Learn

Filter
Traffic Redirected - DNS hijacking insights

DNS Hijacking in Captive Portals: How Traffic G...

9 min read 2109 words 2 weeks ago

Captive portals work by making every DNS query return the portal's IP. Here's what that looks like at the packet level, why it only catches HTTP, and how to defend...

DNS Hijacking in Captive Portals: How Traffic G...

9 min read 2109 words 2 weeks ago

Captive portals work by making every DNS query return the portal's IP. Here's what that looks like at the packet level, why it only catches HTTP, and how to defend...

Hotel WiFi Security - BLEShark Nano insights

Hotel WiFi Security: What Your BLEShark Nano Ca...

12 min read 2667 words 2 weeks ago

Hotel WiFi is one of the least controlled network environments you'll use. Here's what you can safely check with a BLEShark Nano before trusting it.

Hotel WiFi Security: What Your BLEShark Nano Ca...

12 min read 2667 words 2 weeks ago

Hotel WiFi is one of the least controlled network environments you'll use. Here's what you can safely check with a BLEShark Nano before trusting it.

How Captive Portals Work: The Technical Story

How Captive Portals Work: The Technical Story

9 min read 2136 words 2 weeks ago

Captive portals redirect your traffic before you reach the internet. Here's the full technical story: DHCP, DNS hijacking, HTTP redirect, and why HTTPS breaks things.

How Captive Portals Work: The Technical Story

9 min read 2136 words 2 weeks ago

Captive portals redirect your traffic before you reach the internet. Here's the full technical story: DHCP, DNS hijacking, HTTP redirect, and why HTTPS breaks things.

DuckyScript Payloads - Common uses and testing

Common DuckyScript Payloads and What They're Te...

8 min read 1763 words 2 weeks ago

A reference collection of safe DuckyScript payloads for security testing. Each one targets a specific security control - from admin elevation to clipboard access to workstation locking.

Common DuckyScript Payloads and What They're Te...

8 min read 1763 words 2 weeks ago

A reference collection of safe DuckyScript payloads for security testing. Each one targets a specific security control - from admin elevation to clipboard access to workstation locking.

Defending Against HID - Effective injection defense

Defending Against HID Injection: What Actually ...

9 min read 1994 words 2 weeks ago

HID injection attacks are hard to stop entirely, but layered defenses reduce risk significantly. Here's what actually works at the OS, policy, endpoint, and physical level.

Defending Against HID Injection: What Actually ...

9 min read 1994 words 2 weeks ago

HID injection attacks are hard to stop entirely, but layered defenses reduce risk significantly. Here's what actually works at the OS, policy, endpoint, and physical level.

Smart Building Control - IR sensor networks

IR Sensor Networks: BLEShark Shiver Mesh for Sm...

8 min read 1815 words 2 weeks ago

Deploy BLEShark Nano nodes as zone-based IR controllers across a building. Send IR commands to specific rooms via the Shiver mesh. Here's how distributed IR control works.

IR Sensor Networks: BLEShark Shiver Mesh for Sm...

8 min read 1815 words 2 weeks ago

Deploy BLEShark Nano nodes as zone-based IR controllers across a building. Send IR commands to specific rooms via the Shiver mesh. Here's how distributed IR control works.

Custom Payloads - Bad-BT for security testing

Writing a Custom Bad-BT Payload for Security Te...

8 min read 1818 words 2 weeks ago

A step-by-step tutorial for writing, uploading, and deploying a custom Bad-BT payload on BLEShark Nano. Includes a safe example payload that opens a browser and navigates to a URL.

Writing a Custom Bad-BT Payload for Security Te...

8 min read 1818 words 2 weeks ago

A step-by-step tutorial for writing, uploading, and deploying a custom Bad-BT payload on BLEShark Nano. Includes a safe example payload that opens a browser and navigates to a URL.

Multi-Device Deauth - Monitoring every channel

Multi-Device Deauth Detection: Monitoring Every...

8 min read 1703 words 2 weeks ago

Combining Shiver's multi-node deployment with coordinated channel monitoring gives you complete 2.4GHz deauth detection with no blind spots. Here's how it works.

Multi-Device Deauth Detection: Monitoring Every...

8 min read 1703 words 2 weeks ago

Combining Shiver's multi-node deployment with coordinated channel monitoring gives you complete 2.4GHz deauth detection with no blind spots. Here's how it works.

