Wednesday, May 31, 2023

Hacktivity 2018 Badge - Quick Start Guide For Beginners

You either landed on this blog post because 
  • you are a huge fan of Hacktivity
  • you bought this badge around a year ago
  • you are just interested in hacker conference badge hacking. 
or maybe all of the above. Whatever the reasons, this guide should be helpful for those who never had any real-life experience with these little gadgets. 
But first things first, here is a list what you need for hacking the badge:
  • a computer with USB port and macOS, Linux or Windows. You can use other OS as well, but this guide covers these
  • USB mini cable to connect the badge to the computer
  • the Hacktivity badge from 2018
By default, this is how your badge looks like.


Let's get started

Luckily, you don't need any soldering skills for the first steps. Just connect the USB mini port to the bottom left connector on the badge, connect the other part of the USB cable to your computer, and within some seconds you will be able to see that the lights on your badge are blinking. So far so good. 

Now, depending on which OS you use, you should choose your destiny here.

Linux

The best source of information about a new device being connected is
# dmesg

The tail of the output should look like
[267300.206966] usb 2-2.2: new full-speed USB device number 14 using uhci_hcd [267300.326484] usb 2-2.2: New USB device found, idVendor=0403, idProduct=6001 [267300.326486] usb 2-2.2: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [267300.326487] usb 2-2.2: Product: FT232R USB UART [267300.326488] usb 2-2.2: Manufacturer: FTDI [267300.326489] usb 2-2.2: SerialNumber: AC01U4XN [267300.558684] usbcore: registered new interface driver usbserial_generic [267300.558692] usbserial: USB Serial support registered for generic [267300.639673] usbcore: registered new interface driver ftdi_sio [267300.639684] usbserial: USB Serial support registered for FTDI USB Serial Device [267300.639713] ftdi_sio 2-2.2:1.0: FTDI USB Serial Device converter detected [267300.639741] usb 2-2.2: Detected FT232RL [267300.643235] usb 2-2.2: FTDI USB Serial Device converter now attached to ttyUSB0 

Dmesg is pretty kind to us, as it even notifies us that the device is now attached to ttyUSB0. 

From now on, connecting to the device is exactly the same as it is in the macOS section, so please find the "Linux users, read it from here" section below. 

macOS

There are multiple commands you can type into Terminal to get an idea about what you are looking at. One command is:
# ioreg -p IOUSB -w0 -l

With this command, you should get output similar to this:

+-o FT232R USB UART@14100000  <class AppleUSBDevice, id 0x100005465, registered, matched, active, busy 0 (712 ms), retain 20>     |   {     |     "sessionID" = 71217335583342     |     "iManufacturer" = 1     |     "bNumConfigurations" = 1     |     "idProduct" = 24577     |     "bcdDevice" = 1536     |     "Bus Power Available" = 250     |     "USB Address" = 2     |     "bMaxPacketSize0" = 8     |     "iProduct" = 2     |     "iSerialNumber" = 3     |     "bDeviceClass" = 0     |     "Built-In" = No     |     "locationID" = 336592896     |     "bDeviceSubClass" = 0     |     "bcdUSB" = 512     |     "USB Product Name" = "FT232R USB UART"     |     "PortNum" = 1     |     "non-removable" = "no"     |     "IOCFPlugInTypes" = {"9dc7b780-9ec0-11d4-a54f-000a27052861"="IOUSBFamily.kext/Contents/PlugIns/IOUSBLib.bundle"}     |     "bDeviceProtocol" = 0     |     "IOUserClientClass" = "IOUSBDeviceUserClientV2"     |     "IOPowerManagement" = {"DevicePowerState"=0,"CurrentPowerState"=3,"CapabilityFlags"=65536,"MaxPowerState"=4,"DriverPowerState"=3}     |     "kUSBCurrentConfiguration" = 1     |     "Device Speed" = 1     |     "USB Vendor Name" = "FTDI"     |     "idVendor" = 1027     |     "IOGeneralInterest" = "IOCommand is not serializable"     |     "USB Serial Number" = "AC01U4XN"     |     "IOClassNameOverride" = "IOUSBDevice"     |   }  
The most important information you get is the USB serial number - AC01U4XN in my case.
Another way to get this information is
# system_profiler SPUSBDataType  
which will give back something similar to:
FT232R USB UART:            Product ID: 0x6001           Vendor ID: 0x0403  (Future Technology Devices International Limited)           Version: 6.00           Serial Number: AC01U4XN           Speed: Up to 12 Mb/sec           Manufacturer: FTDI           Location ID: 0x14100000 / 2           Current Available (mA): 500           Current Required (mA): 90           Extra Operating Current (mA): 0 

