My Blog List

Wednesday 21 December 2016

Ghost Phisher

Ghost Phisher Package Description

Ghost Phisher is a Wireless and Ethernet security auditing and attack software program written using the Python Programming Language and the Python Qt GUI library, the program is able to emulate access points and deploy.
Ghost Phisher currently supports the following features:
  • HTTP Server
  • Inbuilt RFC 1035 DNS Server
  • Inbuilt RFC 2131 DHCP Server
  • Webpage Hosting and Credential Logger (Phishing)
  • Wifi Access point Emulator
  • Session Hijacking (Passive and Ethernet Modes)
  • ARP Cache Poisoning (MITM and DOS Attacks)
  • Penetration using Metasploit Bindings
  • Automatic credential logging using SQlite Database
  • Update Support
Source: https://code.google.com/p/ghost-phisher/
Ghost-Phisher Homepage | Kali Ghost-Phisher Repo
  • Author: Saviour Emmanuel Ekiko
  • License: GPLv3

Tools included in the ghost-phisher package

ghost-phisher – GUI suite for phishing and penetration attacks
A Wireless and Ethernet security auditing and attack software program

Ghost-Phisher Usage Example

root@kali:~# ghost-phisher
ghost

Parrot Blog


News

News and tips from the Parrot Project
Click to begin

Parrot Project Constitution

Posted on Leave a commentPosted in News
Hello everyone, as you may know, our development group has a very informal structure which works pretty well on smaller communities, but this model introduces a big problem when the community grows. Parrot needs to work on the concept that no one should trust each other and everyone should be able to work with all […]

Linux 4.8.11 released

Posted on Leave a commentPosted in News, security
our kernel team is proud to announce the the release of our new linux kernel 4.8.11, while testing builds of linux 4.9 will be available soon   to install the new kernel make sure that you have our linux metapackages already installed (linux-image-amd64 or linux-image-686-pae) and upgrade your system with sudo apt update && sudo […]

[done] Pentesting Course in Bari, Italy – 28/11/2016

Posted on Leave a commentPosted in events
Official Link Subscription Module   DESCRIZIONE DEL CORSO Il penetration testing è un corso pratico di valutazione della sicurezza di un sistema o di una rete che simula l’attacco di un utente malintenzionato. L’analisi comprende più fasi ed ha come obiettivo evidenziare le debolezze della piattaforma fornendo il maggior numero di informazioni sulle vulnerabilità che […]

[done] Pentesting Dojo in Bari, Italy – 29/11/2016

Posted on Leave a commentPosted in events
Official Link Subscription Module DESCRIZIONE DEL CORSO Il Pentesting Dojo è un corso pratico di valutazione della sicurezza di un sistema o di una rete che simula l’attacco di un utente malintenzionato. L’analisi è condotta dal punto di vista di un potenziale attaccante e consiste nello sfruttamento delle vulnerabilità rilevate al fine di ottenere più […]

[Community tips] Use the Parrot Alternate Installer

Posted on Leave a commentPosted in tips
We all want that nice little prompt of a reverse shell. Which requires a dedicated IP or a host that doesn’t filtered a lot custom ports that we define. Not a lot of ISP’s provide dedicated IP for cheap for resident Internet users. And it’s never a wise idea to disable port filtering on home […]

[done] Open Lab in Rome – 07/11/2016

Posted on 2 CommentsPosted in events
Hello parrots, we are happy to announce a new event in Rome, Italy. It was organized in collaboration with Roma2LUG, a Linux Users Group that gave us the possibility to meet all our users in Rome. The following are the event details in Italian for those who want to join us.       Se […]

Ambassadors program started

Posted on 3 CommentsPosted in News
We at Parrot Project have finally decided to start an Ambassadors Program to give our users the possibility to distinguish theireslves from the community and be a point of reference for other users.     Parrot Ambassadors are individuals who are passionate about Parrot, the cyber security world, and the software freedom in general. Know […]

How to compile a custom parrot kernel

Posted on Leave a commentPosted in tips
Want to create a custom kernel by compiling the source code of the parrot linux kernel? We have recently finished our documentation page dedicated to this topic.   Feel free to contact our community for further help and for some tips about the correct kernel configuration for your needs

Parrot Servers Map

Posted on Leave a commentPosted in tips
We at Parrot Security have created a map of all our mirror servers, it is not geographically precise because of the high density of servers in some areas, but it is perfect to understand how our download network is distributed around the world and what zones need to be covered by new mirrors to reduce […]

Thursday 3 November 2016

Ettercap Tutorial: DNS Spoofing & ARP Poisoning Examples

Ettercap stands for Ethernet Capture.
Ettercap is a comprehensive suite for man in the middle attacks.
It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.

