Learn

Filter
Sony Remote - Inside SIRC protocol

Sony SIRC Protocol: How Sony Remotes Work

8 min read 1878 words 2 weeks ago

Sony SIRC uses pulse-width encoding and a 40kHz carrier - different from NEC in important ways. Here's the full breakdown of 12-bit, 15-bit, and 20-bit SIRC variants.

Sony SIRC Protocol: How Sony Remotes Work

8 min read 1878 words 2 weeks ago

Sony SIRC uses pulse-width encoding and a 40kHz carrier - different from NEC in important ways. Here's the full breakdown of 12-bit, 15-bit, and 20-bit SIRC variants.

Security Audit - Checklist for IT pros

Wireless Security Auditing: A Checklist for IT ...

12 min read 2700 words 2 weeks ago

A practical wireless security audit checklist for IT teams - covering WPA3, PMF, WPS, rogue AP detection, and guest network isolation.

Wireless Security Auditing: A Checklist for IT ...

12 min read 2700 words 2 weeks ago

A practical wireless security audit checklist for IT teams - covering WPA3, PMF, WPS, rogue AP detection, and guest network isolation.

ESP‑NOW Explained - Powering Shiver Mesh

How ESP-NOW Works: The Protocol Powering BLESha...

9 min read 2121 words 2 weeks ago

ESP-NOW is Espressif's connectionless WiFi protocol - no association, no TCP/IP, MAC-to-MAC at up to 250m range. Here's how it works under the hood.

How ESP-NOW Works: The Protocol Powering BLESha...

9 min read 2121 words 2 weeks ago

ESP-NOW is Espressif's connectionless WiFi protocol - no association, no TCP/IP, MAC-to-MAC at up to 250m range. Here's how it works under the hood.

NEC IR - How TV remotes work

The NEC IR Protocol: How Most TV Remotes Send C...

9 min read 2107 words 2 weeks ago

NEC is the most common IR remote protocol. Here's how it encodes commands using pulse-distance modulation, with exact bit timings and frame structure.

The NEC IR Protocol: How Most TV Remotes Send C...

9 min read 2107 words 2 weeks ago

NEC is the most common IR remote protocol. Here's how it encodes commands using pulse-distance modulation, with exact bit timings and frame structure.

BLE Spam - Windows popup vulnerability

Windows BLE Spam: Why Windows Laptops Are Vulne...

9 min read 1914 words 2 weeks ago

Windows Swift Pair turns BLE advertisements into desktop popups. Here's how it works, why it can be triggered by spoofed packets, and how to disable it.

Windows BLE Spam: Why Windows Laptops Are Vulne...

9 min read 1914 words 2 weeks ago

Windows Swift Pair turns BLE advertisements into desktop popups. Here's how it works, why it can be triggered by spoofed packets, and how to disable it.

Bug Bounty - Earn money hacking

Bug Bounty Programs: How Companies Pay You to H...

10 min read 2360 words 2 weeks ago

Bug bounty programs pay researchers to find and report vulnerabilities. Here's how they work, what pays well, and how to get started.

Bug Bounty Programs: How Companies Pay You to H...

10 min read 2360 words 2 weeks ago

Bug bounty programs pay researchers to find and report vulnerabilities. Here's how they work, what pays well, and how to get started.

Freq Hopping - Avoid Bluetooth interference

Bluetooth Frequency Hopping: How Classic Blueto...

10 min read 2201 words 2 weeks ago

Classic Bluetooth hops across 79 channels 1,600 times per second. BLE uses just 40 channels. Here's how the two approaches differ and why it matters.

Bluetooth Frequency Hopping: How Classic Blueto...

10 min read 2201 words 2 weeks ago

Classic Bluetooth hops across 79 channels 1,600 times per second. BLE uses just 40 channels. Here's how the two approaches differ and why it matters.

Presentation Nano - Control slides via BLE

Using BLEShark Nano as a Presentation Controller

8 min read 1775 words 2 weeks ago

The BLEShark Nano works as a Bluetooth presentation clicker using its Mini Keypad and Media Controls apps. Here's the setup and what it can do that a standard clicker can't.