The serial number you got is the same.

What you are trying to achieve here is to connect to the device, but in order to connect to it, you have to know where the device in the /dev folder is mapped to. A quick and dirty solution is to list all devices under /dev when the device is disconnected, once when it is connected, and diff the outputs. For example, the following should do the job:

ls -lha /dev/tty* > plugged.txt ls -lha /dev/tty* > np.txt vimdiff plugged.txt np.txt 

The result should be obvious, /dev/tty.usbserial-AC01U4XN is the new device in case macOS. In the case of Linux, it was /dev/ttyUSB0.

Linux users, read it from here. macOS users, please continue reading

Now you can use either the built-in screen command or minicom to get data out from the badge. Usually, you need three information in order to communicate with a badge. Path on /dev (you already got that), speed in baud, and the async config parameters. Either you can guess the speed or you can Google that for the specific device. Standard baud rates include 110, 300, 600, 1200, 2400, 4800, 9600, 14400, 19200, 38400, 57600, 115200, 128000 and 256000 bits per second. I usually found 1200, 9600 and 115200 a common choice, but that is just me.
Regarding the async config parameters, the default is that 8 bits are used, there is no parity bit, and 1 stop bit is used. The short abbreviation for this is 8n1. In the next example, you will use the screen command. By default, it uses 8n1, but it is called cs8 to confuse the beginners.

If you type:
# screen /dev/tty.usbserial-AC01U4XN 9600
or
# screen /dev/ttyUSB0 9600
and wait for minutes and nothing happens, it is because the badge already tried to communicate via the USB port, but no-one was listening there. Disconnect the badge from the computer, connect again, and type the screen command above to connect. If you are quick enough you can see that the amber LED will stop blinking and your screen command is greeted with some interesting information. By quick enough I mean ˜90 seconds, as it takes the device 1.5 minutes to boot the OS and the CTF app.

Windows

When you connect the device to Windows, you will be greeted with a pop-up.

Just click on the popup and you will see the COM port number the device is connected to:


In this case, it is connected to COM3. So let's fire up our favorite putty.exe, select Serial, choose COM3, add speed 9600, and you are ready to go!


You might check the end of the macOS section in case you can't see anything. Timing is everything.

The CTF

Welcome to the Hacktivity 2018 badge challenge!  This challenge consists of several tasks with one or more levels of difficulty. They are all connected in some way or another to HW RE and there's no competition, the whole purpose is to learn things.  Note: we recommend turning on local echo in your terminal! Also, feel free to ask for hints at the Hackcenter!  Choose your destiny below:    1. Visual HW debugging   2. Reverse engineering   3. RF hacking   4. Crypto protection  Enter the number of the challenge you're interested in and press [ 
Excellent, now you are ready to hack this! In case you are lost in controlling the screen command, go to https://linuxize.com/post/how-to-use-linux-screen/.

I will not spoil any fun in giving out the challenge solutions here. It is still your task to find solutions for these.

But here is a catch. You can get a root shell on the device. And it is pretty straightforward. Just carefully remove the Omega shield from the badge. Now you see two jumpers; by default, these are connected together as UART1. As seen below.



But what happens if you move these jumpers to UART0? Guess what, you can get a root shell! This is what I call privilege escalation on the HW level :) But first, let's connect the Omega shield back. Also, for added fun, this new interface speaks on 115200 baud, so you should change your screen parameters to 115200. Also, the new interface has a different ID under /dev, but I am sure you can figure this out from now on.