Download and Install

Download the install the Ettercap package from Ettercap.
You can also install from the mirror as follows:
# apt-get install ettercap-gtk ettercap-common
This article explains how to perform DNS spoofing and ARP poisoning using Ettercap tool in Local Area Network ( LAN ).
Warning: Do not execute this on a network or system that you do not own. Execute this only on your own network or system for learning purpose only. Also, do not execute this on any production network or system. Setup a small network/system for testing purpose and play around with this utility on it for learning purpose only.

Ettercap Basics

First let’s learn some basics about Ettercap. Ettercap has the following 4 types of user interface
  • Text Only – ‘-T’ option
  • Curses – ‘-C’ option
  • GTK – ‘-G’ option
  • Daemon – ‘-D’ option
In this article, we will mainly focus on the “Graphical GTK User Interface”, since it will be very easy to learn.

Launching an ARP Poisoning Attack

We have already explained about why we need ARP and the conceptual explanation of ARP cache poisoning in ARP-Cache-Poisoning. So please have a look into it, and this article will cover how to perform it practically.
The following diagram explains the network architecture. All the attacks explained here will be performed on the following network diagram only. Using Ettercap in a production environment is not advisable.

Launch Ettercap using the following command in the 122 machine.
# ettercap -G
Click “Sniff->Unified Sniffing”. It will list the available network interface as shown below. Choose the one which you want to use for ARP Poisoning.

Once you have chosen the interface the following window will open:

The next step is to add the target list for performing the ARP poisoning. Here we will add 192.168.1.51 and 192.168.1.10 as the target as follows.
Click “Hosts->Scan for Host”.
It will start to scan the hosts present in the network.
Once it is completed, click “Hosts->Host List”. It will list the available hosts in the LAN as follows:

Now among the list, select “192.168.1.51” and click “Add to Target 1” and select “192.168.1.10” and click “Add to Target 2”.
Now select “Mitm->Arp Poisoning” as follows:

The following dialog box will open. Select “Sniff Remote Connection” and click “ok”:

Then click “Start->Start Sniffing as follows:

Now Arp is poisoned, i.e, 122 machine starts to send ARP packets saying “I’m 1.10”. In-order to verify it, From 192.168.1.51 “ping 192.168.1.10”. Open “Wireshark” application in 192.168.1.122 machine, and put a filter for ICMP. You will get the ICMP packets from 192.168.1.51 to 192.168.1.10 in 192.168.1.122 as follows:

Launching DNS Spoofing Attack in LAN

The concept of DNS is as follows.
  • Machine A said ‘ping google.com’
  • Now it has to find that IP address of google.com
  • So it queries the DNS server with regard to the IP address for the domain google.com
  • The DNS server will have its own hierarchy, and it will find the IP address of google.com and return it to Machine A
Here we will see how we can spoof the DNS.
There are many plugins which comes by default with EtterCap. Once such plugin is called as DNSSpoof. We are going to use that plugin to test the DNS spoofing.
Open the /usr/share/ettercap/etter.dns in the 122 machine and add the following,
*.google.co.in A 192.168.1.12
*.google.com A 192.168.1.12
google.com A 192.168.1.12

www.google.com PTR 192.168.1.12
www.google.co.in PTR 192.168.1.12
Here, 192.168.1.10 acts as the DNS server. In-order to perform DNS spoofing, first we need to do the ARP poisoning as explained above. Once ARP is done, follow the below steps
Click “Plugins->Manage Plugins” as follows:

Select the “dns_spoof” plugin and double click to activate it as follows:

Now from 192.168.1.51 ping google.com
$ ping google.com

PING google.com (192.168.1.12) 56(84) bytes of data.
64 bytes from www.google.co.in (192.168.1.12): icmp_seq=1 ttl=64 time=3.56 ms
64 bytes from www.google.co.in (192.168.1.12): icmp_seq=2 ttl=64 time=0.843 ms
64 bytes from www.google.co.in (192.168.1.12): icmp_seq=3 ttl=64 time=0.646 ms
You can see that it returns a local machine’s IP address which we have given in the configuration.
Hope this articles provides some insight into ARP Poisoning and DNS Spoofing. Once everything is done, remember to stop MITM attack as follows:

Finally, it doesn’t hurt to repeat the warning again. Do not execute this on a network or system that you do not own. Setup a small network/system for testing purpose and play around with this utility on it for learning purpose only.

