Learn

Filter
Portal Battle - Evil vs captive explained

Evil Portal vs Captive Portal: What's the Diffe...

9 min read 2027 words 2 weeks ago

Both serve web pages over a hosted AP, but they do very different things. Here's the technical and ethical distinction.

Evil Portal vs Captive Portal: What's the Diffe...

9 min read 2027 words 2 weeks ago

Both serve web pages over a hosted AP, but they do very different things. Here's the technical and ethical distinction.

ESP32 Flash - Firmware storage details

ESP32 Flash Memory and How Firmware Is Stored

9 min read 2037 words 2 weeks ago

How the ESP32 stores firmware, manages OTA slots, and enables rollback - a partition-level breakdown.

ESP32 Flash Memory and How Firmware Is Stored

9 min read 2037 words 2 weeks ago

How the ESP32 stores firmware, manages OTA slots, and enables rollback - a partition-level breakdown.

Beacon Frames and Probe Requests: How WiFi Discovery Works

Beacon Frames and Probe Requests: How WiFi Disc...

12 min read 2666 words 2 weeks ago

Beacon frames and probe requests are the mechanism behind every WiFi connection. Here's what's actually inside them - and why AP Spam works.

Beacon Frames and Probe Requests: How WiFi Disc...

12 min read 2666 words 2 weeks ago

Beacon frames and probe requests are the mechanism behind every WiFi connection. Here's what's actually inside them - and why AP Spam works.

Dual Radio - ESP32 handles WiFi & BLE

How the BLEShark Nano's ESP32 Handles WiFi and ...

8 min read 1861 words 2 weeks ago

The ESP32-C3 has one radio. Here's how it manages WiFi and BLE at the same time - and where the limits are.

How the BLEShark Nano's ESP32 Handles WiFi and ...

8 min read 1861 words 2 weeks ago

The ESP32-C3 has one radio. Here's how it manages WiFi and BLE at the same time - and where the limits are.

OSI Layers - Security attacks illustrated

The OSI Model Explained With Real Security Atta...

6 min read 1195 words 2 weeks ago

The OSI model isn't just a textbook diagram. Every layer has real attacks against it. Here's all 7 layers with practical security examples - including where BLEShark Nano operates.

The OSI Model Explained With Real Security Atta...

6 min read 1195 words 2 weeks ago

The OSI model isn't just a textbook diagram. Every layer has real attacks against it. Here's all 7 layers with practical security examples - including where BLEShark Nano operates.

HID Hijack - Keyboard trust risks

HID Injection: Why Your Computer Trusts Any Key...

11 min read 2457 words 2 weeks ago

Your OS treats any device that says 'I'm a keyboard' as fully trusted input. No authentication, no sandbox, no questions asked. That's the root of every HID injection attack.

HID Injection: Why Your Computer Trusts Any Key...

11 min read 2457 words 2 weeks ago

Your OS treats any device that says 'I'm a keyboard' as fully trusted input. No authentication, no sandbox, no questions asked. That's the root of every HID injection attack.

IR Remote - Modulation and timing explained

How Infrared Remote Controls Work: Modulation, ...

9 min read 2036 words 2 weeks ago

Your TV remote uses invisible light pulses at 38kHz to send commands. Here's how IR modulation works, why carrier frequencies exist, and what the major protocols look like.

How Infrared Remote Controls Work: Modulation, ...

9 min read 2036 words 2 weeks ago

Your TV remote uses invisible light pulses at 38kHz to send commands. Here's how IR modulation works, why carrier frequencies exist, and what the major protocols look like.

Bluetooth Keyboard - Protocol security issues

Bluetooth HID Protocol: How Keyboards Work Over...

11 min read 2393 words 2 weeks ago

The Bluetooth HID protocol lets any device act as a keyboard with zero authentication. Understanding how it works explains why Bad-BT attacks are so effective.

Bluetooth HID Protocol: How Keyboards Work Over...

11 min read 2393 words 2 weeks ago

The Bluetooth HID protocol lets any device act as a keyboard with zero authentication. Understanding how it works explains why Bad-BT attacks are so effective.

BLE Spam - Advertising packet flood

BLE Advertising Packets: How BLESpam Works at t...

12 min read 2712 words 2 weeks ago

Every BLE device announces itself by broadcasting advertising packets. Understanding their structure explains how BLESpam works - and why your phone falls for it.

BLE Advertising Packets: How BLESpam Works at t...

12 min read 2712 words 2 weeks ago

Every BLE device announces itself by broadcasting advertising packets. Understanding their structure explains how BLESpam works - and why your phone falls for it.

