This section has info on (some) of the random projects that I am working on...
I am working on a bunch of projects that I haven't gotten around to documenting yet, but hopefully will soon.
Here is a partial list - some of these have some preliminary info, but no full write-up yet:
- Home made CNC stepper motor based milling machine.
- FPGA based password cracker.
- Lightwave Electronics 25W green Nd:YAD diode laser.
- OS X Iris Recognition security module.
- OS X Fingerprint reader toolkit.
- E-passport hacking.
- Hacking scratch off lottery tickets using optical means.
At most of the places that I have worked (and datacenters that I have visited) the physical security has been provided by proximity cards. These are the badges that companies provide that you swipe at a door reader and the door magically unlocks for you. Most companies place a great deal of trust in these systems and view them as secure and unhackable. Unfortunately this is not the case -- all that one needs to do is walk past someone with one of thse badges and you can stel the secret number from the badge.
I decided to build just such a device.
Cheatsheet for cloning an HID tag using a Proxmark3 on a Mac.
Get and build the Proxmark source code.
On my machine this lives in ~/src/svn/proxmark/client
Connect the Proxmark, find the port and run the software.
The Proxmark device draws significant power, and is not happy working through some hubs, so connect it directly to the machine. On my machine the device shows up as /dev/tty.usbmodem1421. So, ./proxmark3 /dev/tty.usbmodem1421
Clone the tags:
Read the source / exiting tag:
proxmark3> lf hid fskdemod
#db# TAG ID: 2400a724c4 (47212)
Poke the button on top of the Proxmark to stop reading.
Write to a new T5577/T5567/T5557 tag:
proxmark3> lf hid clone 2400a724c4
Cloning tag with ID 2400a724c4
#db# DONE!