Author Archives: Kevin Bong

THOTCON Logic Analyzer Lab

The THOTCON Logic Analyzer lab walks you through inspecting different embedded protocol signals using a logic analyzer.

To recreate the lab at home you’ll need a Logic Analyzer.

The Lab used Saleae’s “Logic” v.1.2.4 software. You can use a Saleae Logic Analyzer device. Inexpensive $10 USB logic analyzer clones available on Amazon and Ebay work with the Saleae software as well.

You’ll also need some devices to create signals. Here are some ideas:

  • Connect two Arduinos together and configure them to talk Serial, I2C or SPI
  • Buy a $10 RFID lock (available on EBay) and inspect the internal circuitry for various digital signals
  • Connect an Arduino to a Serial EEPROM and perform reads and writes, and inspect the data
  • Utilize Arduino add-on modules, such as an NFC RFID reader, and inspect the signals.

Here is the Lab Manual used for THOTCON 09.

THOTCON Arduino RFID Spoofer/Snooper Lab

The THOTCON 09 RFID Analysis Lab used the following resources:

  • RFID lock that can be found for about $10 on Ebay
  • A Hantek USB digital storage oscilloscope
  • Arduino Nanos to configure as an RFID snooper and RFID spoofer

 

RFID Snooper/Spoofer Resources:

DerbyCon 5.0 2015

At this year’s DerbyCon Michael and Kevin gave two different talks. Below you will find the content for each.

Michael’s Talk

Is that a Router in Your Pocket or are You Trying to P0wn Me

A PDF of the slide deck can be found here: DC2015_Is_that_a_Router_in_Your_Pocket_or_are_You_Trying_to_P0wn_Me
A video of the talk can be found here.

Kevin’s Talk

Five Hardware Hacking Projects Under $30 

A PDF of the slide deck can be found here: DC2015_5_Hardware_Hacking_Projects
A video of the talk can be found here.

RFID Snooper/Spoofer Additional Talk Resources:

Micro Makey Makey

Helical Antenna Resources:

 

Fixing a bricked FTDI chip from Linux

Some years ago FTDI pushed out a new driver with Windows Update that bricks counterfeit FTDI chips by setting the Product ID to “0000”.

But if you are here you probably know that already.

Here is the process that worked for me to return the FTDI chip back to its original VID:PID of 0403:6001 from a Linux (Ubuntu) computer.

  1. Plug in your bricked device.  If you run “lsusb” it should show a device at “0403:0000”.
  2. Download ft232r_prog from ft232r_prog (v1.24) and extract to a folder
  3. Install the build dependencies by running “sudo apt-get install make gcc libftdi-dev"
  4. Change directory into the folder ft232r_prog where the file ft232r_prog.c resides
  5. Type “make” to build the program
  6. Now run “sudo ./ft232r_prog --old-pid 0x0000 --new-pid 0x6001
  7. You are done.  Unplug and re-insert your USB device and run “lsusb” again.  It should show an id of 0403:6001