BLEShark for Makers - Projects beyond security

BLEShark Nano for Makers: Projects Beyond Secur...

7 min read 1600 words 2 weeks ago

The BLEShark Nano is an ESP32-C3 with BLE, WiFi, and IR in a polished package. Here are creative maker projects that go beyond security testing.

BLEShark Nano for Makers: Projects Beyond Secur...

7 min read 1600 words 2 weeks ago

The BLEShark Nano is an ESP32-C3 with BLE, WiFi, and IR in a polished package. Here are creative maker projects that go beyond security testing.

Channel Partitioning - Full 2.4GHz coverage

Coordinated Channel Partitioning: Full 2.4GHz C...

7 min read 1485 words 2 weeks ago

Shiver's coordinated channel partitioning assigns different 2.4GHz channels to different nodes, enabling simultaneous full-spectrum monitoring across the entire 2.4GHz band.

Coordinated Channel Partitioning: Full 2.4GHz C...

7 min read 1485 words 2 weeks ago

Shiver's coordinated channel partitioning assigns different 2.4GHz channels to different nodes, enabling simultaneous full-spectrum monitoring across the entire 2.4GHz band.

Universal Remote - BLEShark Nano capabilities

What BLEShark Nano Looks Like as a Universal Re...

7 min read 1503 words 2 weeks ago

The BLEShark Nano works as a universal IR remote for TVs, air conditioners, projectors, and more. Here's how to set it up and use it daily.

What BLEShark Nano Looks Like as a Universal Re...

7 min read 1503 words 2 weeks ago

The BLEShark Nano works as a universal IR remote for TVs, air conditioners, projectors, and more. Here's how to set it up and use it daily.

RSSI Heatmaps - Visualizing WiFi and BLE

RSSI Heatmaps With BLEShark Shiver Mesh: Visual...

9 min read 1924 words 2 weeks ago

An RSSI heatmap turns per-node signal strength data into a visual map of coverage across a space. Here's how to build one with Shiver nodes and what it reveals.

RSSI Heatmaps With BLEShark Shiver Mesh: Visual...

9 min read 1924 words 2 weeks ago

An RSSI heatmap turns per-node signal strength data into a visual map of coverage across a space. Here's how to build one with Shiver nodes and what it reveals.

DuckyScript Basics - Payload language explained

DuckyScript 101: The Payload Language Behind Ba...

9 min read 2087 words 2 weeks ago

DuckyScript is the payload language that turns a keyboard emulator into an automation tool. Here's the syntax, commands, and how to write your first payload for BLEShark Nano.

DuckyScript 101: The Payload Language Behind Ba...

9 min read 2087 words 2 weeks ago

DuckyScript is the payload language that turns a keyboard emulator into an automation tool. Here's the syntax, commands, and how to write your first payload for BLEShark Nano.

Smart Home Security - Testing with BLEShark Nano

Testing Your Smart Home's Bluetooth Security Wi...

8 min read 1848 words 2 weeks ago

Smart homes are full of BLE devices - locks, bulbs, speakers, trackers. Here's what they broadcast and how to audit your own home's Bluetooth security.

Testing Your Smart Home's Bluetooth Security Wi...

8 min read 1848 words 2 weeks ago

Smart homes are full of BLE devices - locks, bulbs, speakers, trackers. Here's what they broadcast and how to audit your own home's Bluetooth security.

Signal Triangulation - Pinpoint devices instantly

RSSI Triangulation: Locating Devices With BLESh...

7 min read 1655 words 2 weeks ago

Three or more Shiver nodes with known positions can estimate the physical location of any transmitting device using RSSI trilateration. Here's the math and the limitations.

RSSI Triangulation: Locating Devices With BLESh...

7 min read 1655 words 2 weeks ago

Three or more Shiver nodes with known positions can estimate the physical location of any transmitting device using RSSI trilateration. Here's the math and the limitations.

Classroom Nano - Hands‑on security education

BLEShark Nano as a Classroom Tool for Security ...

9 min read 1928 words 2 weeks ago

Hardware makes abstract security concepts concrete. Here's how the BLEShark Nano works as a teaching tool in university and bootcamp settings.

BLEShark Nano as a Classroom Tool for Security ...

9 min read 1928 words 2 weeks ago

Hardware makes abstract security concepts concrete. Here's how the BLEShark Nano works as a teaching tool in university and bootcamp settings.

