2022-07-27 I was at May Contain Hackers MCH2022
After I visited earlier Dutch hacker events HEU, HIP97, HAL2001, WTH2005 I missed HAR2009, OHM2013 and SHA2017. I can only say 'life happened' because my son was born in the interim and my interests changed. In the beginning of this year I heard about the new planning for May Contain Hackers as the original plan was for 2021 and it was postponed due to covid-19. I started thinking about attending and when the opportunity to get a free ticket arose due to my links with Surf I got serious. Life is still happening so I coordinated with the rest of the family whether I could be missed at home and for how long. The result was that I would go Friday evening until Tuesday afternoon and I would go there by recumbent bicycle with the luggage trailer so the rest of the family could use the car. The people from Surf set up our own village Village:SMRF next to Village:OS3. I slept in my own tent because I really want my rest at night and I want that rest at a somewhat normal schedule (not really a hacker schedule). I brought a 1-person tent, a sleeping bag, clothes, gear to make breakfast with tea and coffee, a smartphone with charger and a handheld radio with charger. Having to move all my luggage myself on the recumbent bicycle made me very selective in what to bring.I went to several talks spoke a number of well-known people, got to know new ones, saw people there I didn't expect and had a good time. What I really enjoyed was the friendly atmosphere. One aspect of that caught my attention: besides people with non-traditional clothing and hairstyles I saw several people who looked like they were somewhere in a gender transitioning process. They felt free at MCH to be themselves. One person responded to me when I shared this observation: "I saw more LGTB flags here than at Pride in Amsterdam". Also MCH was really non-commercial. Mentions of the sponsors were minimal and never in-your-face. The weather cooperated a lot! It might have been quite different with bad weather. There was some rain before Friday so I saw mentions of "Mud Contains Hackers" on twitter. Saturday and Sunday were hot, Monday was cooler. Tuesday started with rain and some more showers, so my tent wasn't completely dry when I packed. Cycling the 45 kilometers was fine. I used google maps for navigation (but with the smartphone not visible, just the instructions on my earbuds). I had to stop several times to check the screen to check the instructions and sometimes google came up with weird things. I had it set up for cycle navigation but it still said to take three-quarters of a roundabout to go left while the roundabout allowed me to go from one cycling path on the left of the road to the other. It took me about 2 hours 45 minutes including stops for navigating and stops for drinking, eating and adding some water to nearby trees. All in all I had a great time. I had my moment of "I am getting too old for this" but that faded and I really enjoyed myself. List of talks I attended, with links to the place to view it online:
- Everything is an input device (fun with barcodes)
- Honey, let's hack the kitchen: attacks on critical and not-so-critical cyber physical systems
- Radio Amateurism via commercial satelite (no video available), workshop with a demo of the QO-100 broadband transponder
- A Brief History of Automotive Insecurities
- Hacking COVID: Hackers helping the government
- Finding 0days in Enterprise Web Applications
- Audio networks and their security implications
- drand: publicly verifiable randomness explained
- The War in Ukraine: Cyberfront
- Cyber crises and what you can do to face the challenge
- Around the world in 80 networks, Hacking Universities Worldwide. ( ...lessons learned at age 15. ) - Rob Coleman (no video available)
- Payment terminals as general purpose (game-)computers
- A Smart Light Hacking Journey
- Sensor.Community - Global Open Environmental Data Platform
- How do GPS/Galileo really work & how the galmon.eu monitors all navigation satellites
2022-07-20 I redid my 'recent QSO map' with leafletjs and openstreetmap tiles
2022-07-16 Trintelhaven revisited
Friday I had the day off and a plan together with Kees PA5Z to visit the location Trintelhaven again, just like we visited the location Trintelhaven in the summer of 2019. This time the plan was to test some different antennas and make morse contacts. Driving there wasn't too big of a problem although you really have to use navigation to get through Lelystad, it's like through-traffic from the main highway (A6) to Enkhuizen isn't really promoted. We got there fine, looked for a nice spot, found all the work machines we saw on the previous visit gone so there was a nice spot again. We selected a secluded field not to close to someone working on a boat, far away from everything else.We set up my endfed antenna with one end up in the trees and the other end supported by a metal pole. On testing this antenna worked fine again. I redid all the soldered connections in it after it failed me a few weeks ago. I called CQ in the 20 meter band in a spot where one can usually find slow morse and got some contacts with nice people in the log. One with SM6RWJ in Sweden, one with WB2YVY Kurt in the state of New York in the US and one with LA9FG Nol in Norway near Aalesund.
