Hello everyone! reGOSH finished the first Spanish version of the Hacking Instructions for using the Logitech C270 with the OpenFlexure Microscope v6. Kudos to @topogarcia and @pcremades for leading the writing process.
This is great. I am updating the C270 web cam optics module for version 7 of the microscope to be more the same as the Pi camera version. This will give a lower magnification, similar to the Pi Camera basic optics version. Your first photo shows both the C270, and the Pi Camera mounted in the microscope, how do you find they compare in use? Previously people have said the C270 magnification is too much, which is part of the reason for modifying it. (eg USB Webcam Lens Spacers and Camera Platforms)
Current progress is on Gitlab at Lens spacers for C270 and Arducam B0196 (!309), there is a view app button that will take you to the instructions for that merge request. The most recent STLs are linked in the customisations page.
Disclaimer: I took these pictures at different times, conditions, and illumination. I omitted calibration and other technical recommendations due to the short time for testing before the last workshop.
Hi all
I was thinking on importing some minor features of the 7 version to the 6 version that I think is better for C270. Particulary the stage with nut traps.
I think the one in the repository is v7 but not sure how to to get to v6 in .scad. Can any one point at me where/how to find it?
Thanks
The repository has a tag on the commit for the V6.1.5 release (and all other releases) so you can fork or branch from that point: Tags OpenFlexure / openflexure-microscope GitLab. It would be good to know what it is that you particularly need from V6 that is not so good in V7, it may be not so difficult to build a version similar to V6 from the V7 code, which would keep everything together. For example it should be possible to switch off the cable tidies to make a simpler version for manual use, although the walls might not join up properly automatically.
Hey folks, indeed, there is the new ESP32-S3-based camera. Much better than the ESP32-CAM AI TInker module. We got some from the Seeed XIAO line. Testing it now. Same camera module, different controller. Firmware here: mat
The form factor looks more simple to integrate with the openflexure microscope as it is small enough to fit between teh stage legs. Some of the ESP32 camera boards are too long and would need to point downwards.
edit: There actually is a tag: med-stable-preview-version. All tags are archived at -microscope/ so -microscope/med-stable-preview-version/ has all of the built STLs at that point. Obviously it is not a tested release version, so anything may not work or be incompatible with itself or with V6.1.X or V7. You will need to do any testing yourself.
The test for the manual version of V7 came out OK. This is a very poor photo with the new version of the Logitech C270 webcam optics installed (see USB Webcam Lens Spacers and Camera Platforms on this forum)
manual_1736668 63.7 KB
It is unlikely that this will get into the main release for a while, but it is available with the View app button on the merge request (with the usual caveats that it is an untested work in progress, so may be broken at any time)
I remember, more then a year ago I watched this fantastic video from stacksmashing about reverse engineering and rebuilding a custom firmware for a webcam. I was absolutely stunned that this is possibile and thought about to try this some time on a device I have at home.
As usual, time passes and I stuck on many other projects and learning topics so I completely forgot about this project until I watched the recently released talks from the OffensiveCon22. More or less by a random pick I watched this interesting talk about pwning routers via the internet. Triggered again by the topic of hacking hardware devices I decided to give this a try.
I instantly started to disassemble some of my IoT devices and searched for a UART port. Although my desired target was another, more up to date device, I decided to start with something where already some resources are online available. This leads me to the D-Link DCS-932L web cam.
finally we can connect to the tty with screen and the desired baud rate, there a couple of ways to figure out the correct one, as there only a few possible, the fastes way is maybe to try and error it.
Well this was easier then expected! I started to look around in the system, tried to spawn a reverse shell (you can do this via openSSL), but this busy box environment is pretty cut off, no curl, no wget, no ncat, only a few commands are possible but at least you can start a telnet server with the command and connect to it from remote.
