed, bus power supply, cable lengths, transfer types, endpoints, descriptors and more. The choice between kernel mode or user mode drivers will also be discussed, and finally we'll take a look at libusb; a cross-platform (WinMacLinuxBSD) library for USB programming. There will be a workshop that builds on this talk. Check the workshop schedule if you would like to join in the building of a custom USB device on an ARM microcontroller!
-
21:55
»
SecDocs
Authors:
Peter Stuge Tags:
USB Event:
Chaos Communication Congress 27th (27C3) 2010 Abstract: Learn about the benefits and limitations of Universal Serial Bus, how communication works on the bus, how and why the right (and sometimes wrong?) driver can be loaded automatically by the operating system, and find out the easiest way to add USB to your washing machine, toaster, or other favorite appliance. The talk goes under the hood of the ubiquitous standard and clarifies many concepts that are important to understand when developing either device firmware or host software for USB; host, device, hubs, low speed, full speed, high speed, super speed, bus power supply, cable lengths, transfer types, endpoints, descriptors and more. The choice between kernel mode or user mode drivers will also be discussed, and finally we'll take a look at libusb; a cross-platform (WinMacLinuxBSD) library for USB programming. There will be a workshop that builds on this talk. Check the workshop schedule if you would like to join in the building of a custom USB device on an ARM microcontroller!
-
-
15:41
»
Hack a Day
Talk about versatile hardware. These inexpensive TV tuner dongles can also grab GPS data. You may remember seeing this same hardware used as a $20 option for software defined radio. But [Michele Bavaro] decided to see what other tricks they could pull off. Would it surprise you that he can get location data accurate to [...]
-
-
9:01
»
Hack a Day
[Script] is pretty lucky. One of the engineers who designed his cellphone included over-voltage protection in the circuit. Of course you probably wouldn’t know about this if there wasn’t a service schematic available. But a bit of searching around let him resurrect the fried USB segment of his Nokia N900. Now [Script] has been experimenting [...]
-
-
11:01
»
Hack a Day
With a simple digital TV USB capture card, you can build your own software defined radio or spectrum analyzer. While it may not be as cool as [Jeri Ellsworth]‘s SDR, it’s still very useful and only requires $20 in hardware. The only piece of hardware required for this build is a USB FM/DTV capture device with the [...]
-
-
6:01
»
Hack a Day
[wejp] picked up an IKEA SPÖKA night light, but he wasn’t entirely impressed with its functionality. Pressing the top of the ghost’s head causes it to cycle through a few colors, and pressing it a second time locks it into displaying the current color until its tapped again. Inspired by this SPÖKA hack which used [...]
-
-
22:52
»
SecDocs
Authors:
Drew Fisher Tags:
reverse engineering USB Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: While USB devices often use standard device classes, some do not. This talk is about reverse engineering the protocols some of these devices use, how the underlying USB protocol gives us some help, and some interesting patterns to look for. I'll also detail the thought processes that went into reverse engineering the Kinect's audio protocol. This talk will narrate the process of reverse engineering the Kinect audio protocol – analyzing a set of USB logs, finding patterns, building understanding, developing hypotheses of message structure, and eventually implementing a userspace driver. I'll also cover how the USB standard can help a reverse engineer out, some common design ideas that I've seen, and ideas for the sorts of tools that could assist in completing this kind of task more efficiently.
-
22:52
»
SecDocs
Authors:
Drew Fisher Tags:
reverse engineering USB Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: While USB devices often use standard device classes, some do not. This talk is about reverse engineering the protocols some of these devices use, how the underlying USB protocol gives us some help, and some interesting patterns to look for. I'll also detail the thought processes that went into reverse engineering the Kinect's audio protocol. This talk will narrate the process of reverse engineering the Kinect audio protocol – analyzing a set of USB logs, finding patterns, building understanding, developing hypotheses of message structure, and eventually implementing a userspace driver. I'll also cover how the USB standard can help a reverse engineer out, some common design ideas that I've seen, and ideas for the sorts of tools that could assist in completing this kind of task more efficiently.
-
22:52
»
SecDocs
Authors:
Drew Fisher Tags:
reverse engineering USB Event:
Chaos Communication Congress 28th (28C3) 2011 Abstract: While USB devices often use standard device classes, some do not. This talk is about reverse engineering the protocols some of these devices use, how the underlying USB protocol gives us some help, and some interesting patterns to look for. I'll also detail the thought processes that went into reverse engineering the Kinect's audio protocol. This talk will narrate the process of reverse engineering the Kinect audio protocol – analyzing a set of USB logs, finding patterns, building understanding, developing hypotheses of message structure, and eventually implementing a userspace driver. I'll also cover how the USB standard can help a reverse engineer out, some common design ideas that I've seen, and ideas for the sorts of tools that could assist in completing this kind of task more efficiently.
-
-
12:01
»
Hack a Day
[Johan von Konow] found that he was using an FTDI USB-to-Serial chip in a lot of his projects and wanted to have an easy prototyping component on hand to facilitate this. What he came up with is the extremely small USB to serial dongle seen above. The copper fingers are designed to plug into your [...]
-
-
7:01
»
Hack a Day
Like many businesses out there, [Joonas Pihlajamaa’s] employer requires him to change his password every few months. Instead of coming up with a complex, yet easy to remember password again and again, he built a small USB device to do the work for him. He dismantled an old USB memory stick, fitting it with an [...]
-
-
11:01
»
Hack a Day
The teachers at [Jjshortcut's] school were each given a Webkey by the administration as a promotional item of sorts, but most of the staff saw them as useless, so they pitched them. [Jjshortcut] got his hands on a few of them and decided to take one apart to see what made them tick. He found [...]
-
8:01
»
Hack a Day
[Antoine] wrote in to let us know that he soldiers on with his flashlight project. He’s doubled up on the supercaps and tripled the LEDs (translated). The core concept has stayed the same since the original version. He wanted a flashlight that was small and used no batteries. This iteration came about as he looked at [...]
-
7:01
»
Hack a Day
This USB slingshot controller really brought a smile to our faces. Part of it is the delightfully silly promo video you’ll find after the break. [Simon Ford] combined nature and technology to bring this USB-enabled slingshot into existence. The frame itself is from a branch he found in the Epping Forrest of London. He whittled [...]
-
-
11:01
»
Hack a Day
With the coming of Android 3.1 you finally have the option of using the device as a USB host. This may be through a USB OTG (On-the-Go) adaptor, but nonetheless it’s a feature which was sorely missed until now. [Manuel] put together a guide on using Android as a USB host. As you can see, [...]
-
-
8:58
»
Hack a Day
The V-USB library is a pretty handy piece of code that lets you add USB connectivity to ATtiny microcontrollers (it was previously named tinyUSB). But if you’ve ever looked into adding the library to your own projects you may have been stymied by the complexity of the code. There are many examples, but there’s a lack of [...]
-
-
15:46
»
Packet Storm Security Exploits
When using usb_modeswitch and invoking pppd from wvdial in -detach mode. a /tmp/debug file is created. A local Attacker could overwrite arbitrary files.
-
15:46
»
Packet Storm Security Recent Files
When using usb_modeswitch and invoking pppd from wvdial in -detach mode. a /tmp/debug file is created. A local Attacker could overwrite arbitrary files.
-
-
13:01
»
Hack a Day
[Mike] picked up a cheap USB hub for four pounds (about $6) including delivery. He wanted to know how it’s possible to get quality electronics for that price, and as you may have guessed it’s not possible. He cracked open the power supply that shipped with the hub and hooked it up for some testing. [...]
-
-
12:01
»
Hack a Day
Looks like the Lightweight USB Framework for AVRs (LUFA) has just been ported for ARM microcontrollers. NXP recently released a package for their LPC Cortex M3 family of ARM controllers. You won’t find a reference to LUFA on their nxpUSBlib description page (which we think is kind of sad), but if you grab a copy [...]
