All the Hardware Badges of DEF CON 25

Hardware is the future. There is no better proof of this than the hardware clans that have grown up around DEF CON, which in recent years has become known as Badgelife. I was first drawn to the custom hardware badges of the Whiskey Pirates at DC22 back in 2014. Hardware badges were being made by several groups at that time but that was mainly happening in isolation while this year the badge makers are in constant contact with each other.

A slack channel just for those working on their own DEF CON badges sprung up. This served as tech support, …read more

Continue reading All the Hardware Badges of DEF CON 25

This Weekend: Vintage Computer Festival West

Next weekend is the Vintage Computer Festival West, held at the Computer History Museum. Hackaday is once again proud to sponsor this event that brings together the people and hardware that drove the information revolution. [Bil Herd] and [Joshua Vasquez] will be on hand representing the Hackaday Crew.

This year’s talks show an impressive lineup of people. [Bil Herd] will be on stage with a collection of other engineers who secured Commodore’s place in history. The Computer History Museum has a very active restoration program for original computer hardware. Friend of Hackaday, [Ken Shirriff], has been working on a restoration …read more

Continue reading This Weekend: Vintage Computer Festival West

Look What People Brought to Breakfast at DEF CON

Sunday was our Breakfast at Hackaday meetup and a swarm of folks showed up, take a look at the hardware they brought with them! Vegas can be a tough place to set up a meetup — especially if you don’t want to rent a room. We filtered into a Starbucks across the street from Caesar’s and ended up packing the high-top table areas. It turns out you get a really funny look from the baristas when you go through the coffee line and ask for four dozen pastries and a few buckets of coffee.

The size of the space made …read more

Continue reading Look What People Brought to Breakfast at DEF CON

“Borrow” Payment Cards with NFC Proxy Hardware

Contactless payments are growing in popularity. Often the term will bring to mind the ability to pay by holding your phone over a reader, but the system can also use NFC tags embedded in credit cards, ID card, passports, and the like. NFC is a reasonably secure method of validating payments as it employs encryption and the functional distance between client and reader is in the tens of centimeters, and often much less. [Haoqi Shan] and the Unicorn team have reduced the security of the distance component by using a hardware proxy to relay NFC interactions over longer distances.

The …read more

Continue reading “Borrow” Payment Cards with NFC Proxy Hardware

“Borrow” Payment Cards with NFC Proxy Hardware

Contactless payments are growing in popularity. Often the term will bring to mind the ability to pay by holding your phone over a reader, but the system can also use NFC tags embedded in credit cards, ID card, passports, and the like. NFC is a reasonably secure method of validating payments as it employs encryption and the functional distance between client and reader is in the tens of centimeters, and often much less. [Haoqi Shan] and the Unicorn team have reduced the security of the distance component by using a hardware proxy to relay NFC interactions over longer distances.

The …read more

Continue reading “Borrow” Payment Cards with NFC Proxy Hardware

Michael Ossmann Pulls DSSS Out of Nowhere

[Michael Ossmann] spoke on Friday to a packed house in the wireless hacking village at DEF CON 25. There’s still a day and a half of talks remaining but it will be hard for anything to unseat his Reverse Engineering Direct Sequence Spread Spectrum (DSSS) talk as my favorite of the con.

DSSS is a technique used to transmit reliable data where low signal strength and high noise are likely. It’s used in GPS communications where the signal received from a satellite is often far too small for you to detect visually on a waterfall display. Yet we know that …read more

Continue reading Michael Ossmann Pulls DSSS Out of Nowhere

Injecting Code Into Mouse Firmware Should Be Your Next Hack

Here’s a DEF CON talk that uses tools you likely have and it should be your next hacking adventure. In their Saturday morning talk [Mark Williams] and [Rob Stanely] walked through the process of adding their own custom code to a gaming mouse. The process is a crash course in altering a stock firmware binary while still retaining the original functionality.

The jumping off point for their work is the esports industry. The scope of esporting events has blown up in recent years. The International 2016 tournament drew 17,000 attendees with 5 million watching online. The prize pool of $20 …read more

Continue reading Injecting Code Into Mouse Firmware Should Be Your Next Hack

Arduino vs. Arduino: Musto Out, Banzi In

Federico Musto, who until two days ago owned the largest part of Arduino AG has been bought out, having today been replaced by a combination of Massimo Banzi and Fabio Violante.

This should bring to a close the saga that began with a fork where two companies called themselves “Arduino” and bizarrely continued for almost a year after the reconciliation of the two was announced. What remains today is one corporation called Arduino AG, now captained by Massimo Banzi as Chairman and CTO, and Fabio Violante as CEO.

Massimo Banzi was one of the original founders of Arduino and one …read more

Continue reading Arduino vs. Arduino: Musto Out, Banzi In

Superconference Interview: Samy Kamkar

Samy Kamkar has an incredible arsenal of self-taught skills that have grown into a remarkable career as a security researcher. He dropped out of high school to found a company based on Open Source Software and became infamous for releasing the Samy worm on the MySpace platform. But in our minds Samy has far outpaced that notoriety with the hardware-based security exploits he’s uncovered over the last decade. And he’s got a great gift for explaining these hacks — from his credit card magstripe spoofing experiments to hacking keyless entry systems and garage door opener remotes — in great depth …read more

Continue reading Superconference Interview: Samy Kamkar

Sunday: Breakfast at DEF CON

Nurse your hangover by having Breakfast at DEF CON with Hackaday this Sunday. You’re invited to our yearly ritual by marking the beginning of the end with coffee and pastries at 10:30 am.

Choosing an exact location in advance is always tricky (anyone who’s been to DEF CON understands). We’ll pick a place once we hit town later this week. For now, head over to the Breakfast at DEF CON event page and hit the “join the team” button on the bottom left so we can let you know when we’ve found the perfect location for the breakfast meetup.

Extra …read more

Continue reading Sunday: Breakfast at DEF CON