Endfed antenna set up at TrintelhavenKees also made some contacts. His nicest contact was with SK6SAQ the amateur radio station at the World Heritage Grimeton radio station. After a few morse contacts the radio Kees brought stopped working, it switched off and restarted when trying to transmit morse. It wasn't very clear what caused this. As planned we took turns on the antenna sending morse, while both listening for answers and writing down the callsigns and the replies that came, including first names and weather reports: it was cloudy in Norway. A nice day out. Sending standard messages and writing down what was coming back is getting easier after all our morse training!
Kees PA5Z en Koos PE4KH behind the radio
2022-07-14 Don't use mifare classic cards for stored value
More than 11 years ago I wrote about the Magna Carta card systems for access / payment and the use of the mifare classic (in Dutch). I found a strong statement on the Magna Carta website back then that using mifare classic for stored value was a really bad idea, since the encryption on the card is broken. It's now 2022 and I read MIFARE Cracking about a company using a mifare classic for stored value which shows the steps from discovering what type of card that company uses to the option of manipulating the stored monetairy value on the card. Found via Travis Goodspeed on twitter - A practical article on cloning a Mifare Classic employee badge to tamper with the snack machine.
2022-07-13 Adding pictures to the reports of our trip to Iceland
I created a flickr album Iceland 2022 - Our trip to Iceland in April/May 2022 and linking to the pictures from the right report was still kind of hard because it's a complicated bit of html with repetitions and chances of errors. The solution: make the computer help me. The flickr API allows me to fetch data about an album and about the pictures in that album, so I spent an evening writing some perl to get links to all the pictures in the album with thumbnails. Now most days of Complete reports of our trip to Iceland have been enhanced with pictures.
2022-07-10 I participated in the IARU HF contest
This weekend was the IARU HF World Championship contest and I participated after fully planning this in advance. I made sure my contest logger was set up and communicating with the remote radio and its morse keyer in advance. I participated on the 10, 15 and 20 meter bands. The original plan was to also include 40 and maybe 80 but there was enough to contact on 10 and 15 on Saturday evening, so I only got around to the 20 meter band on sunday. In total 182 contacts: 20 in SSB (speech) and 162 in CW (morse).Band 160 80 40 20 15 10 QSO's 0 0 0 58 83 41 Mult 0 0 0 24 33 16 Pts: 586 Mul: 73 Score: 42778I managed to make a few contacts outside Europe, not a lot of real DX. Calculation when entering the log: Raw Score: 453 Qpts x 73 Mults = 33,069 (181 QSOs) so there is a difference in opinion between TLF and the ARRL contest website. The difference in number of contacts is due to one duplicate. The difference in Qpts (QSO points) is due to a difference in the scoring rules. As the ARRL contest website is up to date with the current rules I think they are right and I need to have a look at the TLF ruleset. Hearing and understanding the morse went ok, I don't think I have a high number of errors.