-
-
15:46
»
Packet Storm Security Advisories
It was discovered that a local attacker can send a malformed USB hub class descriptor via a malicious USB device and trigger a kernel stack overflow in Solaris versions 8, 9, 10, and 11 Express.
-
15:46
»
Packet Storm Security Recent Files
It was discovered that a local attacker can send a malformed USB hub class descriptor via a malicious USB device and trigger a kernel stack overflow in Solaris versions 8, 9, 10, and 11 Express.
-
15:46
»
Packet Storm Security Misc. Files
It was discovered that a local attacker can send a malformed USB hub class descriptor via a malicious USB device and trigger a kernel stack overflow in Solaris versions 8, 9, 10, and 11 Express.
-
13:01
»
Hack a Day
[Irongeek] is up to his old tricks once again with this new key logger prototype. It’s in the early stages, as attested by the breadboard built circuit, but [Adrian] still gives us a demo video after the break showing where he’s at right now. It comes in two flavors, the USB pass through seen above, [...]
-
-
15:01
»
Hack a Day
The advent of integrated USB peripherals in microprocessors (PIC, AVR, etc.) has certainly taken a lot of the work out of developing USB devices, not to mention reducing the silicon parts in these designs. But do you know what you’re doing when it comes to controlling them with user-friendly applications? [Simon Inns] is lending a [...]
-
-
16:03
»
Packet Storm Security Advisories
Ubuntu Security Notice 1236-1 - It was discovered that the Auerswald usb driver incorrectly handled lengths of the USB string descriptors. A local attacker with physical access could insert a specially crafted USB device and gain root privileges. It was discovered that the Stream Control Transmission Protocol (SCTP) implementation incorrectly calculated lengths. If the net.sctp.addip_enable variable was turned on, a remote attacker could send specially crafted traffic to crash the system. Various other issues were also addressed.
-
16:03
»
Packet Storm Security Recent Files
Ubuntu Security Notice 1236-1 - It was discovered that the Auerswald usb driver incorrectly handled lengths of the USB string descriptors. A local attacker with physical access could insert a specially crafted USB device and gain root privileges. It was discovered that the Stream Control Transmission Protocol (SCTP) implementation incorrectly calculated lengths. If the net.sctp.addip_enable variable was turned on, a remote attacker could send specially crafted traffic to crash the system. Various other issues were also addressed.
-
16:03
»
Packet Storm Security Misc. Files
Ubuntu Security Notice 1236-1 - It was discovered that the Auerswald usb driver incorrectly handled lengths of the USB string descriptors. A local attacker with physical access could insert a specially crafted USB device and gain root privileges. It was discovered that the Stream Control Transmission Protocol (SCTP) implementation incorrectly calculated lengths. If the net.sctp.addip_enable variable was turned on, a remote attacker could send specially crafted traffic to crash the system. Various other issues were also addressed.
-
-
10:01
»
Hack a Day
[Rajendra] found an easy way to make a USB temperature logger. He already had a USB to UART adapter that takes care of the heavy lifting. On one end it’s got the USB plug, on the other a set of pins provide a ground connection, 3.3V and 5V feed, as well as RX/TX lines. To [...]
-
-
15:01
»
Hack a Day
Finally, the USB port on the back of your television can be tapped for something useful. [Don] is using this add-on device to automatically cut the power to his Ambilight clone. Initially, he got tired of unplugging the power adapter each time he shut off the television, so he added a switch. But laziness overcame [...]
-
-
17:01
»
Hack a Day
[Jamie] built his own USB connected arcade controller. We’ve been seeing a lot of these lately, and they usually involve soldering buttons to a keyboard PCB. But [Jamie] decided to go a different route and use his own microcontroller. This method always gets a bit hairy when it comes to deciding how to connect it [...]
-
-
11:04
»
Hack a Day
When [beerninja] wanted to swap his USB keyboard from one game console to another without mucking about with wires, he asked the Hack A Day forums for some help. [Meseta] (AKA [UAirLtd]) came to the rescue and built [beerninja] a remote-controlled USB switch. After opening up a no-name USB switch, [Meseta] discovered that the switching [...]
-
-
12:01
»
Hack a Day
[Kekszumquadrat] wanted to use a classic controller to play emulator games on his Android tablet so he set out to convert an SNES gamepad to connect via USB. He found an old USB keyboard at a yard sale for about 3 Euros. He knew that the emulator he prefers has the option of remapping all [...]
-
-
13:14
»
SecDocs
Authors:
Richard Rushing Tags:
USB Event:
Black Hat USA 2010 Abstract: The USB HID class describes devices used with nearly every modern computer. Many predefined functions exist in the USB HID class. These functions allow hardware manufacturers to design a product to USB HID class specifications and expect it to work with any software that also meets these specifications. The (HID) Hacker Interface Design is due to the fact that the benefits of a well-defined specification like the USB HID class is the abundance of device drivers available in most modern operating systems. So this hardware attack is cross platform. And ultra simple to carry out.
-
-
7:07
»
Hack a Day
A couple of weeks ago we put up a post titled Addressing Microchip’s open source problem where we talked about some of their shortcomings as far as open source code goes, specifically the TCP/IP stack and the USB stack. The comments were predictably fairly negative. The interesting part here is that Microchip actually listened. If [...]
-
-
11:01
»
Hack a Day
Here’s an altered PCB that gives USB control to an Ikea Dioder. This is a $50 product that comes with four strips each containing nine RGB LEDs. The stock controller has a color selection wheel and a couple of buttons. [Rikard Lindström] wanted to use it to match ambient light to the colors of his [...]
-
-
10:31
»
Hack a Day
[Shawn McCombs] is up to no good with his first Teensy project. The board you see above takes the input from a PS2 keyboard and converts it to a USB connection. Oh, and did we mention that it also keeps track of everything you type as well? From the beginning the project was intended to be a [...]
-
-
12:18
»
Hack a Day
Wouldn’t it be nice if there was an AVR microcontroller with USB device support built in so you would not need a separate programmer or serial link? Well in fact there are quite a few of them, and this awesome tutorial (google translate) is a quick and easy crash course in using the ATMega 16/32U4 [...]
-
-
8:01
»
Hack a Day
The Isostick, a Kickstarter project now in development, is meant to emulate an optical drive in the form of a USB stick. Although there is nothing new with putting an iso file (optical disk image) on a USB stick, what is unique about this drive is that it fully emulates a drive without actually having [...]
-
-
12:18
»
Packet Storm Security Advisories
Andy Davis of NGS Secure has discovered a High risk vulnerability in Oracle Solaris. A local attacker can send a malformed USB configuration descriptor via a malicious USB device and trigger a kernel stack overflow, which could potentially result in arbitrary code execution.
-
12:18
»
Packet Storm Security Recent Files
Andy Davis of NGS Secure has discovered a High risk vulnerability in Oracle Solaris. A local attacker can send a malformed USB configuration descriptor via a malicious USB device and trigger a kernel stack overflow, which could potentially result in arbitrary code execution.
-
12:18
»
Packet Storm Security Misc. Files
Andy Davis of NGS Secure has discovered a High risk vulnerability in Oracle Solaris. A local attacker can send a malformed USB configuration descriptor via a malicious USB device and trigger a kernel stack overflow, which could potentially result in arbitrary code execution.
-
12:04
»
Hack a Day
[Scott] was recently given a frequency counter, and once he brought it home, he started contemplating how he could possibly make it better. While the counter worked well as-is, he wanted to find a way to record data readings over a reasonably long period of time. He figured that interfacing it with his computer would [...]
-
-
13:05
»
Hack a Day
While many mobile phone manufacturers are moving towards the micro-USB interface as a standard, others such as Apple and HTC are still bucking the trend. Part of [arto’s] job includes repairing mobile phones, and last month he found himself faced with a pair of broken HTC handsets that needed their charging ports replaced. Replacements for [...]