If you connect to the device during boot time, you can see a lot of exciting debug information about the device. And after it boots, you just get a root prompt. Woohoo! 
But what can you do with this root access? Well, for starters, how about running 
# strings hello | less

From now on, you are on your own to hack this badge. Happy hacking.
Big thanks to Attila Marosi-Bauer and Hackerspace Budapest for developing this badge and the contests.

PS: In case you want to use the radio functionality of the badge, see below how you should solder the parts to it. By default, you can process slow speed radio frequency signals on GPIO19. But for higher transfer speeds, you should wire the RF module DATA OUT pin with the RX1 free together.



Related articles


  1. Hack And Tools
  2. Hacking Tools Name
  3. Hacking Apps
  4. Easy Hack Tools
  5. Hacker Security Tools
  6. Hackers Toolbox
  7. Pentest Tools Website
  8. Hacking Tools Windows 10
  9. Pentest Tools Kali Linux
  10. Hack Tools 2019
  11. Hacker Tools Software
  12. Wifi Hacker Tools For Windows
  13. Kik Hack Tools
  14. Pentest Box Tools Download
  15. Underground Hacker Sites
  16. Hacking Tools For Mac
  17. Hacking Tools Kit
  18. Hacker Tools List
  19. Best Hacking Tools 2019
  20. World No 1 Hacker Software
  21. Hack And Tools
  22. Pentest Tools Subdomain
  23. Tools Used For Hacking
  24. Hacker Techniques Tools And Incident Handling
  25. Pentest Tools Nmap
  26. Hacking Tools For Kali Linux
  27. Pentest Tools List
  28. Hacking Tools Hardware
  29. Hacking Tools For Games
  30. Hacker Search Tools
  31. Pentest Tools Free
  32. Hacking Tools For Beginners
  33. Wifi Hacker Tools For Windows
  34. Pentest Tools
  35. Hacking Tools Download
  36. Hackers Toolbox
  37. Hack App
  38. Pentest Tools Open Source
  39. Pentest Tools Windows
  40. Kik Hack Tools
  41. Best Hacking Tools 2019
  42. Hacking Tools Usb
  43. Hack Tools
  44. Hack And Tools
  45. Hack Apps
  46. Bluetooth Hacking Tools Kali
  47. Hacks And Tools
  48. Pentest Recon Tools
  49. Top Pentest Tools
  50. Hacker Tools
  51. Hacker Tools 2020
  52. How To Hack
  53. Nsa Hack Tools
  54. Pentest Tools Kali Linux
  55. Hacker Tools For Windows
  56. Hacker Tools Online
  57. Hacking Tools Github
  58. Hacker
  59. Pentest Tools Url Fuzzer
  60. Pentest Tools Kali Linux
  61. Pentest Tools For Ubuntu
  62. Nsa Hack Tools Download
  63. Hacker Tools 2020
  64. Best Hacking Tools 2019
  65. Pentest Box Tools Download
  66. Hack Tools Mac
  67. Pentest Tools Framework
  68. Hacker Tools For Windows
  69. Hack App
  70. Ethical Hacker Tools
  71. Pentest Tools
  72. Hacker Techniques Tools And Incident Handling
  73. Pentest Tools Subdomain
  74. Android Hack Tools Github
  75. Top Pentest Tools
  76. Hacker Tools For Mac
  77. Hacking Tools
  78. Hacks And Tools
  79. Hacking Tools Pc
  80. Hacking Tools For Windows 7
  81. Ethical Hacker Tools
  82. Pentest Tools For Windows
  83. Physical Pentest Tools
  84. Pentest Tools For Mac
  85. Hacking Tools
  86. Hack App
  87. Pentest Tools Subdomain
  88. Hacker Tools Online
  89. What Is Hacking Tools
  90. Hacker Tools Github
  91. Pentest Tools Subdomain
  92. Hacking Tools Usb
  93. Hacking Tools Download
  94. Pentest Tools Review
  95. What Is Hacking Tools
  96. Kik Hack Tools
  97. Hacker Search Tools
  98. Pentest Tools List
  99. Hacker Tools Mac
  100. Pentest Tools For Mac
  101. Pentest Tools Apk
  102. Hacker Tools Apk
  103. Hacker Tools Linux
  104. Pentest Automation Tools
  105. Pentest Tools Port Scanner

$$$ Bug Bounty $$$

What is Bug Bounty ?