Monday 24 October 2016

What is 3D printing?
3D printing or additive manufacturing is a process of making three dimensional solid objects from a digital file.
The creation of a 3D printed object is achieved using additive processes. In an additive process an object is created by laying down successive layers of material until the object is created. Each of these layers can be seen as a thinly sliced horizontal cross-section of the eventual object.

How does 3D printing work?

It all starts with making a virtual design of the object you want to create. This virtual design is for instance a CAD (Computer Aided Design) file. This CAD file is created using a 3D modeling application or with a 3D scanner (to copy an existing object). A 3D scanner can make a 3D digital copy of an object.
3D scanners
3D scanners use different technologies to generate a 3D model. Examples are: time-of-flight, structured / modulated light, volumetric scanning and many more.
Recently, companies like Microsoft and Google enabled their hardware to perform 3D scanning, for example Microsoft’s Kinect. In the near future digitising real objects into 3D models will become as easy as taking a picture. Future versions of smartphones will probably have integrated 3D scanners.
Currently, prices of 3D scanners range from expensive professional industrial devices to $30 DIY scanners anyone can make at home.
3D modeling software
3D modeling software also comes in many forms. There’s industrial grade software that costs thousands a year per license, but also free open source software, like Blender, for instance. You can find some beginner video tutorials on our Blender tutorials page.
When you are a beginner and the amount of choices are a bit overwhelming, we recommend to start with Tinkercad. Tinkercad has a free version and it works in browsers that support WebGL, for instance Google Chrome. They offer beginner lessons and has a built in option to get your object printed via various 3D printing services.
When you have a 3D model, the next step is to prepare it in order to make it 3D printable.

From 3D model to 3D printer

You will have to prepare a 3D model before it is ready to be 3D printed. This is what they call slicing. Slicing is dividing a 3D model into hundreds or thousands of horizontal layers and needs to be done with software.
Sometimes a 3D model can be sliced from within a 3D modeling software application. It is also possible that you are forced to use a certain slicing tool for a certain 3D printer.
When the 3D model is sliced, you are ready to feed it to your 3D printer. This can be done via USB, SD or wifi. It really depends on what brand and type 3D Printer you have.
When a file is uploaded in a 3D printer, the object is ready to be 3D printed layer by layer. The 3D printer reads every slice (2D image) and creates a three dimensional object.

Learn how to 3D print

You could start your journey in learning 3D printing by following this Coursera course. It costs around $350 USD.
For the same price however you can choose to assemble your own 3D Printer kit. This way you’ll gradually learn al the keywords which will help you repairing / adjusting your 3D printer when necessary.
If you are interested in going this route, please read our article about cheap 3D printer kits. This article explains what to look for when you’re comparing these kits.

Processes and technologies

Not all 3D printers use the same technology. There are several ways to print and all those available are additive, differing mainly in the way layers are build to create the final object.
Some methods use melting or softening material to produce the layers. Selective laser sintering (SLS) and fused deposition modeling (FDM) are the most common technologies using this way of 3D printing. Another method is when we talk about curing a photo-reactive resin with a UV laser or another similar power source one layer at a time. The most common technology using this method is called stereolithography (SLA).
To be more precise: since 2010, the American Society for Testing and Materials (ASTM) group “ASTM F42 – Additive Manufacturing”, developed a set of standards that classify the Additive Manufacturing processes into 7 categories  according to Standard Terminology for Additive Manufacturing Technologies. These seven processes are:
  1. Vat Photopolymerisation
  2. Material Jetting
  3. Binder Jetting
  4. Material Extrusion
  5. Powder Bed Fusion
  6. Sheet Lamination
  7. Directed Energy Deposition
Below you’ll find a short explanation of all of seven processes for 3D printing:

Vat Photopolymerisation

A 3D printer based on the Vat Photopolymerisation method has a container filled with photopolymer resin which is then hardened with a UV light source.
Vat photopolymerisation
Vat photopolymerisation schematics. Image source: lboro.ac.uk
The most commonly used technology in this processes is Stereolithography (SLA). This technology employs a vat of liquid ultraviolet curable photopolymer resin and an ultraviolet laser to build the object’s layers one at a time. For each layer, the laser beam traces a cross-section of the part pattern on the surface of the liquid resin. Exposure to the ultraviolet laser light cures and solidifies the pattern traced on the resin and joins it to the layer below.
After the pattern has been traced, the SLA’s elevator platform descends by a distance equal to the thickness of a single layer, typically 0.05 mm to 0.15 mm (0.002″ to 0.006″). Then, a resin-filled blade sweeps across the cross section of the part, re-coating it with fresh material. On this new liquid surface, the subsequent layer pattern is traced, joining the previous layer. The complete three dimensional object is formed by this project. Stereolithography requires the use of supporting structures which serve to attach the part to the elevator platform and to hold the object because it floats in the basin filled with liquid resin. These are removed manually after the object is finished.
This technique was invented in 1986 by Charles Hull, who also at the time founded the company, 3D Systems.
Other technologies using Vat Photopolymerisation are the new ultrafast Continuous Liquid Interface Production or CLIP and marginally used older Film Transfer Imaging and Solid Ground Curing.

Material Jetting

In this process, material is applied in droplets through a small diameter nozzle, similar to the way a common inkjet paper printer works, but it is applied layer-by-layer to a build platform making a 3D object and then hardened by UV light.
Material Jetting schematics. Image source: CustomPartNet
Material Jetting schematics. Image source: custompartnet.com

Binder Jetting

With binder jetting two materials are used: powder base material and a liquid binder. In the build chamber, powder is spread in equal layers and binder is applied through jet nozzles that “glue” the powder particles in the shape of a programmed 3D object. The finished object is “glued together” by binder remains in the container with the powder base material. After the print is finished, the remaining powder is cleaned off and used for 3D printing the next object. This technology was first developed at the Massachusetts Institute of Technology in 1993 and in 1995 Z Corporation obtained an exclusive license.

The following video shows a high-end binder jetting based 3D printer, the ExOne M-Flex.  This 3D printer uses metal powder and curing after the binding material is applied.

Material Extrusion

The most commonly used technology in this process is Fused deposition modeling (FDM)
Fused deposition modelling (FDM), a method of rapid prototyping: 1 – nozzle ejecting molten material (plastic), 2 – deposited material (modelled part), 3 – controlled movable table. Image source: Wikipedia, made by user Zureks under CC Attribution-Share Alike 4.0 International license.
The FDM technology works using a plastic filament or metal wire which is unwound from a coil and supplying material to an extrusion nozzle which can turn the flow on and off. The nozzle is heated to melt the material and can be moved in both horizontal and vertical directions by a numerically controlled mechanism, directly controlled by a computer-aided manufacturing (CAM) software package. The object is produced by extruding melted material to form layers as the material hardens immediately after extrusion from the nozzle. This technology is most widely used with two plastic filament material types: ABS (Acrylonitrile Butadiene Styrene) and PLA (Polylactic acid) but many other materials are available ranging in properties from wood filed, conductive, flexible etc.
FDM was invented by Scott Crump in the late 80’s. After patenting this technology he started the company Stratasys in 1988. The software that comes with this technology automatically generates support structures if required. The machine dispenses two materials, one for the model and one for a disposable support structure.
The term fused deposition modeling and its abbreviation to FDM are trademarked by Stratasys Inc. The exactly equivalent term, fused filament fabrication (FFF), was coined by the members of the RepRap project to give a phrase that would be legally unconstrained in its use.

Powder Bed Fusion

The most commonly used technology in this processes is Selective laser sintering (SLS)
Selective_laser_melting_system_schematic
SLS system schematic. Image source: Wikipedia from user Materialgeeza under Creative Commons Attribution-Share Alike 3.0 Unported license
This technology uses a high power laser to fuse small particles of plastic, metal, ceramic or glass powders into a mass that has the desired three dimensional shape. The laser selectively fuses the powdered material by scanning the cross-sections (or layers) generated by the 3D modeling program on the surface of a powder bed. After each cross-section is scanned, the powder bed is lowered by one layer thickness. Then a new layer of material is applied on top and the process is repeated until the object is completed.
All untouched powder remains as it is and becomes a support structure for the object. Therefore there is no need for any support structure which is an advantage over SLS and SLA. All unused powder can be used for the next print. SLS was developed and patented by Dr. Carl Deckard at the University of Texas in the mid-1980s, under sponsorship of DARPA.