Using BLEShark Nano as a Presentation Controller

8 min read 1775 words 2 weeks ago

The BLEShark Nano works as a Bluetooth presentation clicker using its Mini Keypad and Media Controls apps. Here's the setup and what it can do that a standard clicker can't.

BLE Scan - See nearby broadcasts

BLE Scanning: How to See What's Broadcasting Ar...

10 min read 2273 words 2 weeks ago

Every BLE device around you is broadcasting. Here's what passive scanning reveals, what each field means, and why it matters for privacy and security.

BLE Scanning: How to See What's Broadcasting Ar...

10 min read 2273 words 2 weeks ago

Every BLE device around you is broadcasting. Here's what passive scanning reveals, what each field means, and why it matters for privacy and security.

Credential Grab - How passwords are stolen

What Is Credential Harvesting? How Attackers Ca...

4 min read 873 words 2 weeks ago

Credential harvesting is how attackers collect login data at scale. Here's how it works, what tools simulate it, and how to defend against it.

What Is Credential Harvesting? How Attackers Ca...

4 min read 873 words 2 weeks ago

Credential harvesting is how attackers collect login data at scale. Here's how it works, what tools simulate it, and how to defend against it.

BLE Monitor - Stats from your pocket

PC Monitor Over BLE: Checking Your Computer Sta...

8 min read 1786 words 2 weeks ago

The BLEShark Nano's PC Monitor app displays live CPU, GPU, RAM, and temperature stats on its OLED. Here's how the BLE data pipeline works and when it's useful.

PC Monitor Over BLE: Checking Your Computer Sta...

8 min read 1786 words 2 weeks ago

The BLEShark Nano's PC Monitor app displays live CPU, GPU, RAM, and temperature stats on its OLED. Here's how the BLE data pipeline works and when it's useful.

Enterprise WiFi - Harder to penetrate

What Is 802.1X Enterprise WiFi? Why It's Harder...

4 min read 870 words 2 weeks ago

802.1X replaces a shared password with per-user certificates and a RADIUS server. Here's how it works and what it means for security testing.

What Is 802.1X Enterprise WiFi? Why It's Harder...

4 min read 870 words 2 weeks ago

802.1X replaces a shared password with per-user certificates and a RADIUS server. Here's how it works and what it means for security testing.

Segment Your Network - Protect against security risks

Network Segmentation: Why Flat Networks Are a S...

5 min read 1168 words 2 weeks ago

A flat network puts every device on the same broadcast domain. One compromised device can reach everything. Here's how segmentation fixes that.

Network Segmentation: Why Flat Networks Are a S...

5 min read 1168 words 2 weeks ago

A flat network puts every device on the same broadcast domain. One compromised device can reach everything. Here's how segmentation fixes that.

Beat the Replay - Secure your tokens

Replay Attacks: What They Are and Why Time-Base...

5 min read 1070 words 2 weeks ago

A replay attack captures a valid authentication and re-submits it later. No decryption required. Here's why nonces, timestamps, and TOTP exist to prevent exactly this.

Replay Attacks: What They Are and Why Time-Base...

5 min read 1070 words 2 weeks ago

A replay attack captures a valid authentication and re-submits it later. No decryption required. Here's why nonces, timestamps, and TOTP exist to prevent exactly this.

Man in the Middle - Detect and prevent attacks

Man-in-the-Middle Attacks: How They Work and Ho...

5 min read 1020 words 2 weeks ago

A MITM attacker sits between you and the service you think you're talking to. Here's how ARP poisoning, SSL stripping, and rogue APs create that position - and how to...

Man-in-the-Middle Attacks: How They Work and Ho...

5 min read 1020 words 2 weeks ago

A MITM attacker sits between you and the service you think you're talking to. Here's how ARP poisoning, SSL stripping, and rogue APs create that position - and how to...

Pair with Caution - Spam vulnerability alert

Samsung Fast Pair: How It Works and Why It's Vu...

10 min read 2146 words 2 weeks ago

Samsung and Google Fast Pair use BLE advertisements to trigger pairing popups on Android. Here's how the protocol works and why it has no spam protection.

Samsung Fast Pair: How It Works and Why It's Vu...

10 min read 2146 words 2 weeks ago

Samsung and Google Fast Pair use BLE advertisements to trigger pairing popups on Android. Here's how the protocol works and why it has no spam protection.