It seams that the module for the file is missing. I created a new file DCS-932L.py in the folder CVE-2019-10999\DlinkExploit\overflows first with the same content as the file DCS-932LB1.py has and created a function for the version number too. But the exploit failed, the server crashed and there was no code execution. From the blog post about the exploit I learned that we need to provide the correct base address of libc. I connected to the UART Shell again and checked the libc file mapping.
I adjusted the libc_base address but the exploit still failed. Well there are some other offsets defined for the ROP gadgets for the different models, but to figure these out I would need debug the alphap webserver and with setup the emulating MIPS architecture this was a step I dont wanted to do. As a final approach I checked the other model scripts and figured out, that these libc base address as also defined in the DCS-930L.py I copied the file, adjusted the version number and filename and tried the exploit again.
Modern times pose modern threats, and hacked webcams are a real danger in our everyday lives. Unfortunately, your webcam is not a hard nut for bad actors to crack, meaning the chances of your webcam getting hacked within your lifetime are pretty high.
If someone is using your webcam to spy on you, they will have to send this data via your home router. If you log in to your router (this skill may become useful if you ever decide to put a VPN on your router) you can see the rate at which it sends and receives data. Close all your apps and browser windows so you are not using any data. If there is still a lot passing over the network, someone has compromised your computer.
Most webcams come with an indicator light, even those integrated into laptops. This light turns on whenever the webcam is working, and responsible manufacturers try to code the controls for this light at the lowest possible hardware level.
Malware requires resources to run, so you can distinguish malware by looking at the active processes. Before doing so, you should reboot your computer and open the Task Manager (Activity Monitor for MacOS users).
Another way to detect and get rid of malware is to run regular malware scans. There are plenty of tools available for this, and a good malware scanner should catch most instances of malware that can be used to spy on you.
The picture caused a lot of debate at the time: here was the boss of a huge tech company, who presumably has some of the best tech support in the world backing up his own not inconsequential knowledge, worried about hackers getting into his webcam.
There are a few signs that may indicate your webcam has been hacked. These include strange or unfamiliar files on your device, unexpected pop-ups or notifications, and a noticeable decrease in performance. Additionally, if your webcam light turns on when you are not actively using it, this could also be a sign of hacking.
If you suspect your webcam has been hacked, the first step is to disconnect it from your device and turn off your internet connection. Next, run a full virus scan on your device and delete any suspicious files. It is also important to change your passwords for all online accounts and consider installing a firewall or antivirus software for added protection.
If your webcam has been hacked, it is possible for hackers to see and even record you through your webcam. They may also have access to any personal information or data that is stored on your device. This is why it is important to take immediate action if you suspect your webcam has been hacked.
To prevent your webcam from being hacked, it is important to regularly update your device's software and operating system. You should also be cautious when clicking on links or downloading files from unknown sources. Additionally, consider covering your webcam with a piece of tape or a webcam cover when it is not in use.
If your webcam has been hacked, it is not recommended to continue using it until the issue has been resolved. This is because the hacker may still have access to your device and personal information. It is important to take the necessary steps to secure your device and webcam before using it again.
It wasn't until a three-year-old's parents heard a strange voice in their son's bedroom that they realized it was possible for hackers to intrude so intimately on their privacy. According to Huffington Post, the hacker could watch their infant son through the camera built into the baby monitor and could even remotely turn it to watch the parents.
Baby monitors aren't the only devices with cameras targeted by hackers. Any electronic device connected to the internet could be infiltrated: desktop computers, laptop computers, tablets, security cameras, mobile phones and more.
The boom in consumer IoT devices has created a universe of vulnerable entry points into home networks. An overwhelming number of manufacturers implement only basic passcodes on devices, sometimes as simple as 123456. In some cases, devices aren't protected with codes at all.
Most equipment owners aren't aware when someone seizes outside control of their equipment. Unfortunately, women are frequently targeted by hackers for varying reasons, including voyeurism and profit. Some hackers focus on both purposes at the same time.
795a8134c1