Sheet Lamination

Sheet lamination involves material in sheets which is bound together with external force. Sheets can be metal, paper or a form of polymer. Metal sheets are welded together by ultrasonic welding in layers and then CNC milled into a proper shape. Paper sheets can be used also, but they are glued by adhesive glue and cut in shape by precise blades. A leading company in this field is Mcor Technologies.
Simplified model of ultrasonic sheet metal 3D printing. Image source: Wikipedia from user Mmrjf3 shared under Creative Commons Attribution 3.0 Unported license.
Here is a video with a metal sheet 3D printer by Fabrisonic that uses additive manufacturing paired with CNC milling:
… and here is an overview of Mcor 3D printers that use standard A4 paper sheets:

Directed Energy Deposition

This process is mostly used in the high-tech metal industry and in rapid manufacturing applications. The 3D printing apparatus is usually attached to a multi-axis robotic arm and consists of a nozzle that deposits metal powder or wire on a surface and an energy source (laser, electron beam or plasma arc) that melts it, forming a solid object.
Direct Energy Deposition
Direct Energy Deposition with metal powder and laser melting. Image source: Merlin project
Sciaky is a major tech company in this area and here is their video presentation showing electron beam additive manufacturing:

Examples & applications of 3D printing

Applications include rapid prototyping, architectural scale models & maquettes, healthcare (3D printed prosthetics and 3D printing with human tissue) and entertainment (e.g. movie props).
Other examples of 3D printing would include reconstructing fossils in paleontology, replicating ancient artifacts in archaeology, reconstructing bones and body parts in forensic pathology and reconstructing heavily damaged evidence acquired from crime scene investigations.

3D printing industry

The worldwide 3D printing industry is expected to grow from $3.07B in revenue in 2013 to $12.8B by 2018, and exceed $21B in worldwide revenue by 2020. As it evolves, 3D printing technology is destined to transform almost every major industry and change the way we live, work, and play in the future.
Source: Wohlers Report 2015

Medical industry

The outlook for medical use of 3D printing is evolving at an extremely rapid pace as specialists are beginning to utilize 3D printing in more advanced ways. Patients around the world are experiencing improved quality of care through 3D printed implants and prosthetics never before seen.
Bio-printing
As of the early two-thousands 3D printing technology has been studied by biotech firms and academia for possible use in tissue engineering applications where organs and body parts are built using inkjet techniques. Layers of living cells are deposited onto a gel medium and slowly built up to form three dimensional structures. We refer to this field of research with the term: bio-printing.

Aerospace & aviation industries

The growth in utilisation of 3D printing in the aerospace and aviation industries can, for a large part, be derived from the developments in the metal additive manufacturing sector.
NASA for instance prints combustion chamber liners using selective laser melting and as of march 2015 the FAA cleared GE Aviation’s first 3D printed jet engine part to fly: a laser sintered housing for a compressor inlet temperature sensor.

Automotive industry

Although the automotive industry was among the earliest adopters of 3D printing it has for decades relegated 3D printing technology to low volume prototyping applications.
Nowadays the use of 3D printing in automotive is evolving from relatively simple concept models for fit and finish checks and design verification, to functional parts that are used in test vehicles, engines, and platforms. The expectations are that 3D printing in the automotive industry will generate a combined $1.1 billion dollars by 2019.

Industrial 3D Printing

In the last couple of years the term 3D printing has become more known and the technology has reached a broader public. Still, most people haven’t even heard of the term while the technology has been in use for decades. Especially manufacturers have long used these printers in their design process to create prototypes for traditional manufacturing and research purposes. Using 3D printers for these purposes is called rapid prototyping.
Why use 3D printers in this process you might ask yourself. Now, fast 3D printers can be bought for tens of thousands of dollars and end up saving the companies many times that amount of money in the prototyping process. For example, Nike uses 3D printers to create multi-colored prototypes of shoes. They used to spend thousands of dollars on a prototype and wait weeks for it. Now, the cost is only in the hundreds of dollars, and changes can be made instantly on the computer and the prototype reprinted on the same day.
Besides rapid prototyping, 3D printing is also used for rapid manufacturing. Rapid manufacturing is a new method of manufacturing where companies are using 3D printers for short run custom manufacturing. In this way of manufacturing the printed objects are not prototypes but the actual end user product. Here you can expect more availability of personally customized products.