A bug bounty program, also called a vulnerability rewards program (VRP), is a crowdsourcing initiative that rewards individuals for discovering and reporting software bugs. Bug bounty programs are often initiated to supplement internal code audits and penetration tests as part of an organization's vulnerability management strategy.




Many software vendors and websites run bug bounty programs, paying out cash rewards to software security researchers and white hat hackers who report software vulnerabilities that have the potential to be exploited. Bug reports must document enough information for for the organization offering the bounty to be able to reproduce the vulnerability. Typically, payment amounts are commensurate with the size of the organization, the difficulty in hacking the system and how much impact on users a bug might have.


Mozilla paid out a $3,000 flat rate bounty for bugs that fit its criteria, while Facebook has given out as much as $20,000 for a single bug report. Google paid Chrome operating system bug reporters a combined $700,000 in 2012 and Microsoft paid UK researcher James Forshaw $100,000 for an attack vulnerability in Windows 8.1.  In 2016, Apple announced rewards that max out at $200,000 for a flaw in the iOS secure boot firmware components and up to $50,000 for execution of arbitrary code with kernel privileges or unauthorized iCloud access.


While the use of ethical hackers to find bugs can be very effective, such programs can also be controversial. To limit potential risk, some organizations are offering closed bug bounty programs that require an invitation. Apple, for example, has limited bug bounty participation to few dozen researchers.

