Skip to main content

May the force be with you :)


Yes.. I bought this game.
Fun aside, both the headset
both the base have a nice JTAG port
and maybe a serial interface.
I got it this morning and I just started
inspecting the devices.
They communicate on 2.478 and 2.408 Ghz frequencies
it's not bluetooth but a normal serial over
the air. If you are curious like me,
the FCC site has FULL documentation
and pictures of the inside.
You will find them under these
FCC IDs: XCY150511UMI2009 and XCY150512UMI2009.
I'll keep you posted.
Yoda.
Zibri

Note:
The 'unknown' chip on the base
you can't see on FCC site is a PIC16F727 44 pin.
The other 'blank' chip on the headset
is a PIC16F722 28 pin.

Comments

  1. Zibri, I think my son would love this toy. Did you find it anywhere in Italy? I'm also interested in the hacking part of the toy, of course...
    Please let me know if you bought it in Italy or over the internet... che me lo vado subito a comprare!

    Cheers
    F.

    ReplyDelete
  2. Have fun inspecting this device!
    Looking forward to the update!

    ReplyDelete
  3. elettrofreak: mandami una mail.. zibree@#$@#gmail@#$@#com ;)

    ReplyDelete
  4. so... just 4 fun? if the answer is yes! then enjoy! :D u deserve some fun! :D
    Cheers!

    ReplyDelete
  5. Dan: nothing (or everything) in my life is "just" for fuin :)

    ReplyDelete
  6. do you have any idea if this is able to recognize what you think? or it just detects how "hard" you are thinking? It's very interesting... Does this have anything to do with BB's unlocking procedure?
    Cheers!
    Thnx 4 everything...

    ReplyDelete
  7. Dan: it (headset) outputs 2 bytes:
    1: concentration level
    2: meditation level

    stay tuned for next post.

    ReplyDelete
  8. As promised:
    http://www.zibri.org/2009/09/success.html

    ReplyDelete
  9. Can you please give me a link to the documentation and pictures on the FCC site? or just a link for the site...

    ReplyDelete
  10. @bayo:
    Just click on the FCC IDs in the main post and you will get there.

    ReplyDelete
  11. This is awesome! Zibri I am an engineering student at a university in South Africa, I would really love to use this in a project or something. My programming background is pretty weak though :-( please could you provide more info on how you connected the force trainer to a computer (and the coding involved). Thanks very much Zibri, I'm a huge fan of your work!

    ReplyDelete
  12. I have a force star war trainer

    that when I connect the headset TX and RX I put the arduino and the land of the crown to the other land arduino not read any data in the serial monitor

    ReplyDelete

Post a Comment

Popular posts from this blog

Powerline Ethernet fun and secrets.

Many 200 Mb/s powerline adapters nowadays are based on the INTELLON 6300 chipset.
Despite what can be thought looking at them, they are all using the same hardware and firmwares.
I heard many people with Netgear XAV101 or Linksys PLK 200 or PLE 200 having problems after firmware updates and many other people with other brands having much more problems because of lack of support or configuration/upgrade utilities.

So let me explain a few things I learnt studying them.

Many of 200 Mb/s powerline ethernet adapters follow the "HomePlug AV" standard. (85 Mb adapters use HomePlug 1.0 standard which is completely different).
This standard uses ethernet broadcast packets using the HomePlug AV protocol.

The interesting thing is that their firmware is made of two different parts:
a .PIB file (Parameter Information Block) and a .NVM file (the code itself).
In the P.I.B. there are many interesting things:
The branding (mac address, device name, etc) and the tone map.

I tested many firmw…

TP-LINK Configuration file encrypt and decrypt.

Here we go! TP-Link is another company that thinks that security by obscurity could ever work.
If you "backup" the configuration from most TP-Link routers, you will get a .BIN file which is "encrypted".
Use this utility below, to decrypt it (so you can edit it) and encrypt it again.
Have fun.
Drop files here or

Obfuscation will never work.

ml>
Hello again, sweet readers !
OpenRG is an embedded OS for routers. It's based on Linux and it's inside many ISP routers out there.
Inside OpenRG configuration file, passwords appear in a way that can seem to be crypted, but it's just obfuscated.
For example: (username(admin)) (password(&b7;X&5c;&b9;&a2;))
Above you can see a simple deobfuscator. Enjoy!
You can try it with: &ad;Y&5b;&b3;&a3;&17;T&8b;&c4;&b9;#&96;&04;c&ea;&1d;$%&5d;&16;&08;B3&c0;
:)
Zibri.