Personal 3D printing

Personal 3D printing or domestic 3D printing is mainly for hobbyists and enthusiasts and really started growing in 2011. Because of rapid development within this new market printers are getting cheaper and cheaper, with prices typically in the range of $250 – $2,500. This puts 3D printers into more and more hands.
The RepRap open source project really ignited this hobbyist market. For about a thousand dollars people could buy the RepRap kit and assemble their own desktop 3D printer. Everybody working on the RepRap shares their knowledge so other people can use it and improve it again.

History

In the history of manufacturing, subtractive methods have often come first. The province of machining (generating exact shapes with high precision) was generally a subtractive affair, from filing and turning through milling and grinding.
Additive manufacturing’s earliest applications have been on the toolroom end of the manufacturing spectrum. For example, rapid prototyping was one of the earliest additive variants and its mission was to reduce the lead time and cost of developing prototypes of new parts and devices, which was earlier only done with subtractive toolroom methods (typically slowly and expensively). However, as the years go by and technology continually advances, additive methods are moving ever further into the production end of manufacturing. Parts that formerly were the sole province of subtractive methods can now in some cases be made more profitably via additive ones.
However, the real integration of the newer additive technologies into commercial production is essentially a matter of complementing subtractive methods rather than displacing them entirely. Predictions for the future of commercial manufacturing, starting from today’s already- begun infancy period, are that manufacturing firms will need to be flexible, ever-improving users of all available technologies in order to remain competitive.

Future

It is predicted by some additive manufacturing advocates that this technological development will change the nature of commerce, because end users will be able to do much of their own manufacturing rather than engaging in trade to buy products from other people and corporations.
3D printers capable of outputting in colour and multiple materials already exist and will continue to improve to a point where functional products will be able to be output. With effects on energy use, waste reduction, customization, product availability, medicine, art, construction and sciences, 3D printing will change the manufacturing world as we know it.
If you’re interested in more future predictions regarding 3D printing, check out The Future Of Open Fabrication.

Services

Not everybody can afford or is willing to buy their own 3D printer. Does this mean you cannot enjoy the possibilities of 3D printing? No, not to worry. There are 3D printing service bureaus like ShapewaysPonoko and Sculpteo that can very inexpensively print and deliver an object from a digital file that you simply upload to their website. You can even sell your 3D designs on their website and make a little money out of it!
There are also companies who offer their services business-to-business. When, for instance, you have an architecture practice and you need to build model scales, it is very time consuming doing this the old fashioned way. There are services where you can send your digital model to and they print the building on scale for you to use in client presentations. These kind of services can already be found in a lot of different industries like dental, medical, entertainment and art.

3D Marketplaces

If you don’t have the skills to design your own 3D models, you can still print some very nice objects. 3D marketplaces such as Pinshape and CGTrader contain 3D model files you can download for a small charge or for free.

So what is 3D printing?

Reddit user Flux83 made an awesome meme:
3d printing perception

Monday 3 October 2016

Trends in Automotive Engineering

3 Emerging Trends in
Automotive Engineering


Not too many people know automotive trends the way the staff does at The Ohio State University's Center for Automotive Research (OSU CAR). This interdisciplinary research center at OSU's College of Engineering focuses on advanced electric propulsion and energy storage systems, engines and alternative fuels, intelligent transportation and vehicular communication systems, autonomous vehicles, vehicle chassis systems, and vehicle safety.
"One of the biggest trends right now in automotive engineering is improving engine efficiency and fuel economy," says Giorgio Rizzoni, director of OSU CAR. "This includes downsizing, down-speeding, direct fuel injection, and boosting."
Other engineering trends focus on improving transmissions (adding speeds), accessory load reduction through the intelligent energy management of other vehicle components, vehicle electrification, hybridization, improved battery management systems, new battery chemistries, and power electronics.
"Weight reduction in vehicle subsystems is also being tested by using lightweight structures made from alternative materials such as aluminum, magnesium, composites, plastics, and multi-material construction," adds Rizzoni.