-
-
13:22
»
Hack a Day
[Ko] wanted to add an extra monitor to his computer, but he wasn’t looking for something huge that would sit atop his desk – he desired something smaller, much smaller. His ChibiMo mini USB monitor is a neat little creation that lets you extend or mirror your Windows desktop onto a tiny 128×64 pixel LCD [...]
-
-
11:01
»
Hack a Day
While some people know that you should be wary of USB drives with unknown origins, the same care is rarely, if ever exercised with USB peripherals. The security firm Netragard recently used this to their advantage when performing a penetration test at a client’s facility. When the client ruled out the use of many common [...]
-
-
16:01
»
Hack a Day
Sometimes it’s apparent that there is no practical use for something featured on Hack a Day, but we don’t know if [Andrew Filer]‘s Apple ][ USB keyboard qualifies for this. After reading through the very thorough documentation available in electronic and dead tree formats, [Andrew] decided that Apple ][ would make a great USB keyboard. [...]
-
-
9:31
»
Hack a Day
[Vic] bought a Kvarts DRSB-01 Geiger counter a few years ago, and recently dug it out of his electronics stash. The counter is a run of the mil no-frills unit. It lacks any kind of LCD display and it cannot be calibrated, so Sievert exposure ratings are out of the question. The unit essentially monitors background [...]
-
-
8:01
»
Hack a Day
Being a long time prankster, [cyclonite] came up with this pretty clever hack in an old USB flash drive. The drive was removed from its case, and the stock memory and controller was removed. On the back, an attiny 2313 is glued to the pcb, while resistors are swapped to work with the VUSB library. [...]
-
-
15:01
»
Hack a Day
Hackaday forum member [Dan Fruzzetti] wrote in to share a simple, yet useful hack he built just the other day. He and his wife both have Evo 4G smartphones and they were pretty disappointed in the lack of portable charging solutions available. Instead of buying something and modifying it to his needs, [Dan] decided to [...]
-
-
11:30
»
Hack a Day
We still can’t figure out why a standard charging scheme hasn’t been developed for handheld devices (other than greed). Certainly we understand that many devices have different electrical needs as far as voltage and current are concerned, but we still long for the ability to use one charger for many different doodads. [Rupin] is trying [...]
-
9:01
»
Hack a Day
The module works as a pass through, providing access to data and power lines for a USB device. [BadWolf] built it in order to sniff out communications between peripherals and the Universal Serial Bus. For now it just provides access to the different signals, but we think there’s quite a bit of usefulness in that. [...]
-
-
12:00
»
Hack a Day
[Neal] wanted to tether his DSLR to his computer, but he wasn’t about to fork out the $1,000 Nikon was asking for their wireless adapter. Instead, he opted to construct his own solution using two separate camera accessories which cost him less than $200 when finished. The two components he purchased were a wireless USB [...]
-
-
4:03
»
Hack a Day
[Austyn] is currently working on reverse engineering a PlayStation 3 SixAxis controller’s USB communications. You may be thinking that this has already been done but [Austyn] was unable to find useful source code so he’s started his own project called libopenaxis. The process he used to sniff out USB communications makes for an interesting read. [...]
-
-
7:02
»
Hack a Day
[REVENGE] pointed out a couple cool little project posts from the geekhack fourms converting vintage keyboards to USB with a Teensy. They both have VUSB support, so any avr micro controller that meets VUSB’s requirements in theory could be used. First up is a PS/2 to USB keyboard converter, and while yes this has been [...]
-
5:00
»
Hack a Day
[dunk] constructed an easy to use AVR-based USB controller with the ability to drive up to six R/C hobby servos at once. While the USB-powered Atmega8 he used supplies the necessary PWM signaling for all of the servos, an external power supply rated up to 30v at 3A is necessary to provide the 5v of [...]
-
-
6:00
»
Hack a Day
Sometimes it helps to have an entire set of tools with you to tackle a problem, and sometimes it helps to take the discreet route. [StenoPlasma] took the latter of these approaches, and stuffed a USB hub, a 16 GB flash drive, and an Atheros based USB wireless adapter into a regular looking USB mouse [...]
-
-
6:28
»
Hack a Day
This very informative talk given at Shmoocon 2011 has been posted over at IronGeek. Covering all kinds of angles that a person could attack someones computer through the USB port, this should be read by anyone who is security minded at all. No matter which side of the port you tend to be on, this [...]
-
-
13:00
»
Hack a Day
Mircrochip has a new USB to Serial converter available called the MCP2200. [Sjaak] suspected that it may have been made from an existing 20-pin PIC and found that reading the device signature with the PICKIT3 shows that the chip is an 18F14K50. Most likely this is running Microchip’s USB stack but it’s hard to tell [...]
-
-
7:33
»
Hack a Day
The most common email we get is “how do I learn how to hack things?”. It looks looks like [ladyada] gets that question a lot too. She didn’t waste any time writing up a step by step guide to reverse engineering USB devices, specifically the Kinect. She goes into depth on how USB works, how [...]
-
-
6:54
»
Carnal0wnage
Image my happiness with i got the droid update and saw usb tethering available.
Then image my sadness-->rage that VendorX wants to charge to charge another 15 bucks to tether.
so following the instructions from
here it is possible to tether via USB on linux. Evidently
PDAnet works great but i dont use windows cept for powerpoint and i cant afford a mac.
so here's how to get it going if you dont want to click the link...plus i'll never remember that URL.
install proxoid on your droid
download & extract the
android sdk to your linux system
turn on android usb debugging -->application-->development-->usb debugging
turn on proxoid
connect usb
cg@c0:~$ cd android-sdk-linux_86/tools/
cg@c0:~/android-sdk-linux_86/tools$ sudo ./adb start-server
cg@c0t:~/android-sdk-linux_86/tools$ ./adb forward tcp:8080 tcp:8080
set your FireFox network settings to use localhost 8080 and you can surf. You should also be able to set your whole system to go thru the droid as well if you set the system wide network proxy.
-
-
8:11
»
Hack a Day
[Frank Zhao] put together a USB business card. It’s even got the instructions printed right on the silk screen of the PCB explaining how it should be used. He based the design around an AVR ATtiny85 microcontroller. It runs the V-USB package that handles USB identification and communication protocols. The rest of the hardware is [...]
-
-
13:25
»
remote-exploit & backtrack
Hello,
I plugged my logitech usb headset into the pc running BT3 and it wont let me hear any sound.
If i click Kmix it shows realtek my sound driver as the output, is there anyway i can change this to the headset being the output?
THanks.
-
-
12:52
»
Hack a Day
This circuit board is from the USB dongle of a Girl Tech IM-ME. [Joby Taffey] took it apart and poked around to learn its secrets. These dongles come along with the pink pager that has become a popular low-cost hacking platform. But we haven’t seen much done with the dongle itself up until now. [Joby] used the [...]
-
-
8:53
»
Hack a Day
[Furrtek] hooked up his Game Boy printer for use with a PC (translated). The two-part hack started with a cable to attach the device via USB. A Nokia interface cable was used as a base to translate the USB signals into serial, and an ATtiny45 microcontroller added to talk to the printer. He did a [...]
-
-
6:00
»
Hack a Day
[Arthur] built an IR receiver to use with XBMC. Because it’s software specific he identifies the device on USB as a keyboard, and passes the IR commands as keystrokes used by the popular media platform. Normally, homebrew IR receivers would use LIRC, the Linux Infrared Remote Control software. But this method doesn’t require you to [...]
-
-
6:00
»
Hack a Day
[Gigawatts] built a pair of USB ports into his mouse and there’s enough room to plug-in small USB drives and dongles. After seeing Thursday’s storage mouse hack he decided to tip us off about the post. He started with a Logitech G5 gaming mouse. The wireless version of this mouse has a battery pack, but [...]