WPA2 Handshake - Full step-by-step breakdown

The WPA2 4-Way Handshake: A Step-by-Step Breakdown

11 min read 2447 words 2 weeks ago

The WPA2 4-way handshake is how WiFi devices prove they know the password without revealing it. Here's exactly what happens in each of the four messages.

The WPA2 4-Way Handshake: A Step-by-Step Breakdown

11 min read 2447 words 2 weeks ago

The WPA2 4-way handshake is how WiFi devices prove they know the password without revealing it. Here's exactly what happens in each of the four messages.

EAPOL Explained - Structure and purpose

EAPOL Packets Explained: What They Are and How ...

9 min read 2112 words 2 weeks ago

EAPOL packets carry the WPA2 handshake. Understanding their byte-level structure is essential for anyone doing wireless security research.

EAPOL Packets Explained: What They Are and How ...

9 min read 2112 words 2 weeks ago

EAPOL packets carry the WPA2 handshake. Understanding their byte-level structure is essential for anyone doing wireless security research.

Management Frames - Security problems revealed

How 802.11 Management Frames Work (And Why They...

10 min read 2336 words 2 weeks ago

802.11 management frames control how WiFi devices connect and disconnect. They're also completely unauthenticated - and that's the root of most wireless attacks.

How 802.11 Management Frames Work (And Why They...

10 min read 2336 words 2 weeks ago

802.11 management frames control how WiFi devices connect and disconnect. They're also completely unauthenticated - and that's the root of most wireless attacks.

Bad Bluetooth - Test your defenses

Bad Bluetooth (Bad-BT): What It Is and How to T...

9 min read 2076 words 2 weeks ago

Bad-BT uses Bluetooth HID injection to silently take over a device - no USB needed. Learn how it works, how to test your defenses, and how the on-device DuckyScript editor...

Bad Bluetooth (Bad-BT): What It Is and How to T...

9 min read 2076 words 2 weeks ago

Bad-BT uses Bluetooth HID injection to silently take over a device - no USB needed. Learn how it works, how to test your defenses, and how the on-device DuckyScript editor...

ESP32 for Security Research: Why Hackers Love This $3 Chip

ESP32 for Security Research: Why Hackers Love T...

10 min read 2285 words 2 weeks ago

The ESP32 is the go-to chip for wireless security research. Learn why hackers love it, what firmware powers it, and how BLEShark Nano's Shiver mesh takes it further.

ESP32 for Security Research: Why Hackers Love T...

10 min read 2285 words 2 weeks ago

The ESP32 is the go-to chip for wireless security research. Learn why hackers love it, what firmware powers it, and how BLEShark Nano's Shiver mesh takes it further.

Captive Portals for Pentesting: What They Are and How to Use Them Responsibly

Captive Portals for Pentesting: What They Are a...

10 min read 2216 words 2 weeks ago

Learn how captive portal attacks work, why organizations must test for them, and how BLEShark Nano's Shiver mesh enables multi-node A/B testing.

Captive Portals for Pentesting: What They Are a...

10 min read 2216 words 2 weeks ago

Learn how captive portal attacks work, why organizations must test for them, and how BLEShark Nano's Shiver mesh enables multi-node A/B testing.

Transparent BLEShark Nano

10 Things You Can Do With BLEShark Nano (That Y...

9 min read 2139 words 2 weeks ago

BLEShark Nano is more than a hacking tool. Discover 10 features - from BLE spam to WPA2 handshake capture - that make it the ultimate pocket gadget.

10 Things You Can Do With BLEShark Nano (That Y...

9 min read 2139 words 2 weeks ago

BLEShark Nano is more than a hacking tool. Discover 10 features - from BLE spam to WPA2 handshake capture - that make it the ultimate pocket gadget.

WiFi Deauth Attacks Explained: How They Work and How to Test for Them

WiFi Deauth Attacks Explained: How They Work an...

9 min read 1957 words 2 weeks ago

Learn how WiFi deauthentication attacks work, why they matter for wireless security testing, and how to defend your network against them.

WiFi Deauth Attacks Explained: How They Work an...

9 min read 1957 words 2 weeks ago

Learn how WiFi deauthentication attacks work, why they matter for wireless security testing, and how to defend your network against them.

What Is Bluetooth® Low Energy (BLE)? A Complete Beginner's Guide

What Is Bluetooth® Low Energy (BLE)? A Complete...

9 min read 2075 words 2 weeks ago

Learn what Bluetooth® Low Energy (BLE) is, how it works, where it's used, and why BLE security matters for researchers and everyday users.

What Is Bluetooth® Low Energy (BLE)? A Complete...

9 min read 2075 words 2 weeks ago

Learn what Bluetooth® Low Energy (BLE) is, how it works, where it's used, and why BLE security matters for researchers and everyday users.