OSU CAR battery aging laboratory. Image: OSU CAR



Battery Systems

Battery management systems are being designed to meet performance, life, and warranty goals for both batteries and their monitoring and management systems. "Automakers need to fully understand how varying operational limits affect the life of battery systems through extensive testing and modeling, followed by developing sophisticated algorithms to track and predict various parameters, such as state of charge and state of health through the life of the battery," comments Rizzoni.
In order to expand battery operating range and reduce costs, some researchers are designing and testing new battery chemistries and subsystems. Advanced chemistries could allow batteries to operate through greater temperature extremes, last longer, and reduce weight and cost. Other efforts are being made to reduce the cost of the ancillary systems, such as cooling, to further reduce the total cost of the battery system.

Downsizing and Turbocharging

The two main benefits in downsizing an internal combustion engine are thermodynamic and mechanical. "From a thermodynamic point of view, the engine operation will move towards higher loads, at which the engine efficiency is higher," says Rizzoni. "From the mechanical point of view, the positive aspect lies in the reduction of the friction in the piston units, together with the reduction of the number of cylinders."
Downsized engines are lighter than conventional engines, thereby reducing vehicle mass and the improving vehicle fuel consumption. Turbocharging recovers the energy of the exhaust gasses to increase the inducted charge, therefore increasing the power-to-displacement ratio. "A downsized and turbocharged engine has the potential to have the same or better performance as a non-downsized, normally aspirated engine, with the advantage of a significant increase of fuel efficiency," says Rizzoni.

Advanced Combustion Modes

Engineers are working to increase the efficiency of internal combustion engines by developing several advanced combustion modes. One of these modes is called (homogeneous charge compression ignition) HCCI. In the HCCI combustion, a highly homogenized mixture of air, fuel, and combustion products from the previous cycle is auto-ignited by compression. "This combustion mode aims at combining the advantages of modern diesel and gasoline combustion processes, namely low emissions and high efficiency," states Rizzoni.
Another research trend targets ways to recover the energy that is normally dissipated through the coolant and the exhaust gas systems of automotive powertrains using innovative waste heat recovery devices. These systems can convert thermal energy into mechanical or electrical energy, thus increasing the overall efficiency of the vehicle. Organic Rankine cycle, thermoelectric systems, turbocompounding, and recuperative thermal management systems all have potential for significantly increase engine efficiencies.
A smaller but still significant aspect of fuel-efficiency research is called "intelligent energy management." "This ability to more intelligently control the accessory loads in a vehicle—such as the alternator or power steering, etc.—will also contribute to better gas mileage," says Rizzoni. "With smarter control of these loads and the addition of stop-start technology there can be significant increases in fuel economy, with small or no increase in total vehicle cost."

What is Hacker?

Hacker

Computer hacker1. A hacker is a term that first started being used in the 1960s and described a programmer or someone who hacked computer code. Later the term evolved into an individual who had an advanced understanding of computers, networking, programming, or hardware, but did not have any malicious intents.
Today, a malicious hacker is usually referred to as a malicious user, black hat, or criminal hacker, which describes any individual who illegally breaks into computer systems to damage or steal information. Some people who consider themselves leet may refer to themselves as a leet haxors, h4x0rs, or HaXXorZ. However, often these users are nothing more than script kiddies.

Why do people hack?

Most computer hackers hack because of curiosity, for the lulz, to bypass restrictions, or to test their computer abilities. Other reasons can include hacking for profit, revenge, and destruction.

Are all hackers bad?

No. Although the media and most people think all hackers are malicious, most hackers are people who are curious about how computers, networks, or programs work and are often exploring and learning. It is only the malicious hackers (black hats) who are bad. White hat hackers are good and essential for today's computer security. Without white hat hackers, all computers would be much more vulnerable to attacks and when attacks did happen be much harder to find the who, when, and why the attack happened.

2. In online gaming, a hacker is a term associated with a gamer who is cheating.
3. Hackers is a cult favorite movie first released on September 15, 1995, starring Angelina Jolie, Johnny Lee Miller, and Matthew Lillard.