-
-
9:00
»
Hack a Day
[Thice] wanted to try his hand at incorporating a USB driving into other devices. He chose to add storage to his USB mouse but didn’t want to alter the factory look provided by a color-changing LED inside. To make things fit he ended up cutting a good portion of a USB hub’s circuit board off [...]
-
-
10:00
»
Hack a Day
The Arduino Team presented some new products at Maker Faire this weekend. It’s a significant update. The Arduino UNO and Arduino Mega 2560 update the Duemilanove and Mega respectively. They now use an ATMega8U2 instead of an FTDI USB to serial converter chip. Allowing an Arduino to become nearly any kind of USB device. A [...]
-
-
7:19
»
Hack a Day
This little box remembers all of your user names and passwords. Inside you’ll find an Atmel AT89S5131 microcontroller which has built-in USB capability. When the box is plugged into a USB port it identifies as a keyboard. Manipulating the buttons on the top and side will select and print out various stored usernames and passwords. [...]
-
-
9:21
»
Hack a Day
This USB to Zipit Dock adapter and a special kernel makes USB host mode for the Zipit possible. Previously, the cheap and hackable wireless client needed a hardware modification to enable USB support. The new kernel bootloader, called U-Boot, makes the internal alterations unnecessary (see the demo after the break). Now the only caveat is one [...]
-
-
12:01
»
Hack a Day
[Ladyada] takes some time out of her day to explain the common options available for connecting projects through USB. You may be thinking that you already do this with an Arduino. Well, yes and no. The Arduino uses one of these options, an FTDI chip that handles the USB on one side and spits out microcontroller-friendly voltage signals on [...]
-
-
15:09
»
Hack a Day
You get what you pay for. [Jkx] wanted to see how a USB to RS232 cable could be sold for just $1.70 and found out that it’s not actually RS232 compliant. The cable communicated as TTL levels, not the 12V expected of RS232 (although it can handle 12V incoming). He didn’t really want to use [...]
-
-
11:55
»
remote-exploit & backtrack
Hi guys, im a total noob so please dont flame...
I just bought this tl-wn422g with an atheros chipset and its USB.
I get it in the list of usb
but it is not in the ifconfig
how can i get it to work?
-
-
0:08
»
remote-exploit & backtrack
First of all sorry about my english,
I bought an ASUS Eeepc 1005P netbook and downloaded bt4 final iso and setup a USB pen drive when i start netbook from USB, no screens found message occur then stop the working
What can i do ?
-
-
7:00
»
Hack a Day
[Jackzylkin] has posted an instructible showing, in detail, the process of creating a USB typewriter. He takes us through the process of disassembling the typewriter, mounting all the sensors where the little hammers strike, and wiring it all up to a custom board to interface with the computer via USB. While he is selling the [...]
-
-
13:03
»
Hack a Day
[Mark Bog] thought it was a waste to use batteries for his desktop touch pad. Quite frankly we agree that if you can avoid using disposable cells you should. He ditched the dual AA batteries inside of his Magic Trackpad and built a battery-sized adapter to feed it some juice. It consists of a dowel [...]
-
10:30
»
Hack a Day
It’s been a long time coming, but the video above shows a modchip circumventing the PlayStation 3 security by running a game from a hard drive. The sites Ozmodchips.com which sells the modchip, and psx-scene.com which has confirmed them as working are both unstable right now due to heavy traffic. But here’s what we know. [...]
-
-
15:00
»
Hack a Day
[Mathieu] spent three months developing this multimedia remote control. It connects to a PC via USB or Bluetooth and communicates with Winamp to pull down track information for display on a Nokia LCD screen. It can also be used as a wireless headset via the two on-board jacks. [Mettieu] thinks it’s just a small hop [...]
-
-
12:00
»
Hack a Day
Regular Hackaday reader [Osgeld] is at it again with this USB conversion for an NES controller. This is a ubiquitous hack that we started seeing very early on, sometimes involving an adapter kit, and other times including things like a thumb drive and USB hub. But this time around is truly a bare-bones version. He’s using [...]
-
-
9:00
»
Hack a Day
[Sven Killig] Has managed to get his Nexus One into USB host mode. This allows him to plug in all kinds of peripherals such as web cams, keyboards, even a displaylink unit. This is fantastic as it really opens up the possibilities of this device. You can see that he now has an amazingly functional [...]
-
-
9:14
»
Hack a Day
Did you order that 4-port USB hub because it was almost free but now it’s just sitting in your junk box? Why not turn it into an In System Programmer for AVR chips? [Paul] came up with HUB ISP as an answer to the chicken-or-egg problem we’ve seen with other diy programmers. It uses the [...]
-
-
7:55
»
remote-exploit & backtrack
Trying to get my BU-353 gps to work with BT3 USB.
I use:
gspd /dev/ttyUSB0
telnet localhost 2947
r
and this gives R=0, or R=1 alternating everytime I do "r"
also I do p, and this gives p=?
So, I dont think I have the device installed, or ttyUSB0 is incorrect.
If the device is installed it should be getting a fix, because I installed in in windows and BU-353 works fine with gpsinfo.
gpsd -V gives 2.37
Im hoping I can make this work, "plug and play", so I dont have to start making static changes to the USB setup. Also does BU-353 PnP work better with BT4?
-
-
6:00
»
Hack a Day
WaitingForFriday’s [Simon Inns] is quite possibly the USB interface and PIC master. This week he let us know about his VU-meter repurposed as a computer performance monitor using a PIC18F2550 and his open source USB Generic HID communication class. With PWM the meter’s needles and RGB LED can be accurately set and even dampened for [...]
-
-
14:51
»
remote-exploit & backtrack
Salve a tutti ho una scheda wireless usb (US300EX Lite) ma non riesco a connettermi a internet.Dando iwconfig e ifconfig me la riconosce come ra0 sembra tutto ok,mi trova le reti e tutto però nonmi connette.La cosa strana è che con l altra scheda mi metto in monitor mode,e vedo come se fossi connesso,cioe vedo il mio bssid access point e connesso ce la penna usb col suo mac e mi prende pure l handshake come se avessi effettuato l accesso solo che non sono connesso,non capisco dove è il problema.Ho smanettato per un bel pò con ubuntu e altre distro,e poi sono approdato su bt 3 e poi 4 e un po ci capisco ma qui non so come uscirne.Grazie a chi mi risponde,vorrei usare la usb su un computer che non ha la scheda wifi.
Bus 002 Device 004: ID 148f:3070 Ralink Technology, Corp. RT2870 Wireless Adapter
ra0 RT2870 Wireless ESSID:"" Nickname:"RT2870STA"
Mode:Auto Frequency=2.462 GHz
-
-
12:00
»
Hack a Day
[Simon Inns] is still hard at work making USB connectivity for PIC microcontrollers easier for the hobbiest. He’s released a framework for PIC based USB devices under Windows. It includes the firmware needed for USB compatible 18F PIC chips as well as a C# class library and example programs for the Windows side of things. [...]
-
-
11:04
»
Hack a Day
[Adrian Crenshaw] is up to no good with this programmable USB device. [Adrian's] creation identifies itself as a USB keyboard and can be programmed to do whatever you want. That’s because it’s based around the Teensy board which sports an ATmega32 that will cost you only $18. He’s added a set of DIP switches for [...]
-
9:32
»
Hack a Day
[Micah Dowty] has implemented full speed USB host control on a Propeller microcontroller. He’s motivated by the thought of using USB based WiFi and Bluetooth dongles in his projects as ready-made solutions.We’ve seen USB host control with the Arduino and it really opens up the flood gates for advancing your projects through storage, wireless connectivity, [...]
