Qgelm

Eavesdropping With An ESP8266

Originalartikel

Backup

<html> <p>In the old days, spies eavesdropped on each other using analog radio bugs. These days, everything&#8217;s in the cloud. [Sebastian] from [Hacking Beaver] &#160;wondered if he could make a WiFi bug that was small and cheap besides. Enter the ESP8266 and <a href=„http://hackingbeaver.com/?p=957“ target=„_blank“>some programming wizardry</a>.</p> <p>[Sebastian] is using a NodeMCU but suggests that it could be pared down to any ESP8266 board &#8212; with similar cuts made to the rest of the electronics &#8212; but has this working as a proof of concept. A PIC 18 MCU samples the audio data from a microphone at 10 kHz with an 8-bit resolution, dumping it into a 512-byte buffer. Once that fills, a GPIO pin is pulled down and the ESP8266 sends the data to a waiting TCP server over the WiFi which either records or plays the audio in real-time.</p> <p>[Sebastian] has calculated that he needs at least 51.2 ms to transfer the data which this setup easily handles, but there are occasional two to three second glitches that come out of the blue. To address this and other hangups, [Sebastian] has the ESP8266 control the PIC&#8217;s reset pin so that the two are always <a href=„https://upload.wikimedia.org/wikipedia/en/4/4c/NSYNC_1998_debut_album_worldwide_edition.jpg“ target=„_blank“>in sync</a>.</p> <p>The main hurdle was using an SPI on the ESP8266 &#8212; every time the PIC attempted to hand off 512 bytes of data, the ESP would reset! After a number of different attempts, [Sebastian]&#8217;s solution was to bitbang the SPI, slowing down the transfer but without crashing. Result! We wonder how far he could push this with a little data compression before sending over WiFi.</p> <p><iframe class=„youtube-player c2“ type=„text/html“ width=„800“ height=„480“ src=„https://www.youtube.com/embed/bxUD8CM0LWY?version=3&amp;rel=1&amp;fs=1&amp;autohide=2&amp;showsearch=0&amp;showinfo=1&amp;iv_load_policy=1&amp;wmode=transparent“ allowfullscreen=„true“>[embedded content]</iframe></p> <p>The only question now is whether or not you need to start smashing any <a href=„https://hackaday.com/2016/12/18/eavesdropping-via-headphones/“>nearby speakers</a> for fear of being listened to. Even if you manage that, there are still a few <a href=„https://hackaday.com/2016/08/12/hacking-when-it-counts-spy-radios/“>old-school methods</a> to keep an ear out.</p> </html>

Cookies helfen bei der Bereitstellung von Inhalten. Diese Website verwendet Cookies. Mit der Nutzung der Website erklären Sie sich damit einverstanden, dass Cookies auf Ihrem Computer gespeichert werden. Außerdem bestätigen Sie, dass Sie unsere Datenschutzerklärung gelesen und verstanden haben. Wenn Sie nicht einverstanden sind, verlassen Sie die Website.Weitere Information