Saturday 1 October 2016

New Technologies in Automotive

New Technologies in Automotive & Trucks

TwinForce squeezes V8 performance from a V6


Direct fuel injection and turbocharging have long been used in diesel engines for power and fuel economy.
Direct fuel injection and turbocharging have long been used in diesel engines for power and fuel economy. Ford Motor Co., Dearborn, Mich. (ford.com), is now taking that concept, calling it TwinForce, and using it in various consumer cars and trucks. Vehicles with a TwinForce Duratec 35 V6 engine should have 415 hp and 400 lb-ft of torque, numbers usually associated with a 6-liter V8. The TwinForce V6 would also get 15% better fuel economy than a similarly powered V8, according to Ford.
Compared to conventional port-fuel injection, TwinForce direct injection more precisely controls how much and when gas is sent into the cylinders. This means combustion is more efficient. Meanwhile, twin turbochargers deliver more air to the cylinders and boost power. It also reduces emissions and the engine can burn E-85 ethanol. The Ford says its new technology will be on future Ford and Lincoln vehicles.







Compression ignition comes to gas engines



What many consider the Holy Grail of combustion technology is one step closer to prime time.
In the race to field energy-efficient vehicles, don’t count out internal combustion technology just yet. GM recently debuted its homogeneous-charge-compression-ignition (HCCI) system in two drivable concept cars, a production-based 2007 Saturn Aura and Opel Vectra.
“HCCI was a dream of engine designers when I was an engineering student years ago,” says Tom Stephens, group vice president, GM Powertrain and Quality. “Today, using mathbased predictive analysis and other tools, we are beginning to make this technology real.“
HCCI is the capstone of an integrated suite of engine technologies that includes central direct-fuel injection, variable-valve lift, mechanical camshaft phasing, and individual cylinder pressure sensing. HCCI engines are said to use 15% less gas than conventional port-fuel injected engines, and meet current emissions standards.
Unlike spark-ignition gas engines or compression-ignition diesel engines that have a combustion process characterized by growth of a flame front from a single point in the combustion chamber, HCCI produces a flameless, simultaneous release of energy throughout the entire combustion chamber. Lack of a flame and hot zones lowers combustion temperature and NOx emissions.
Fuel-air mixtures are comparatively lean, which helps the engine approach the efficiency of a diesel, but without the need for costly lean-NOx after-treatment systems. Burning less fuel at lower temperatures also cuts the amount of heat energy lost during combustion, boosting efficiency. HCCI engines have a compression ratio of 12:1 (similar to that of a conventional direct-injected gas engine), so they can run on regular pump gas and E85. GM says HCCI engines will cost less to build than diesels because the latter need stronger components to withstand compression ratios greater than 20:1.
“Perhaps the biggest challenge of HCCI is controlling the combustion process,” says Uwe Grebe, executive director for GM Powertrain Advanced Engineering. “With spark ignition, you can adjust the timing and intensity of the spark. But with HCCI’s flameless combustion, you must change the mixture composition and temperature in a complex and timely manner to get comparable performance.”
Having ample heat in the combustion chambers is key to making HCCI work. The engines use a conventional spark ignition for cold starts and when HCCI is disengaged. Fuel comes from conventional injectors located in the center of each combustion chamber. A controller uses special algorithms and feedback from the cylinder pressure sensors to adjust cam timing and fuel injection in the milliseconds between combustion events. “Going to HCCI mode from conventional spark ignition signals the fast-mechanical cam phasers and a variable-valve-lift mechanism to close the exhaust valves early in the exhaust stroke, trapping some of the hot residual combustion gases in the combustion chamber,” explains GM Global HCCI Program Manager Matthias Alt. “This helps maintain a high cylinder temperature to facilitate auto-ignition when the fresh airfuel charge is added next cycle.” Operation at cold ambient temperatures necessitates trapping more hot gas in the combustion chamber (earlier exhaust-valve closing), for example.
Currently, the GM demonstration prototypes can run in HCCI mode to about 55 mph, going to spark ignition at higher vehicle speeds and under heavy engine load. A goal of the program is to extend HCCI’s operating envelope through refinements to the control system and engine hardware. GM says HCCI will work on any gasoline engine in its inventory and could combine with hybrid technology. No release date has been set for production HCCI-engine cars



Autonomous robotruck could save troops
Oshkosh Truck, Oshkosh, Wis., is introducing a 33-ft-long, autonomous robot truck that could transport weapons and supplies in combat and across dangerous roadways.
The Heavy Expanded Mobility Tactical Truck (HEMTT) A4, which charts its own course without human intervention, weighs 31 tons and can carry a 13-ton payload. It will debut next month at the Association of the U.S. Army annual convention, Oshkosh officials say.
The vehicle will perform such tasks as basic navigation, staying in the lane, and passing a static obstacle. The truck could also drive itself while a soldier rides along.