2022-07-07 First signals on the logic analyzer circuit
The logic analyzer circuit I ordered came in today with the test leads. Both the circuit and the test leads have pins so I need something to connect those two. So the crate with PC cables was ransacked and a floppy drive cable is now connecting the logic analyzer and the test leads. The logic analyzer shows up in linux as usb device:Bus 002 Device 008: ID 1d50:608c OpenMoko, Inc. Fx2lafwFinding software was quite easy: pulseview indeed works out of the box, complete with support for this logic analyzer. I had a look around for something to analyze and finally settled on the ESP32 based NTP clock because that's still on a breadboard and signals are available. I can see the bits flowing between the ESP32 microcontroller and the display module. I'm still seeing some bits come in on unconnected testleads so I'm not sure I am doing everything right. But it's a start!
2022-07-07 Upgraded the homeserver OS to devuan beowulf and replaced the UPS battery
A few days ago I noticed some interesting messages in the apcupsd log:Read the rest of Upgraded the homeserver OS to devuan beowulf and replaced the UPS battery2022-07-04 10:14:15 +0200 Battery disconnected. 2022-07-04 10:16:24 +0200 Battery reattached. 2022-07-04 10:19:53 +0200 Battery disconnected. 2022-07-04 10:20:40 +0200 Battery reattached.Checking the UPS statistics showed me the battery charge was dropping to about 7 % of the capacity while the mains power was available. Since the battery was over 5 years old I ordered a new one to replace it. This battery was scheduled to arrive Wednesday at the start of the afternoon and I wanted to do an upgrade of the Linux distribution on the main homeserver conway anyway because devuan ascii is already 'oldoldstable' (but still getting updates). The homeserver uses 2 disks with the main lvm volume in a raid-1. The /boot and /boot/efi filesystems are mirrored by hand with the idea to end with a working boot even when 1 disk is missing. After the shutdown and replacing the UPS battery I switched the server on again and I was greeted by a grub prompt and nothing to boot. After a few tries I got the system booting again, after that I went searching for what went wrong. Eventually I found out the file /boot/efi/EFI/devuan/grub.cfg pointed at a missing filesystem. I found out the best way to fix this is with# dpkg-reconfigure grub-efi-amd64both with /dev/sda and /dev/sdb filesystems on /boot and /boot/efi.
2022-07-02 Checking hotel keycard security
For the first time in years I was staying in a hotel again for one night. The key for the hotel was a creditcard sized plastic card so I assumed immediately it was an RFID based card. Years ago I would have needed my linux laptop and the touchatag NFC reader to understand more about the keycard, but we're in some form of the future now, so I used NFC taginfo by NXP on my phone and held the keycard up to the phone. The taginfo app made the happy noise and told me it was an NXP mifare classic card. The app even told me most sectors had a default key of FF:FF:FF:FF:FF:FF. One sector was not accessible due to a different key but with mfoc (Mifare Classic offline cracker) or one of the other attacks on the Mifare classic I could probably get access to that sector. So in theory with something like the proxmark I could clone keycards of other visitors. Or clone the keycard of the cleaning crew which gives a lot more access. Update: A bit of searching finds this: Researchers Find Way to Create Master Keys to Hotels - F-Secure Blog. I don't know if the lock I looked at is the same system as the system in this article.
2022-06-23 It seems someone doesn't like it I write about bitcoin extortion scamsItems with tag english before 2022-06-23
Today I'm seeing bounces of bitcoin scam mail, with about the same text as in the bitcoin extortion scam of about a week ago, but with a different bitcoin wallet. In the body of the mail the claim is that the criminal hacked the mailbox of the victim and can now send as the victim, but this criminal decided to 'get even' with me at the same time and contradict himself by setting the sender address to my e-mail address. So I'm now browsing the bounces and see the bitcoin wallet for this scam is 1Mjt2xobFExdZBGfjTVDcgzJWQxRxoHBdA which hasn't scammed anyone yet. As always: don't fall for these scams. Earlier items about bitcoin extortion scams: Earlier, earlier, earlier, earlier, earlier, earlier, earlier, earlier, earlier (although I think bitcoin is generally a really bad idea and a huge scam)Read the rest of It seems someone doesn't like it I write about bitcoin extortion scams