-
-
5:42
»
remote-exploit & backtrack
hey all i am new hire,
first sorry for my englisch i am from Belgium :)
bt4 works fine, but if i run bt4 with usb its go very fast..
now a create a bt4 virtual on my PC, but the problem is i can surf the Internet, but when i go to network he says not wireless found? isent only working with a wiffi usb stick?
wean i run bt4 on usb he reconnaissance my card and i triad to hack my one wifi en its work out for me
i stil not under stand way i can do that on virtual ?
very sorry for my English
-
-
14:23
»
remote-exploit & backtrack
Hello ... very warmly
I'm new to this forum .. The first thing I would say is if you located the badly about it immediately apologize and please move if need be ...
But going to the heart of the matter.: Today I installed Back Track 4 on VB, I do everything I did and it works like a doll, so to speak. But one thing, namely MAIN - Not working: (. Is it WIFI, and here once I would like to emphasize that I have a USB WiFi antenna, the exact model of antennas - AirLive WL-1600USB
Please help, because they probably know from personal experience that BackTrack without an Internet connection is useless
P.S. VBoxGuestAdditions - has already been installed
Edit :
Slight correction: As for the Internet: I have internet signal, all you need to move the walls, but I still can not set the `interfaces in WIFI card ...,
Still waiting for answers...,
Thanks in advance, and Yours sincerely,
Szpaner
-
-
13:11
»
Full Disclosure
Posted by Michael Holstein on Mar 31
No, they offered them a set amount of time to do it. In practical terms
for a "lost/stolen USB stick" this is a totally useless test, and is
100% marketing fluff.
If they were really serious, they would have published the full
specifications and provided a dozen sample units for a reasonable entry
fee to anyone that wanted to try.
They also wouldn't be the first manufacturer to severely misunderstand
the correct implementation of AES...
-
10:40
»
remote-exploit & backtrack
Hello,
I've been trying to get my USB adapter to work for about a month now and i could really use some help.
I'm on Windows 7 using VMware Workstation and BT4 Final with a Linksys WUSB600N V1.
When i go into BT4 my usb is shown in iwconfig/ifconfig/lsusb.
I can up my adapter with ifconfig ra0 up.. However it hangs for up to 2 - 3 minutes. After it is up i run WICD and attempt to to search for wireless connections. RARELY it will find any.. I have to close and re open it many times before it finds anything. Same issue with iwlist ra0 scan rarely finds anything.
When i do find wifi in WICD and i hit connect it will hang often saying "Taking down interface" and then after staying at "Connecting". I then have to close and reopen it many times in order to get it to connect. it takes me about an hour to get it to work.
is my usb shitting the bed or is there something making it hang? i'de really like to get this to work.
bridging works fine but you cant do anything with it brigded.
any help would be great.
-
7:39
»
remote-exploit & backtrack
Hi,
Trying and searching for days to resolve this. Im trying to get this to work as a favor for someone but no luck whatsoever. :)
using the ASUS wl-167 usb adapter.
I have a windows vista pc, where all is working fine as soon as I plugin the usb adapter, a popup shows and the internet works..(took me a while since I am not familiar with Linux...at all). Also, I see the icon on the bottom of my screen.
Now, i'm trying to do the same on my friends laptop which is a brand new HP with windows 7. however I see no icon, have no internet yet when I go to host virtual network mapping it does see the ASUS adapter. Whenever I plugin the usb adapter I get a message that The network bridge on device VMnet0 is temporarily down because the bridged ethernet device ...... Same setting as on the pc but just cant get it to work
BTW I set both up according to the youtube tutorial by kiwi12k.
I don't know if i'm giving enough information but please help me out with this one. Maybe there is a simple solution that i'm just not seeing.
thanx in advance
-
-
16:00
»
Hack a Day
Here’s a pretty simple hack to enable playback from a USB drive on LG televisions. It only works on European hardware, the LH, LF, and some LU models. The hack consists of downgrading the firmware to version 3.15, then navigating through some service menus.
It’s not quite as hardcore as the Samsung firmware hacking, but the [...]
-
-
12:00
»
Hack a Day
[Matthias Hullin], the creator of the snega2usb let us know that its name has been changed to the Retrode. We watched this device go through the development cycle and learn to read SNES and Sega Genesis cartridges via a USB connection. Now it’s seeing some hacking to extend those capabilities. [Jon] managed to rig the [...]
-
-
12:40
»
Hack a Day
USB is convenient and that makes it desirable in many many projects. [Simon Inns] has the process down and is sharing it with his recent PIC based USB tutorial. Prompted by requests for help on the matter after having published a post about his Commodore 64 interface, he set out to detail the particulars when [...]
-
-
8:55
»
remote-exploit & backtrack
Ciao a tutti,
scusate la domanda ma non so più dove cercare... e sono anche un pelo arrugginito sullo "smanettamento" di Linux...
insomma ieri ho installato BT4 tutto OK tranne la penna USB D-Link con chipset ralink rt73
praticamente tutte le distro che ho provato la riconoscono in automatico... ma perchè BT no? :(
quello che ho avuto il tempo di controllare sul pannello di controllo di KDE è che il device USB è riconosciuto (cioè mi dice che è una penna USB D-link con chip ralink rt73) ma non viene inserito nella scheda delle periferiche di rete...
avete un idea?
ps ora cerco un posto dove fare una presentazione ;)
-
-
13:00
»
remote-exploit & backtrack
Salve volevo sapere quali sono i comandi per attivare la potenza da 1W sulla scheda AWS063H
-
-
12:15
»
Hack a Day
Here’s a USB oscilloscope project from a few years back. It’s easy to build on a single-sided PCB and very cheap because it uses just a handful of parts. At the center, an ATtiny45 microcontroller uses its ADC capabilities for the two traces and also handles the USB connectivity. The internal oscillator is used and [...]
-
7:35
»
remote-exploit & backtrack
Bonjour à tous,
je souhaiterai installé backtrack 4 sur clé usb. Je sais que le 3 je peu l'installer sur une clé usb de 2 go mais backtrack 4 je ne sais pas :( ...
j'aimerai sur 4go, es-ce possible? sinon il faut 8 go ? je parle d'une installation complète comme si c'était un disque dur...
Merci d'avance !
-
-
6:17
»
remote-exploit & backtrack
Hi,
I've installed Backtrack4 on my USB Drive after the tutorial "Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption"
I've installed all but when I try to boot is just says
"
Searching for Boot Record from USB RMD-FDD...OK
GRUB
"
And at this point nothing happens...
Can anybody help my?
Bober
-
6:10
»
remote-exploit & backtrack
Hallo,
ich habe nach dem Tutorial "Backtrack 4 Bootable USB Thumb Drive with Full Disk Encryption" Backtrack auf meinem 8gb Stick installiert.
Alles hat einwandfrei funtioniert. Wenn ich jedoch den PC neustarte und über den USB-Stick booten will, erscheint nur auf dem Bildschirm:
"
Searching for Boot Record from USB RMD-FDD...OK
GRUB
"
und es tut sich nichts mehr...
Ich habe es schon mehrmals neu installiert, jedoch habe ich ständig wieder das selbe Problem beim Booten.
