Open Hardware/Modding/Pentesting: Kali Pi, Arduino, and Reverse Engineering
-
Remotely Accessing Secure Kali Pi | Kali Linux Blog
In Secure Kali Pi (2022), the first blog post in the Raspberry Pi series, we set up a Raspberry Pi 4 with full disk encryption. We mentioned that we can leave it somewhere as a drop box. This brought up the question, “If it is not on my local network how do I connect to it to unlock it?” So we will now answer this by showing a few different ways to connect to our secure Kali Pi drop box.
-
Turning a K-Way jacket into an intelligent hike tracker with the Nicla Sense ME | Arduino Blog
Going for a hike outdoors is a great way to relieve stress, do some exercise, and get closer to nature, but tracking them can be a challenge. Our recent collaboration with K-Way led Zalmotek to develop a small wearable device that can be paired to a weather-resistant jacket to track walking speed, steps taken, and even the current atmospheric conditions.
At its core, the tracker can be split into having three main functions: weather prediction, step/climbing activity, and a way to gather and send raw data over Bluetooth® Low Energy to the Arduino IoT Cloud for additional processing and training machine learning models. Performing these tasks is a Nicla Sense ME board, which contains an advanced six-axis BHI260AP IMU, a three-axis magnetometer, a pressure sensor, and a BME688 four-in-one gas sensor with temperature and humidity capabilities.
-
See how Ben Eater reverse engineered an ’80s TV-censoring device | Arduino Blog
Back in the 1980s, there existed a piece of hardware called the “TVGuardian,” which would attempt to censor incoming video in real-time. As recently covered by the wonderful YouTube channel Technology Connections, the TVGuardian reads captioning data as it’s sent and then replaces the bad word(s) with an alternative phrase and also mutes the audio.
Upon learning that the internal dictionary of offensive words is not listed anywhere in the manual, Ben Eater had the idea to extract it himself. After a quick teardown, he discovered a single 93LC86 EEPROM chip functioning in 8-bit mode for a total of 2,048 8-bit words. He then connected an Arduino Uno to the EEPROM’s SPI bus and read 16-byte chunks before dumping the contents to the serial monitor for further investigation.