3D Printed Tool Tips to Straighten DIP Chips and Unstraighten Resistors

Watching someone assemble a kit is a great way to see some tools you may have not encountered before and maybe learn some new tricks. During [Marco Reps’] recent build of a GPS synchronized Nixie clock kit we spied a couple of handy tools that you can 3D print for your own bench.

Fresh from the factory Dual Inline Package (DIP) chips come with their legs splayed every so slightly apart — enough to not fit into the carefully designed footprints on a circuit board. You may be used to imprecisely bending them by hand on the surface of the …read more

Continue reading 3D Printed Tool Tips to Straighten DIP Chips and Unstraighten Resistors

Simple Mechanism Gives Support for SMT Assembly

With the fine work needed for surface-mount technology, most of the job entails overcoming the limits of the human body. Eyes more than a couple of decades old need help to see what’s going on, and fingers that are fine for manipulating relatively large objects need mechanical assistance to grasp tiny SMT components. But where it can really fall apart is when you get the shakes, those involuntary tiny muscle movements that we rarely notice in the real world, but wreak havoc as we try to place components on a PCB.

To fight the shakes, you can do one of …read more

Continue reading Simple Mechanism Gives Support for SMT Assembly

Buffer overflow: Why does the ESP Register change its value after access violation

Background: Currently trying to exploit a BoF vulnerability. After setting up the environment, running a compiled C program that contains the strcpy function, I disassembled the program as it’s running in the Immunity Debugge… Continue reading Buffer overflow: Why does the ESP Register change its value after access violation

C – Simple Buffer Overflow Exploitation, how is the EIP overwritten in different type calling functions?

General Background:
I have written an echo server trying to implement an example of BoF in C that utilizes a strcpy() function call like such:

// …. including the corresponding libraries depending on host environment

#in… Continue reading C – Simple Buffer Overflow Exploitation, how is the EIP overwritten in different type calling functions?

Racing The Beam On An ATtiny

For the last thirty or so years, the demoscene community has been stretching what is possible on computer systems with carefully crafted assembly and weird graphical tricks. What’s more impressive is hand-crafted assembly code pushing the boundaries of what is possible using a microcontroller. Especially small microcontrollers. In what is probably the most impressive demo we’ve seen use this particular chip, [AtomicZombie] is bouncing boing balls on an ATtiny85. It’s an impressive bit of assembly work, and the video is some of the most impressive stuff we’ve ever seen on a microcontroller this small.

First, the hardware. This is just …read more

Continue reading Racing The Beam On An ATtiny