More info


  1. Hacking Tools For Games
  2. Hacking Tools For Mac
  3. Blackhat Hacker Tools
  4. Hack Tools For Games
  5. Pentest Tools Website Vulnerability
  6. Hacker Tools Software
  7. Hacking Tools For Beginners
  8. Hacker Tools 2019
  9. Hacking Tools For Pc
  10. Pentest Tools For Android
  11. Pentest Tools Kali Linux
  12. Pentest Tools For Ubuntu
  13. Beginner Hacker Tools
  14. Pentest Recon Tools
  15. Pentest Reporting Tools
  16. Best Hacking Tools 2020
  17. Hacking Tools Hardware
  18. Hacker Tools Apk
  19. Hacker Tools Apk Download
  20. Tools Used For Hacking
  21. Game Hacking
  22. Pentest Tools Framework
  23. Hack Tools 2019
  24. Pentest Tools Bluekeep
  25. Pentest Automation Tools
  26. Hacking Tools Download
  27. Pentest Tools For Ubuntu
  28. Hacking Tools Pc
  29. Hacker Tools Free
  30. Hacking Tools Kit
  31. Hacker Tools Linux
  32. Hacking Tools Download
  33. Hacker Tools
  34. Tools For Hacker
  35. Pentest Tools Online
  36. Install Pentest Tools Ubuntu
  37. Hacker Tools 2019
  38. Pentest Tools Free
  39. Hacking Tools Hardware
  40. Hacking Tools Windows 10
  41. Hacking Tools
  42. Hacking Tools Github
  43. Tools Used For Hacking
  44. Hack Tools For Games
  45. Pentest Tools Alternative
  46. Pentest Tools Website
  47. Hacking Tools For Kali Linux
  48. Hacking Tools Pc
  49. Pentest Tools Github
  50. Pentest Tools Find Subdomains
  51. Pentest Tools Github
  52. Hacker Tools 2019
  53. Hacking Tools Online
  54. Hacker Hardware Tools
  55. Hacker Tools Free
  56. Pentest Tools Review
  57. Hacking Tools Online
  58. Hack Tools For Games
  59. Pentest Tools Framework
  60. Usb Pentest Tools
  61. Hack Tools For Games
  62. Hack Tools For Ubuntu
  63. Hacker Tools Github
  64. Hacker Tools Apk Download
  65. Github Hacking Tools
  66. Hackers Toolbox
  67. Hacking Tools Name
  68. Hack And Tools
  69. Hacker Tools List
  70. Pentest Tools Linux
  71. Hack Rom Tools
  72. Nsa Hack Tools
  73. Physical Pentest Tools
  74. Hacking Apps
  75. Hacking Tools Hardware
  76. Hack Website Online Tool
  77. Hacking Tools Download
  78. Hacking Tools For Kali Linux
  79. Hack Tools 2019
  80. Hacker Tools Free Download
  81. Hack Apps
  82. Hacking Tools Github
  83. Pentest Tools Windows
  84. Hacking Tools For Pc
  85. Pentest Tools Online
  86. Hacker Tools Apk
  87. Hack Tools For Pc
  88. Hacker Tools Apk Download
  89. Hacker Techniques Tools And Incident Handling
  90. Wifi Hacker Tools For Windows
  91. Best Hacking Tools 2019
  92. Hacker Tools Apk Download
  93. Pentest Automation Tools
  94. Tools 4 Hack
  95. Hack Rom Tools
  96. World No 1 Hacker Software
  97. Hack Tools Pc
  98. Hacker Hardware Tools
  99. Hack Tool Apk No Root
  100. Hacking Tools Mac
  101. Pentest Tools Open Source
  102. Hacking Tools Name
  103. Hacker Tools
  104. Hacker Tools Linux
  105. Hacking Tools Kit
  106. Hacking Tools For Windows
  107. Hacking Tools For Beginners
  108. Underground Hacker Sites
  109. Growth Hacker Tools
  110. Hacker Tools List
  111. Hacks And Tools
  112. Hacking Tools 2020
  113. Hacker Tools
  114. Hacker Techniques Tools And Incident Handling
  115. Hack Tools Online
  116. Hacker Tool Kit
  117. Hacker Tools Free Download
  118. Pentest Tools Github
  119. Top Pentest Tools
  120. Hacker Tools List
  121. Pentest Automation Tools
  122. Hacker Tools For Pc
  123. Hack Tool Apk
  124. Nsa Hacker Tools
  125. Hacking Tools And Software
  126. Hacker Tools Hardware
  127. Pentest Tools Open Source
  128. Hack Apps
  129. Hacker Tools Mac
  130. Hacking Tools Pc
  131. Hacking Tools For Kali Linux
  132. Blackhat Hacker Tools
  133. Hack Tools For Mac
  134. Hack Tools Pc
  135. Hacking Tools For Windows 7
  136. Hack Rom Tools
  137. Hacking Tools And Software
  138. Tools 4 Hack
  139. Hack Apps
  140. Hacker Tools 2020
  141. Hacker Tools For Windows
  142. Pentest Tools For Mac
  143. Pentest Tools Review
  144. Hack Tools Download
  145. Pentest Automation Tools
  146. Hacks And Tools
  147. Bluetooth Hacking Tools Kali
  148. Hacking Tools Windows 10
  149. Pentest Tools
  150. Best Pentesting Tools 2018
  151. Hacking Tools Software
  152. Tools Used For Hacking
  153. Hacker Tools Online
  154. Pentest Tools Tcp Port Scanner
  155. Hacker Techniques Tools And Incident Handling
  156. New Hacker Tools
  157. New Hack Tools
  158. Hackrf Tools
  159. Pentest Tools Kali Linux
  160. Pentest Tools Subdomain
  161. Pentest Recon Tools
  162. Hacking Tools Kit

WHO IS ETHICAL HACKER

Who is hacker?
A hacker is a Creative person and a creative Programmer,who have knowledge about Networking,Operating system,hacking & a best creative social engineer who control anyone's mind he is also a knowledgeable person.
Hacker are the problem solver and tool builder.

                                OR

A hacker is an individual who uses computer, networking and other skills to overcome a technical problem but it often refers to a person who uses his or her abilities to gain unauthorized access to system or networks in  order to commit crimes. 


