Hone your hacking skills with the Hack-A-Friend gaming handheld! Delve into epic CTF attack and defend style games with your friends. Challenge your opponents by attacking their devices while defending your own. The winner unleashes a devastating payload of their choosing to dominate their opponent’s game.
But that’s not all! Think you can do better? Clone our open source GitHub repo (coming soon) and craft your own games and payloads. Prove your skills and become the ultimate hacker.
TestingHackAFriend uses a Lithium Ion battery management chip and 500mA LDO to charge the battery and power the rest of the board. Test points have been provided to measure the VCC power source coming from the battery management chip and the 3V3 power source coming from the LDO. Two LEDs are provided for the power health (PWR) and battery charging (CHG) notifications. SDA and SCL test points are provided for I2C so that a digital signal analyzer can be used to verify that QWIIC connected boards are functioning properly when connected to the board.
Three LEDs are provided for software controlled notifications, a multi-color NeoPixel and two standard LEDs. While the game is on, the NeoPixel is used for game status (off - game is idle, green - game is active, and red - game is being exploited). The remaining two standard LEDs are unused by the game software so they may be used by exploits to provide visual cues during exploitation.
The device comes with a custom bootloader, however over-ambitious friends may find a way to destroy your bootloader. In such a case, you will need to use the 10-pin ARM TagConnect footprint with a TC2050-IDC-NL cable for connecting a SWD or JTAG device such as the nRF52840 DK. Then, you may restore your device using nrf-utils and our bootloader image. A TC2050-ARM2010 adapter is necessary when using a Segger J-Link. Optionally, the TagConnect pads on the board can be soldered directly to wires, however that may break the TagConnect functionality.
Comments
Please log in or sign up to comment.