IR Replay - Capture and replay infrared

Capturing and Replaying IR Signals: A Practical...

9 min read 2099 words 2 weeks ago

A practical tutorial on capturing IR signals with the BLEShark Nano, storing them, and replaying them. Covers distance, lighting, troubleshooting, and what protocols you'll encounter.

Capturing and Replaying IR Signals: A Practical...

9 min read 2099 words 2 weeks ago

A practical tutorial on capturing IR signals with the BLEShark Nano, storing them, and replaying them. Covers distance, lighting, troubleshooting, and what protocols you'll encounter.

Wi‑Fi Panorama - Map the RF environment

Multi-Node WiFi Scanning: Building a Complete P...

8 min read 1712 words 2 weeks ago

One device misses APs behind walls and in RF dead zones. Multiple Shiver nodes aggregate scan results by BSSID with per-device RSSI. Here's how the distributed scan works.

Multi-Node WiFi Scanning: Building a Complete P...

8 min read 1712 words 2 weeks ago

One device misses APs behind walls and in RF dead zones. Multiple Shiver nodes aggregate scan results by BSSID with per-device RSSI. Here's how the distributed scan works.

CTF Nano - Challenge with BLEShark

Using BLEShark Nano in a CTF Challenge

7 min read 1592 words 2 weeks ago

Wireless CTF challenges test real-world skills. Here's how the BLEShark Nano helps with WiFi handshake capture, BLE analysis, and IR decoding in competition.

Using BLEShark Nano in a CTF Challenge

7 min read 1592 words 2 weeks ago

Wireless CTF challenges test real-world skills. Here's how the BLEShark Nano helps with WiFi handshake capture, BLE analysis, and IR decoding in competition.

Remote Database - Universal codes decoded

IR Code Databases: How Universal Remotes Know S...

8 min read 1695 words 2 weeks ago

IRDB and similar open databases power universal remotes with codes for thousands of devices. Here's how they're structured, how codes get added, and where they fall short.

IR Code Databases: How Universal Remotes Know S...

8 min read 1695 words 2 weeks ago

IRDB and similar open databases power universal remotes with codes for thousands of devices. Here's how they're structured, how codes get added, and where they fall short.

Portal Test - A/B testing made easy

Captive Portal A/B Testing With BLEShark Shiver...

7 min read 1485 words 2 weeks ago

Deploy different portal pages on different nodes, different SSIDs, different areas. Results sync to the master node in real time. Here's how multi-node portal testing works.

Captive Portal A/B Testing With BLEShark Shiver...

7 min read 1485 words 2 weeks ago

Deploy different portal pages on different nodes, different SSIDs, different areas. Results sync to the master node in real time. Here's how multi-node portal testing works.

Admin Nano - Real‑world network use

BLEShark Nano for Network Administrators: Real-...

8 min read 1793 words 2 weeks ago

Beyond hobbyist use - here's how network admins use the BLEShark Nano for deauth testing, rogue AP detection, and quick wireless audits.

BLEShark Nano for Network Administrators: Real-...

8 min read 1793 words 2 weeks ago

Beyond hobbyist use - here's how network admins use the BLEShark Nano for deauth testing, rogue AP detection, and quick wireless audits.

Mesh Routing - Packets find their path

AODV Routing in an ESP-NOW Mesh: How Packets Fi...

9 min read 1965 words 2 weeks ago

Shiver uses AODV (Ad-hoc On-demand Distance Vector) routing for multi-hop delivery. Here's how route discovery, RREQ flooding, and route expiry work in a real mesh.

AODV Routing in an ESP-NOW Mesh: How Packets Fi...

9 min read 1965 words 2 weeks ago

Shiver uses AODV (Ad-hoc On-demand Distance Vector) routing for multi-hop delivery. Here's how route discovery, RREQ flooding, and route expiry work in a real mesh.

Home Hack - Detect broadcast vulnerabilities

How Hackers Find Your Home Network: What You're...

9 min read 1957 words 2 weeks ago

Your home network broadcasts more than just an SSID. Here's what anyone nearby can passively collect and the simple steps to reduce your exposure.

How Hackers Find Your Home Network: What You're...

9 min read 1957 words 2 weeks ago

Your home network broadcasts more than just an SSID. Here's what anyone nearby can passively collect and the simple steps to reduce your exposure.