The wonderfully undocumented SP500 printer with wireless Ethernet connection has been the bane of my existence for the last few days.

So I have the IFBD-HW03/04 model, which isn’t even mentioned really in the manual. That means that my firmware is a thousand years old.

This is silly for many reason, but it also forces me to use a Windows machine as well… which just makes me grind my teeth. YOU HAVE TO HAVE A WINDOWS PC WITH IE to do this.

First things first, find the MAC address.

  1. Turn of the printer
  2. Hold the FEED button
  3. Turn it back ON
  4. After you hear the first BEEP, let go the FEED button
  5. Wait a minute or two. Yeah, seriously.
  6. It’ll print out one page of useless information. And then with a big pause in between, it’ll print out the network information, which is what you need.

Then load up the Star Micronics Printer Utility which you can actually download from their website.

  1. Choose SP512 as your printer
  2. Ethernet as your connection.
  3. You should be able to hit “Search Network” and find the printer, but that has never worked for me. So….
  4. Hit Temporary IP Address Assignment
  5. Fill in the MAC Address from your receipt
  6. On your Windows machine, Start > Run > cmd
  7. Find your IP address of your machine with “ipconfig”
  8. Whatever your IP is, give the printer something similar, so you are XXX.XXX.XXX.153 make the printer .158 or something
  9. Hit OK and you should be prompted to go to the control panel.

Next, the interface

  1. The tool will open the interface in your default browser. If this is not IE (which hopefully it isn’t’), open up IE and type in the printer’s IP.
  2. The username is just “root”
  3. Go to NIC
  4. Then got to WiFi-.11b (no it does not support WAP)
  5. Choose “Infra.” as your Wireless Mode (I guess there wasn’t room for “Infrastructure”)
  6. Pop in your SSID of the network you want it to join and the WEP key.

NOW – theoretically this should just work. But I haven’t had any luck.

 

How to reset the printer’s Ethernet settings.

If you screw something up, you’re dead in the water. The problem is you have to connect to the printer in Ad-Hoc mode (SSID STAR-WIFI) before you can set it up. So if you mess something up on the network settings, you can’t get back in to fix it. Fortunately, you can reset this (although you’d never know from reading the manual) but hitting the second dip switch on the WiFi card.

Open up the case

Find the second switch on the WiFi card. Make sure the printer is OFF. Push it to the DOWN position. Then turn the printer back ON and let it boot up. After that, turn it OFF again. Put the switch back to the UP position and turn it back ON. All the settings are now cleared 🙂

Previous ArticleNext Article
I help cruise lines turn their technical ideas into reality. I'm experienced in all stages of innovation and technology management. I've also been programing since I was 8 years old, and have somehow retained the ability to have normal human interactions. Occasionally I speak about how Industrial Psychology and Neurophysiology can be interrogated with IT and systems management, because I spend a lot of time thinking about the subject, as strange as that may seem.

Leave a Reply

Capture The Flag Games in Role-Playing Games

I’ve recently been running a 5e-based game with my usual role-playing nerd circle on Sunday nights. The game is called The Spy Game. It started off as a Kickstarter campaign and doubled it’s original funding goal (well done!) It’s been fairly successful, but I’m not here to talk about that. This post is about how I’ve incorporated Capture the Flag elements to our role playing.

Yes, I’m a grown man who plays D&D-style games. We play D20 games, which are role-playing games that use dice to determine the outcomes of certain actions. They have become increasingly popularized in the media, with Stranger Things being a large contributor. I did not grow up playing D&D, but started playing when my poker group decided to mix it up. Yes that is true.

What is The Spy Game?

The Spy Game is a role-playing game that is built around telling stories set in a today-like world with… spies. That means your players pick what type of spy they want to play, and make up back stories, choose classes (Infiltrator, Assassin, Medic, etc.) Then the Game Master (me) makes up scenarios and missions for them to go on. The players decide what they want to do (e.g. attack a security guard) and they roll a die to see how devastating their attack on the poor guard was. And while this is a gross over-simplification, it’s good enough for our purposes.

Quickly, What is Capture the Flag?

Capture the flag (commonly CFP), is a style of network and systems security penetration-testing simulation for fun. The idea is that a security expert creates a small, simulated computer system that players try to break into, or crack a code to find a “flag”. The flag is the indicator of the player’s success. For example, you might be given a website that has some sort of password protection that is beatable with certain techniques. Once you bypass the security, you discovery a flag. These are often written as {Flag-name} or something similar to allow the players to know they have been successful. You can read all about them on Wikipedia, or play there with Hacker101 or even Google.

Combining CTFs and Role Playing

My roleplaying group is fairly nerdy (does that go without saying?) So I wanted to make the game a little technical and different from our usual swords and sorcery chaos romps. I thought it would be interesting for those in the group who are less technically minded to learn a little about actual hacking, rather than the “roll the dice to try and hack the system” that is built into the game. The more experienced computer-people in the group could screen share as they worked, and the team could work out the problems together. Everyone wins!

It has worked out really, really well. Everyone has enjoyed these CTFs, including me. I’ve only written a few so far, but they include:

  • Breaking a password to get into a security camera interface
  • Finding the GPS coordinates of an arms deal that is going down, hidden in a base-64 string
  • Decoding a message between two terrorists, hidden in an image
  • Cracking a cipher (spoilers) to get the code words for the security team on duty needed for a break-in!

You can find them the few I’ve written so far here on Github.

These ideas were heavily influenced by the excellent CTF run by the one and only Connor Tumbleson, at Sourcetoad.

Writing CTFs with ChatGPT

I would highly recommend adding a real world CTF to your next role playing adventure. But who has the time? Enter AI with ChatGPT. One of the scary things about ChatGPT is that it writes decent code, but it is only as good as the prompts you give it, and it is NOT secure. So basically anything you tell the bot to write for you has an exploit big enough to drive a bus through. This should be scary to anyone using it for production work, but it is amazing for CTFs.

I’ve also used ChatGPT to write quick and dirty interfaces (like the security camera on-off switch). Is it pretty? No! Would I use anything like that for a client or anywhere near a production environment? Hell no! But it’s MORE that good enough for a fun evening with friends, gathered around a Zoom table, working out how to hack into a secret vault.