More information


  1. Hack Tool Apk No Root
  2. Blackhat Hacker Tools
  3. Pentest Tools Windows
  4. Hacking Tools Name
  5. Hack Tools For Ubuntu
  6. Pentest Tools Android
  7. Hack Tools For Games
  8. World No 1 Hacker Software
  9. Hak5 Tools
  10. How To Install Pentest Tools In Ubuntu
  11. Hack Tools For Pc
  12. Nsa Hack Tools Download
  13. Ethical Hacker Tools
  14. Github Hacking Tools
  15. Pentest Tools Kali Linux
  16. Hacker Security Tools
  17. Hacker Tools Free
  18. Pentest Tools Android
  19. Hacker Tools Free
  20. Pentest Tools Find Subdomains
  21. Hacking Tools Software
  22. Hacking Tools Download
  23. Tools Used For Hacking
  24. Hack Tools For Pc
  25. Hacking App
  26. What Is Hacking Tools
  27. Pentest Reporting Tools
  28. Hacker Tools Github
  29. Hacking Tools 2019
  30. Hacker Tools 2019
  31. Android Hack Tools Github
  32. Underground Hacker Sites
  33. Hack Tools Mac
  34. Pentest Tools For Windows
  35. Hack Tools For Windows
  36. New Hacker Tools
  37. Pentest Automation Tools
  38. Hacker Tools 2019
  39. Hacker Tools Hardware
  40. Hack Tool Apk No Root
  41. Growth Hacker Tools
  42. Hack Tool Apk
  43. Hacks And Tools
  44. Hacker Tools Free
  45. New Hacker Tools
  46. Pentest Tools Download
  47. Hacking Tools Windows
  48. Hacker
  49. How To Make Hacking Tools
  50. Hacker Tools Free
  51. Hacking Tools Github
  52. Hacking Tools For Windows Free Download
  53. Pentest Tools Open Source
  54. Hack Website Online Tool
  55. Pentest Tools Bluekeep
  56. Hacker Tools Software
  57. Pentest Tools Kali Linux
  58. Pentest Recon Tools
  59. Game Hacking
  60. Pentest Box Tools Download
  61. Pentest Tools Subdomain
  62. Hacking Tools Online
  63. Hacker Tools Free Download
  64. Hacker Tools Free Download
  65. Pentest Tools Tcp Port Scanner
  66. New Hacker Tools
  67. Pentest Tools List
  68. Hacking Tools Hardware
  69. Hacking Tools Github
  70. Hack Tools For Mac
  71. Hacking Tools
  72. Hacking Tools And Software
  73. Hack And Tools
  74. Pentest Tools Download
  75. Hacker Tools Free Download
  76. Pentest Tools Android
  77. Bluetooth Hacking Tools Kali
  78. Hack App
  79. New Hack Tools
  80. Pentest Tools Apk
  81. Pentest Tools Apk
  82. Pentest Box Tools Download
  83. Bluetooth Hacking Tools Kali
  84. Ethical Hacker Tools
  85. Free Pentest Tools For Windows
  86. Hacker Tools Github
  87. Hack Tool Apk No Root
  88. Hacking Tools Windows
  89. Pentest Recon Tools
  90. Bluetooth Hacking Tools Kali
  91. Hack Tools Mac
  92. Tools 4 Hack
  93. Hacker Tools Hardware
  94. Pentest Tools For Android
  95. Pentest Tools Framework
  96. Computer Hacker
  97. Pentest Tools Apk
  98. Best Hacking Tools 2020
  99. Hack Apps
  100. Pentest Tools Find Subdomains
  101. Hack Tools Github
  102. Nsa Hacker Tools
  103. Install Pentest Tools Ubuntu
  104. Pentest Tools Github
  105. Growth Hacker Tools
  106. Hack Tools
  107. Beginner Hacker Tools
  108. Pentest Tools For Mac
  109. Ethical Hacker Tools
  110. Pentest Tools Apk
  111. Hack And Tools
  112. Hacker Techniques Tools And Incident Handling
  113. Hacking Tools For Beginners
  114. Hack Tools For Games
  115. Game Hacking