Reconnaissance Tactics - Passive vs active methods

Passive vs Active Reconnaissance: What's the Di...

5 min read 1034 words 2 weeks ago

Passive recon leaves no traces on the target. Active recon does. Here's the practical difference, the detection risk of each, and when you'd choose one over the other.

Passive vs Active Reconnaissance: What's the Di...

5 min read 1034 words 2 weeks ago

Passive recon leaves no traces on the target. Active recon does. Here's the practical difference, the detection risk of each, and when you'd choose one over the other.

Mini Keypad Macros - BLEShark Nano mini

How the BLEShark Nano Mini Keypad Works: Macros...

9 min read 2108 words 2 weeks ago

The BLEShark Nano's Mini Keypad app turns its three physical buttons into programmable Bluetooth macro keys. Here's how it works and how to configure it.

How the BLEShark Nano Mini Keypad Works: Macros...

9 min read 2108 words 2 weeks ago

The BLEShark Nano's Mini Keypad app turns its three physical buttons into programmable Bluetooth macro keys. Here's how it works and how to configure it.

Nearby Actions - iOS BLE popup protocol

Apple Nearby Actions: The Protocol Behind iOS B...

10 min read 2196 words 2 weeks ago

How Apple's Continuity Protocol uses BLE advertisements to trigger iOS popups - and why any device can fake them.

Apple Nearby Actions: The Protocol Behind iOS B...

10 min read 2196 words 2 weeks ago

How Apple's Continuity Protocol uses BLE advertisements to trigger iOS popups - and why any device can fake them.

Bluetooth Breakdown - Classic vs BLE differences

Classic Bluetooth vs BLE: What's Actually Diffe...

8 min read 1782 words 2 weeks ago

Classic Bluetooth (BR/EDR) and BLE share a name and frequency band but are fundamentally different protocols. Here's what separates them - and why security tools focus on BLE.

Classic Bluetooth vs BLE: What's Actually Diffe...

8 min read 1782 words 2 weeks ago

Classic Bluetooth (BR/EDR) and BLE share a name and frequency band but are fundamentally different protocols. Here's what separates them - and why security tools focus on BLE.

Firmware Update - What's new in BLEShark

What's in a BLEShark Nano Firmware Update? How ...

6 min read 1373 words 2 weeks ago

Where BLEShark changelogs live, how to read them, how to check your current firmware version, and how to trigger an OTA update.

What's in a BLEShark Nano Firmware Update? How ...

6 min read 1373 words 2 weeks ago

Where BLEShark changelogs live, how to read them, how to check your current firmware version, and how to trigger an OTA update.

OSINT Essentials - Open source intelligence

What Is OSINT? Open Source Intelligence for Sec...

4 min read 825 words 2 weeks ago

OSINT is intelligence gathered from public sources - DNS, social media, Shodan, job postings. Here's what it is, how it fits into security research, and the legal boundaries.

What Is OSINT? Open Source Intelligence for Sec...

4 min read 825 words 2 weeks ago

OSINT is intelligence gathered from public sources - DNS, social media, Shodan, job postings. Here's what it is, how it fits into security research, and the legal boundaries.

Social Engineering - The human weakest link

Social Engineering 101: Why Humans Are the Weak...

4 min read 935 words 2 weeks ago

Technical controls don't stop social engineering attacks. Here's the taxonomy of attack types, why they work, and what security awareness training actually addresses.

Social Engineering 101: Why Humans Are the Weak...

4 min read 935 words 2 weeks ago

Technical controls don't stop social engineering attacks. Here's the taxonomy of attack types, why they work, and what security awareness training actually addresses.

CIA Triad - Confidentiality, integrity, availability

The CIA Triad: Confidentiality, Integrity, and ...

4 min read 761 words 2 weeks ago

Confidentiality, Integrity, Availability. Every security control exists to protect one of these. Here's what each means, with wireless attack examples for each pillar.

The CIA Triad: Confidentiality, Integrity, and ...

4 min read 761 words 2 weeks ago

Confidentiality, Integrity, Availability. Every security control exists to protect one of these. Here's what each means, with wireless attack examples for each pillar.