Hat jemand eine Idee, was der Fehler sein könnte?
mfg
Bober
-
-
5:32
»
remote-exploit & backtrack
also, da das ein etwas allgemeineres problem ist und ich mich vielleicht einfach zu dumm anstelle poste ich das mal hier in der anfängerecke.
ich habe einen 8GB usb stick auf dem ich die bootpartition und den bootloader installiert habe.
also bei der installation 100MB /boot partition (/dev/sdb1) auf den usb stick und auf diese auch den bootloader installiert.
auf der richtigen festplatte ist windows 7 installiert und eben meine root partition und die swap partition.
benutze ich zum booten den usb stick funktioniert alles wunderbar. BT4 booten, arbeiten, fertig. ohne usb stick wie gewohnt windows benutzen ohne irgendwelchen kram mit bootloadern. warum ich das so machen will ist einfach der grund, dass ich den MBR der primären festplatte nicht mit grub überschreiben wollte aber dennoch nicht immer eine live cd nutzen will. soweit so gut. funktioniert ja auch erstmal ;)
jetzt aber zum problem.. den stick würde ich auch gerne für daten nutzen. habe also den rest des sticks (/devsdb2) mit ntfs formatiert. also unter fdisk eine zweite partition angelegt, diese auf ntfs gesetzt. dann auch mit mkfs.ntfs -L 8gbstick /dev/sdb2 ein dateisystem angelegt.
das funktioniert unter linux auch problemlos. wird erkannt und ich kann die partition bzw den stick verwenden um daten zu sichern usw. aber unter windows wird das nicht so erkannt. in der datenträgerverwaltung sehe ich den stick mit der boot-partition und der ntfs partition. es wird auch ein laufwerkbuchstabe zugewiesen. allerdings kann ich nciht darauf zugreifen und werde zum formatieren aufgefordert. das habe ich dann nach ein paar anderen versuchen auch gemacht (also nicht den ganzen stick, sondern nur die ntfs partition) da sollte man ja denken dass die boot-partition davon unberührt bleibt. das ist aber leider nicht so. bei einem anschließenden neustart und dem versuch BT4 zu starten bekomme ich einen GRUB error (code 17).
weiß da jetzt nicht so recht weiter. bin für jederlei hilfe dankbar :)
mfg, cit
-
-
12:26
»
remote-exploit & backtrack
Bonjour
j'ai un soucis avec wicd manager (sous BT4)
que je lance par:
update-rc.d wicd defaults
/etc/init.d/wicd start
il trouve tout les réseaux alentours mais pas le mien ! (le plus fort pourtant)
Alors que airodump le trouve ! (et xubuntu aussi)
je suis en live USB et depuis que j'ai changé de clé usb et d'os (xandros -> xubuntu) j'ai aussi ce message d'erreur au démarrage:
ext3-fs / sda1 couldn't mount because of unsupported optionnal features (240)
merci de votre aide
-
5:00
»
remote-exploit & backtrack
hello,
I'd like to get a good wireless USB adapter with Qos(802.11e), that works well with backtrack 4 and support monitor mode as well as injection.
I you can recommend a good one I woud really appreciate it.
-
-
8:46
»
remote-exploit & backtrack
i have d-link dwl 2100 ap connected to biquied patch using low-loss coxial cable it works like charm can this be done to usb dongle so that i can put the antenna which comes with the dongle far to get better range or to extend it.if yes how long the coxial cable should be.the usb dongle gives 17dbm connected 2 dbi omni antenna.?
if that can't be done.i have d-link dwl-2100 ap it acts as repeater also but thing is that you should put the root wep. i need to crack the root acess point wep.using my acess point as repeater then seat near my acess point with dongle connected to laptop.i have permission from my uncle(the root acess point is for my uncle) to do that.i wanna do this for eductianal perpose only. not for illegeal activites so i'm wondering is there a way to do that?
and one thing since d-link is an wirless acess point can i use it instead of usb dongle to crack wep ?i have permisson like i said before. any info would be helpeful. thanks man
i gooogle that and search in fourms too much but can't find answers for those question.
i'm familiar with BT3,BT4 prefinal ,BT4 final,unbunte,ophcrack.
before i finish on bt3 i got pwr in airodump-ng and in bt4 pre final but in bt4 it's zero why?is there anything to do to fix that? i have driver zd1211rw.
-
8:44
»
remote-exploit & backtrack
i have d-link dwl 2100 ap connected to biquied patch using low-loss coxial cable it works like charm can this be done to usb dongle so that i can put the antenna which comes with the dongle far to get better range or to extend it.if yes how long the coxial cable should be.the usb dongle gives 17dbm connected 2 dbi omni antenna.?
if that can't be done.i have d-link dwl-2100 ap it acts as repeater also but thing is that you should put the root wep. i need to crack the root acess point wep.using my acess point as repeater then seat near my acess point with dongle connected to laptop.i have permission from my uncle(the root acess point is for my uncle) to do that.i wanna do this for eductianal perpose only. not for illegeal activites so i'm wondering is there a way to do that?
and one thing since d-link is an wirless acess point can i use it instead of usb dongle to crack wep ?i have permisson like i said before. any info would be helpeful. thanks man
i gooogle that and search in fourms too much but can't find answers for those question.
i'm familiar with BT3,BT4 prefinal ,BT4 final,unbunte,ophcrack.
before i finish on bt3 i got pwr in airodump-ng and in bt4 pre final but in bt4 it's zero why?is there anything to do to fix that? i have driver zd1211rw.
-
-
14:02
»
Hack a Day
[Jethomson] worked out a way to use a Nokia USB cable at a USB to Serial cable. He was able to pick up one of these cables for less than $3 delivered. A little probing worked out which conductors go with the appropriate signals and from there he developed a way to protect the 3.3v [...]
-
9:44
»
remote-exploit & backtrack
Este método para obtener una instalación en una unidad USB, es la más simple disponible utilizando Unetbootin. Tenga en cuenta que vamos a formatear el dispositivo USB y borrar su contenido.
1. Conecta tu USB Drive (con mínima capacidad de 2 GB)
2. Formatear la unidad USB a FAT32
3. Descargar Unetbootin de
UNetbootin - Homepage and Downloads
4. Iniciar Unetbootin DiskImage y seleccionar (utilizar BackTrack-ISO final)
5. Seleccione la unidad USB y haga click en "OK" para crear una unidad de arranque USB BackTrack
6. Acceda a BackTrack con el usuario y la contraseña de root / toor

fuente:
USB Live
-
-
1:39
»
remote-exploit & backtrack
Slave ho usato LinuxLive USB Creator 2.4, per fare la USB e ho dato 800mo di persistente , ma non mi conserva i files salvati desktop, eppure fa tutto in automatico, quelche consiglio? grazie
-
-
11:00
»
Hack a Day
There’s a simple hack to use your Motorola Droid phone as a USB host. It is a hardware-only hack that doesn’t require you to crack open your phone, root it, or even to change firmware (although device drivers in the stock Android image may be quite limited). The dongle above is used as a key [...]
-
-
3:09
»
remote-exploit & backtrack
ok i know you are sick of questions which card buy, or whatever but now i have to decide which one buy and from what i read here this two are good ones.
so if you will help me i will appreciate. i hope i didnt this post in wrong forum. So
ALFA 802.11g High Power Wireless USB WiFi Adapter 1000mW with 5 dBi Antenna RTL8187L
or this one:
Hawking[HWUG1+HA12W] WiFi 108M NIC & 12 dBi Antenna i dont know chipset for sure i think its rt73 from what i read, but if suggested ill ask seller on ebay.
i need usb wlan for general usage. debian or BT4, long-distance.
thanks for help.
-
-
21:08
»
remote-exploit & backtrack
Hello, I recently downloaded and made a Backtrack 4 live CD, but wanted something persistent, so I created a bootable USB by following this* tutorial. I can easily get to the prompt when I boot the basic 1024x768 and the Live CD options. However I am unable to get to any form of GUI.
*Oops, no links.
offensive-security.com/videos/backtrack-usb-install-video/backtrack-usb-install.html
I was able to boot a GUI once by using the fixvesa command before startx. Since then I have been unable to reproduce this. I have since reformatted and reinstalled the USB drive a couple of times and tried booting the GUI with and without the fixvesa command with no results.
Every time I run the startx command the screen goes black and there is a blinking underscore in the top left corner of the screen.
I believe it to be a driver issue perhaps, but what is really strange is how I was able to get it working only once and have been unable to reproduce the results.
