DerbyCon 8.0

Once again, we are heading to DerbyCon! The big deal this year, is that Kevin and I have been given an opportunity to speak. We will be talking about how to make your own attack tools from a $4 USD Arduino Nano.

These simple Arduinos are a great, low cost way to make your own hacking tools. In the talk, we will be showing you some of the tools we have built and give you some ideas on building your own.

We look forward to seeing our DerbyCon family again and we look forward to making new friends this year too!

– Michael

THOTCON Logic Analyzer Lab

The THOTCON Logic Analyzer lab walks you through inspecting different embedded protocol signals using a logic analyzer.

To recreate the lab at home you’ll need a Logic Analyzer.

The Lab used Saleae’s “Logic” v.1.2.4 software. You can use a Saleae Logic Analyzer device. Inexpensive $10 USB logic analyzer clones available on Amazon and Ebay work with the Saleae software as well.

You’ll also need some devices to create signals. Here are some ideas:

  • Connect two Arduinos together and configure them to talk Serial, I2C or SPI
  • Buy a $10 RFID lock (available on EBay) and inspect the internal circuitry for various digital signals
  • Connect an Arduino to a Serial EEPROM and perform reads and writes, and inspect the data
  • Utilize Arduino add-on modules, such as an NFC RFID reader, and inspect the signals.

Here is the Lab Manual used for THOTCON 09.

THOTCON Arduino RFID Spoofer/Snooper Lab

The THOTCON 09 RFID Analysis Lab used the following resources:

  • RFID lock that can be found for about $10 on Ebay
  • A Hantek USB digital storage oscilloscope
  • Arduino Nanos to configure as an RFID snooper and RFID spoofer


RFID Snooper/Spoofer Resources:

Build a MAM at CypherCon 3.0

Today marks the start of CypherCon 3.0 here in Milwaukee. Once again, we are lucky enough to be running a hardware hacking village. Attendees are able to stop over and build a Minimal Arcade Machine (MAM) based on an ATtiny85.

You can find out more about the project and find the build documents here.


Build Your Own MiniPwner village at DerbyCon 2012

DerbyCon was Awesome, thanks for everyone who stopped by the MiniPwner village.

To set your Pwner up with the same image that we used at DerbyCon, do this:

You can download the DerbyCon flash image from:

Once you flash your router with that image, there will be a file /usr/share/
You need to edit that file in the following manner:
1. Replace “” on lines 6,8,12, and 13 with “”
2. Find the line wireless_ssid=PWNSETUP and change the SSID to your home network’s SSID.

After you’ve made those changes you can run the setup script. 



What you get: You will get all the components needed to build your own MiniPwner pen testing dropbox :

  • TPLink TL-WR703N Router
  • SANDisk Cruzer Fit 4GB
  • Sharper Image portable power pack
  • Power adapter, usb cable, Ethernet cable, Velcro

You will need to bring a laptop that has a wired Ethernet port and a USB port.

The MiniPwner village will be open 1-4pm and 5-8pm on Saturday. We will provide instructions to walk you step by step through building your MiniPwner with the components provided. The high-level steps include formatting your USB drive, flashing your router with OpenWRT, installing the MiniPwner configuration, and installing applications. We will be there to help you along the way and ensure you leave the village with a working MiniPwner.


Attendees are encouraged to pre-register through the “PreRegister for the MiniPwner Workshop” link below. This will guarantee that I will bring a kit for you. I will bring a number of additional kits that people can buy at the conference but the only way to guarantee you’ll get one is to pre-register here.

PREREGISTRATION IS CLOSED.  I have about 70 kits still available for the workshop for cash starting at 1pm on Saturday.


If we are out of stock you can still stop in and try one out, and then order a completed kit by mail from or build your own using the instructions to the left.

Facilitator Information:

On Saturday the MiniPwner village will be facilitated by Kevin Bong, who is originator of the MiniPwner project. Kevin is an Information Assurance Consultant for SynerComm, where he performs audits, assessments and penetration tests. Kevin has a BS in Physics and Computer Science from Carroll University, an MS in Information Security Engineering from the SANS Institute, and has earned multiple certifications including PMP and GIAC GSE. Kevin is also an amateur astronomer, beekeeper, an author and instructor, and a pretty neat dad.

On Sunday the MiniPwner village will be facilitated by Taylor Banks from Ace Hackware and his crew. Taylor is a 20 year veteran of the IT industry with the past 15 years focused on computer, network and information security. Taylor is a CISSP and has provided training and consultation across the globe on Firewalls, Penetration Testing, Intrusion Detection and Incident Response, Enterprise Virtualization and Cloud Computing. Taylor has consulted for the United Nations and NOAA and trained the US Air Force, Navy, Marines, FBI and NSA. He was featured on in 2006 for his work on Anonym.OS and speaks regularly at national security conferences.

HackCon 2016

Kevin’s Talk

Hardware Security Projects Under $30 

RFID Snooper/Spoofer Additional Talk Resources:

Micro Makey Makey


Helical Antenna Resources:

Nexx3020 MiniPwner

Mag Spoofer

DerbyCon 5.0 2015

At this year’s DerbyCon Michael and Kevin gave two different talks. Below you will find the content for each.

Michael’s Talk

Is that a Router in Your Pocket or are You Trying to P0wn Me

A PDF of the slide deck can be found here: DC2015_Is_that_a_Router_in_Your_Pocket_or_are_You_Trying_to_P0wn_Me
A video of the talk can be found here.

Kevin’s Talk

Five Hardware Hacking Projects Under $30 

A PDF of the slide deck can be found here: DC2015_5_Hardware_Hacking_Projects
A video of the talk can be found here.

RFID Snooper/Spoofer Additional Talk Resources:

Micro Makey Makey

Helical Antenna Resources:


Micro Makey Makey

The Makey Makey is a simple device that uses an Atmega microcontroller impersonating a USB Keyboard. I’ve built a version that uses an Arduino Pro Micro I call the Micro Makey-Makey.

The Micro Makey-Makey PCB board has connections for six connectors and two ground cables. This gives you enough to make a standard game controller.

Here’s a quick video on the Micro Makey Makey:

Here are some instructions and source code:




Fixing a bricked FTDI chip from Linux

Some years ago FTDI pushed out a new driver with Windows Update that bricks counterfeit FTDI chips by setting the Product ID to “0000”.

But if you are here you probably know that already.

Here is the process that worked for me to return the FTDI chip back to its original VID:PID of 0403:6001 from a Linux (Ubuntu) computer.

  1. Plug in your bricked device.  If you run “lsusb” it should show a device at “0403:0000”.
  2. Download ft232r_prog from ft232r_prog (v1.24) and extract to a folder
  3. Install the build dependencies by running “sudo apt-get install make gcc libftdi-dev"
  4. Change directory into the folder ft232r_prog where the file ft232r_prog.c resides
  5. Type “make” to build the program
  6. Now run “sudo ./ft232r_prog --old-pid 0x0000 --new-pid 0x6001
  7. You are done.  Unplug and re-insert your USB device and run “lsusb” again.  It should show an id of 0403:6001