I am fairly new to Linux so if you have any idea how to fix this, please be specific as to which commands I should use. I am also open to alternative methods such as dual booting. I can't test anything using the live CD as I'm on a netbook with no optimal medium. Specs to follow:
HP mini 2133
Via C7-M 1.2GhZ
1GB DDR
Thanks
~Nemesis
-
13:33
»
remote-exploit & backtrack
Hello
Im looking for a device with same compability and power like ALFA AWUS036H, but with 802.11n support.
I checked some forum entries, but there are so many different sayings about devices, that Im confused more and more...
I hope somone of you can give me an undisputed answer.
-
-
19:26
»
remote-exploit & backtrack
OK so I'm new to BackTrack and I'm curious about the command line...as the title says I am booting BT4 from a 2gb usb in the persistent mode. After I load the gui how would I connect to my home network wifi? :confused:
-
12:00
»
Hack a Day
This is a “why didn’t I think of that?” idea. [Alec] needed a way to connect an IDE DVD drive using USB. Rather than order a connector he pulled the circuit board out of an old USB hard drive enclosure and connected to his DVD drive. Bang, recognized and running.
This will prove extremely handy if [...]
-
-
11:41
»
Hack a Day
[I-Bot] has put together some libraries that make it easy to use gaming controllers with an Arduino. They interface through the USB host shield. This means that PS3 controllers connect via USB through a cable or a dongle. With the Wii remote things get a little more interesting. A Bluetooth dongle is used to make [...]
-
-
13:53
»
remote-exploit & backtrack
Ok,..
I am brand new to backtrack and jumped on like literally days before BT4 came out. But here is my delema. I bought a USB 2 gig memory stick for BT3 works great! However, BT4 is said to have an 8 gig requirement. I don't feel like running back to the store and buying another usb memory stick, cause I have an External 1 terabyte Hard drive (which is plenty large enough). I would use this like a secondary HD on my laptop. However, I have a large amount of files on there already. Is there a way I can set BT4 up to run on the External HD on start up (I know how to boot it in bios) and not have the current files being damaged? Do I use the USB install that came with BT4 on the desktop? Also,.. how do I set up BT4 to be able to save settings and files on the desktop? I essentially would like to use BT4 as an operating system on it's own bypassing the internal HD. Any assistance would be helpful :)
Also,.. I just thought about this... Can I use the 2 gig jump drive to do a dual boot and just use the usb memory stick to hold the boot up logs, then use the external HD to use as operating hard drive? I read that if I install the whole thing on the ExHD it will erase everything on it cause it needs to format... woah I'm lost, lol... Help me out! Please and thank you :)
Z
-
4:12
»
remote-exploit & backtrack
Hey,
I have a 8 GB SanDisk USB.And backtrack 4 can't detect it when use the command Dmesg .I'm booting the BT4 from a virtual box and it can detect the virtual box's driver (hda).
Any ideas?
Please bear with me a little.
thanks,
-
-
18:06
»
remote-exploit & backtrack
Hello,
I have been browsing the forums but I haven't found any topic which could help me with my problem. Is there any USB adapter which is a "default"/"standard" choice for you? Something of high performance/working out of the box and compatibile with spooonwep/spoonwep2/spoonwpa? All suggestions appreciated :)
Best regards :)
PS. Also, I have been looking at Ralink RT73 chipset. Does it work out of the box with the previously named apps?
-
14:24
»
remote-exploit & backtrack
As the title stated, I am trying to find some facts about
WHICH USB Wifi N-Draft that is known to work with Backtrack installed on VMWare Fusion.
The USB N-Draft that I am looking are the ones that supports
BOTH 2.4Ghz and 5Ghz.
If someone has used a particular USB N-Draft Wifi for the above, could you share the brand, model and where you buy it?
Thanks!
-
6:59
»
remote-exploit & backtrack
I found this USB network adapter sku.31911 at dealexreme's site (Sorry but im not allowed to post links yet) and searched and searched but didn't find any useful information. Is this supported under linux or is there a better alternative for that money? I can't find out what chipset it uses so if anyone here has one or knows if it is supported i will welcome an answer. :confused:
-
-
17:38
»
remote-exploit & backtrack
Bonjour a tous,
Je viens d'installer backtrack 4 final.
J'ai utiliser la clé Wifi usb D-link DWA-140 B2 avec le driver rt2870.
Airmon-ng place la carte en monitoring mais aireplay-ng n'arrive pas a injecter.
Je n'ai vu nulle part des personnes ayant tester le crack wep avec cette clé. Donc je souhaiterais la lister dans les cartes non compatible injection de paquet.
Y'a t-il un emplacement sur ce forum pour ca ?
Sinon es ce que par hazard quelqu'un aurait reussi avec un autre driver ?
Voila ...
Et aussi quels sont les principales cartes wifi compatibles a 100 pour cent monitoring et injection ?
en espérant que certains trouveront réponses a mes questions.
++ all
-
14:05
»
remote-exploit & backtrack
Hi jungs..
Koennt ihr mir ggf. weiterhelfen? ich moechte auf meinem Bootf'higen 8 GB USB stick eine Wordlist speichern sodass ich die in Backtrack aufrofen kann...
Wenn ich BT4 starte und dann zb einen Ordner erstelle ist dieser nach dem n'chsten neustart weg.. denke das ist dann bei der Wordlist nicht anders..
thx
Nawuko
-
13:19
»
remote-exploit & backtrack
Hey guys,
I'm pretty lost guys.I need your help :confused:. Right now i have to USBs,one 8 GB the other is 2 GB.I downloaded BT4 final and booted it by unetbootin in the 8 GB flash desk.Then i get this screen with a list (i'm not allowed to post a screen shot):
1- start backtrack Framebuffer (1024x768)
2- start backtrack framebuffer (800x600)
3- ..............
4- .................
5- start persistent live CD
6- ..........
7- .........
8- memory test
9- boot the first hard disk
I didn't know what to choose.so i waited for it to load by itself and it did.Then i got this screen where i have to put this command : startx
After that i didn't know what to do?Partitions and stuff...sorry guys,but any ideas?
Note: about the USBs which one should format to FAT32 (where i put the bt4 ISO in it) and which one should i format to ex2 (where i can save my changes)?And is there anyway to use only the 8GB USB for booting and saving changes?
thanks and sorry for troubling you with me.
regards,
-
11:27
»
remote-exploit & backtrack
Hello,
im new here and i'm from Germany :)
I have a Fritz! Wlan USB Stick N, but it doesn't work with BackTrack ! Can someone tell me a good USB Stick ?? Please also tell me about the drivers and things like that, whick i'll need to use the usb stick with BackTrack !
Hope you can help me !
donfellone
-
7:00
»
remote-exploit & backtrack
Bonjour tout le monde,
Alors voilà j'ai ubuntu 9.04, j'ai téléchargé unetbootin ainsi que le fichier iso de backtrack. Je lance unetbootin je sélectionne l'iso de BT4 final puis ma clef usb jusque là tout va bien, mais une fois que je reboote la fenêtre de unetbootin arrive avec comme simple choix default et un compte à rebours qui ne fait que de recommencer sans rien faire ni lors de l'appui sur entrée d'ailleurs. Je suis bloqué aillant cherché depuis hier différente façon.
j'ai essayer de passer par distribution backtrack ... dans unetbootin toujours sur ma clef usb au redémarrage boot error !!
sur mes derniers essais j'ai formaté ma clef : -umount /dev/sdb1
-sudo mkfs.vfat -F 32 /dev/sdb1
et essayé avec les fichiers iso de "backtrack-linux.org/downloads" toujours avec unetbootin je n'ai même plus la fenêtre de boot mais directement le message boot error j'abandonne :(
-
-
14:31
»
remote-exploit & backtrack
Been trying to get my WUSB54G V1 working for the longest time on BT4, and i'm pretty lost at this point. I knew that i had to get the supported chipset for it from p54, so i went and did that but i'm not sure what that did and how do i apply it to WUSB54G. Any help would be welcomed i'm quite lost at this point, and its been taking me weeks to do this.
-
4:03
»
remote-exploit & backtrack
MERCI AUX MODOS DE SUPPRIMER CE POST cause : DOUBLE POST
Bonjour à tous et bravo pour ce forum que je lis depuis qlqs semaines déjà;
j'ai un dell vostro 1520 et une cle Alfa AWUS036EH RTL8187L. Avec BT4 avec un clé wifi AWUS036EH RTL8187L en VMware (image telecharger sur le site officiel)
BT4 se lance bien en revanche ne detecte pas ma cle Alpha. je lance les commandes suivante :
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
root@bt:~# lsusb
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@bt:~# airmon-ng
Interface Chipset Driver
bon rien...; je telecharger et j'install un driver et le patch, ca ne marche pas, j'en install un autre (telecharger sur un tuto d'air crack) la commande make passe bien donc pour moi le drivers est installé mais toujours rien dans iwcondif et airmon
voila, donc la je suis un peu perdu, je pense que le controleur usb n'est peut etre pas reconnu.....?
auriez vous une piste svp !!! :)
merci d'avance et bon dimanche !
-
4:03
»
remote-exploit & backtrack
MERCI AUX MODOS DE SUPPRIMER CE POST cause : DOUBLE POST
Bonjour à tous et bravo pour ce forum que je lis depuis qlqs semaines déjà;
j'ai un dell vostro 1520 et une cle Alfa AWUS036EH RTL8187L. Avec BT4 avec un clé wifi AWUS036EH RTL8187L en VMware (image telecharger sur le site officiel)
BT4 se lance bien en revanche ne detecte pas ma cle Alpha. je lance les commandes suivante :
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
root@bt:~# lsusb
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@bt:~# airmon-ng
Interface Chipset Driver
bon rien...; je telecharger et j'install un driver et le patch, ca ne marche pas, j'en install un autre (telecharger sur un tuto d'air crack) la commande make passe bien donc pour moi le drivers est installé mais toujours rien dans iwcondif et airmon
voila, donc la je suis un peu perdu, je pense que le controleur usb n'est peut etre pas reconnu.....?
auriez vous une piste svp !!! :)
merci d'avance et bon dimanche !
-
3:07
»
remote-exploit & backtrack
Salutation les gens,
je parcours votre forum depuis quelques temps déjà, c'est un sacré boulot ! félicitation.
Si je viens vers vous aujourdhui, parceque dans un premier temps je dbute un peu sous linux donc il me manque des connaissance de base, mais j'apprends :)
Je viens d'acquerir une AWUS036 8187L, apparement bonne reputation et logiquement détectable par BT4. BT4 tourne sous vmware (image telecharger sur le site officiel). Aucun soucis pour le moment, l'os fonction.
Le probleme : ma clé alfa n'est visiblement pas reconnu, mais je me demande s'il ne s'agit pas plutot d'un probleme de controlleur usb :
root@bt:~# iwconfig
lo no wireless extensions.
eth0 no wireless extensions.
root@bt:~# lsusb
Bus 002 Device 001: ID 1d6b:0001 Linux Foundation 1.1 root hub
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
root@bt:~# airmon-ng
Interface Chipset Driver
j'ai reinstallé le driver trouvé sur le net sans succes lors de la commande make et aussi testé avec les driver d'air cracks (aircrack-ng.org/doku.php?id=r8187]r8187 [Aircrack-ng]) avec succès mais toujours rien dans iwconfig et airmon-ng
c'est pour cela que j'en déduit un probleme avec le controleur usb.... en revanche quand je regarde sur le net avec les mots clé usb et linux, on tombe bien evidemment sur liveusb et autres....
en esperant que vous pourrez me faire avancer dans mon schlimbic...
en attente de vous lire et bo dimanche à tous !
-
-
0:11
»
remote-exploit & backtrack
Hello, I have just downloaded
Backtrack 4 Final and put it on my usb. I formatted the USB from NTFS to FAT 32, so now that I have it burned to the flashdrive I booted it.
From this point on I got stopped in loading process and the screen pauses. I type login and it prompts me for a
user-name, I type
root and for the
password I type
toor. Then I gives me and error message saying that it is incorrect.
I would simply like to know how to access
BT4 Final
-
-
11:15
»
remote-exploit & backtrack
Hello guys, im using laptop TOSHIBA Satellite P200D - 12F, is it supported by BT 3/4?
And my USB stick is Airlive WL-1600USB
If my laptop doesnt support BT3 ill run it through VMware.
thanks
-
10:50
»
remote-exploit & backtrack
find meine festplatte nicht usb bt4
hab bt4 auf dem stick boote es mit der live cd
nur kann ich auf meine festplatte von windows nicht zugreifen
der browser zeig mir keine daten an und die daten die ich auf dem stick habe kann ich auch nicht ansehen
bitte dringent um hilfe
achja ne frage nebenbei gibt es einen videoplayer fuer bt4??
-
4:27
»
remote-exploit & backtrack
Hi!
I've had BT4 pre final Live install on a usbstick and using it for a some time with no problems but then i decided to do a hardrive install, the installation worked fine until i rebooted and tried to login. My keyboard didn't work and i have tried to move it to every usb port and boot without keyboard and mouse and plugged in them at the login prompt without sucess. I have no other keyboard avalible but it works perfect when i boot on live usb stick and in ubuntu. Suggestions?
-
4:27
»
remote-exploit & backtrack
Hi!
I've had BT4 pre final Live install on a usbstick and using it for a some time with no problems but then i decided to do a hardrive install, the installation worked fine until i rebooted and tried to login. My keyboard didn't work and i have tried to move it to every usb port and boot without keyboard and mouse and plugged in them at the login prompt without sucess. I have no other keyboard avalible but it works perfect when i boot on live usb stick and in ubuntu. Suggestions?
-
-
14:57
»
remote-exploit & backtrack
Bonsoir,
J'ai tenté d'installer en suivant un tuto spécial BT4 final sur une clé vierge à partir d'une autre clé où était monter le live.
j'arrête en cours d'insta pour refaire l'installation basique comme j'ai déjà pu le faire et après formatage des partitions déjà créées, hop, ma clé a rétrécie :/
Quelqu'un sait comment faire via la commande fdisk pour retrouver l'étendue de la mémoire d'origine ?
-
5:18
»
remote-exploit & backtrack
I recently downloaded BackTrack 4 and have run into a problem.
My linux experience is limited and I'm only just starting to get a hang of using the console/UNIX commands ect. Before anyone jumps on me for asking to be spoon fed I'm searching for answers while I'm waiting for replies.
So, I downloaded BT4, and played with it as a Live USB (4gb), seemed nice enough and had a bunch of cool tools but i wanted to be able to save files and changes so i decided to buy a 16gb flash drive and install it onto that. I booted BT4 from a DVD and went through the install process, making sure that I installed it to the USB drive (sdb) however i think i forgot to click on the "Advanced" tab on the 7th and final step to change the boot loader from the default hd0 (i think?) to sdb, After BT4 finished installing I clicked to reboot, entered the BIOS and changed the boot from CD/DVD to USB, rebooted and got a boot error from the USB.
Realizing what must be causing the problem I booted from the DVD again, reformatted the USB drive and went through the install process again, this time making sure I set it to install the boot loader to sdb. Once it finished installing I rebooted, set the BIOS to boot from USB, and BT4 booted fine, i made a file and rebooted again just to make sure it was saving files and then shut down. Everything is roses right?
Well not quite, I removed the USB stick and tried to boot windows XP which is installed on my HDD and i got this error:
Quote:
GRUB Loading Stage 1.5.
GRUB loading please wait...
Error 21
|
This is no doubt caused from the first install where it installed the boot loader to hd0. Now i can't boot windows. I tried using the XP setup disk to repair the installation but that didn't work. How can i fix this?