Learn
DNS Hijacking in Captive Portals: How Traffic G...
Captive portals work by making every DNS query return the portal's IP. Here's what that looks like at the packet level, why it only catches HTTP, and how to defend...
DNS Hijacking in Captive Portals: How Traffic G...
Captive portals work by making every DNS query return the portal's IP. Here's what that looks like at the packet level, why it only catches HTTP, and how to defend...
Hotel WiFi Security: What Your BLEShark Nano Ca...
Hotel WiFi is one of the least controlled network environments you'll use. Here's what you can safely check with a BLEShark Nano before trusting it.
Hotel WiFi Security: What Your BLEShark Nano Ca...
Hotel WiFi is one of the least controlled network environments you'll use. Here's what you can safely check with a BLEShark Nano before trusting it.
How Captive Portals Work: The Technical Story
Captive portals redirect your traffic before you reach the internet. Here's the full technical story: DHCP, DNS hijacking, HTTP redirect, and why HTTPS breaks things.
How Captive Portals Work: The Technical Story
Captive portals redirect your traffic before you reach the internet. Here's the full technical story: DHCP, DNS hijacking, HTTP redirect, and why HTTPS breaks things.
Common DuckyScript Payloads and What They're Te...
A reference collection of safe DuckyScript payloads for security testing. Each one targets a specific security control - from admin elevation to clipboard access to workstation locking.
Common DuckyScript Payloads and What They're Te...
A reference collection of safe DuckyScript payloads for security testing. Each one targets a specific security control - from admin elevation to clipboard access to workstation locking.
Defending Against HID Injection: What Actually ...
HID injection attacks are hard to stop entirely, but layered defenses reduce risk significantly. Here's what actually works at the OS, policy, endpoint, and physical level.
Defending Against HID Injection: What Actually ...
HID injection attacks are hard to stop entirely, but layered defenses reduce risk significantly. Here's what actually works at the OS, policy, endpoint, and physical level.
IR Sensor Networks: BLEShark Shiver Mesh for Sm...
Deploy BLEShark Nano nodes as zone-based IR controllers across a building. Send IR commands to specific rooms via the Shiver mesh. Here's how distributed IR control works.
IR Sensor Networks: BLEShark Shiver Mesh for Sm...
Deploy BLEShark Nano nodes as zone-based IR controllers across a building. Send IR commands to specific rooms via the Shiver mesh. Here's how distributed IR control works.
Writing a Custom Bad-BT Payload for Security Te...
A step-by-step tutorial for writing, uploading, and deploying a custom Bad-BT payload on BLEShark Nano. Includes a safe example payload that opens a browser and navigates to a URL.
Writing a Custom Bad-BT Payload for Security Te...
A step-by-step tutorial for writing, uploading, and deploying a custom Bad-BT payload on BLEShark Nano. Includes a safe example payload that opens a browser and navigates to a URL.
Multi-Device Deauth Detection: Monitoring Every...
Combining Shiver's multi-node deployment with coordinated channel monitoring gives you complete 2.4GHz deauth detection with no blind spots. Here's how it works.
Multi-Device Deauth Detection: Monitoring Every...
Combining Shiver's multi-node deployment with coordinated channel monitoring gives you complete 2.4GHz deauth detection with no blind spots. Here's how it works.
BLEShark Nano for Makers: Projects Beyond Secur...
The BLEShark Nano is an ESP32-C3 with BLE, WiFi, and IR in a polished package. Here are creative maker projects that go beyond security testing.
BLEShark Nano for Makers: Projects Beyond Secur...
The BLEShark Nano is an ESP32-C3 with BLE, WiFi, and IR in a polished package. Here are creative maker projects that go beyond security testing.
Coordinated Channel Partitioning: Full 2.4GHz C...
Shiver's coordinated channel partitioning assigns different 2.4GHz channels to different nodes, enabling simultaneous full-spectrum monitoring across the entire 2.4GHz band.
Coordinated Channel Partitioning: Full 2.4GHz C...
Shiver's coordinated channel partitioning assigns different 2.4GHz channels to different nodes, enabling simultaneous full-spectrum monitoring across the entire 2.4GHz band.
What BLEShark Nano Looks Like as a Universal Re...
The BLEShark Nano works as a universal IR remote for TVs, air conditioners, projectors, and more. Here's how to set it up and use it daily.
What BLEShark Nano Looks Like as a Universal Re...
The BLEShark Nano works as a universal IR remote for TVs, air conditioners, projectors, and more. Here's how to set it up and use it daily.
RSSI Heatmaps With BLEShark Shiver Mesh: Visual...
An RSSI heatmap turns per-node signal strength data into a visual map of coverage across a space. Here's how to build one with Shiver nodes and what it reveals.
RSSI Heatmaps With BLEShark Shiver Mesh: Visual...
An RSSI heatmap turns per-node signal strength data into a visual map of coverage across a space. Here's how to build one with Shiver nodes and what it reveals.
DuckyScript 101: The Payload Language Behind Ba...
DuckyScript is the payload language that turns a keyboard emulator into an automation tool. Here's the syntax, commands, and how to write your first payload for BLEShark Nano.
DuckyScript 101: The Payload Language Behind Ba...
DuckyScript is the payload language that turns a keyboard emulator into an automation tool. Here's the syntax, commands, and how to write your first payload for BLEShark Nano.
Testing Your Smart Home's Bluetooth Security Wi...
Smart homes are full of BLE devices - locks, bulbs, speakers, trackers. Here's what they broadcast and how to audit your own home's Bluetooth security.
Testing Your Smart Home's Bluetooth Security Wi...
Smart homes are full of BLE devices - locks, bulbs, speakers, trackers. Here's what they broadcast and how to audit your own home's Bluetooth security.
RSSI Triangulation: Locating Devices With BLESh...
Three or more Shiver nodes with known positions can estimate the physical location of any transmitting device using RSSI trilateration. Here's the math and the limitations.
RSSI Triangulation: Locating Devices With BLESh...
Three or more Shiver nodes with known positions can estimate the physical location of any transmitting device using RSSI trilateration. Here's the math and the limitations.
BLEShark Nano as a Classroom Tool for Security ...
Hardware makes abstract security concepts concrete. Here's how the BLEShark Nano works as a teaching tool in university and bootcamp settings.
BLEShark Nano as a Classroom Tool for Security ...
Hardware makes abstract security concepts concrete. Here's how the BLEShark Nano works as a teaching tool in university and bootcamp settings.
Capturing and Replaying IR Signals: A Practical...
A practical tutorial on capturing IR signals with the BLEShark Nano, storing them, and replaying them. Covers distance, lighting, troubleshooting, and what protocols you'll encounter.
Capturing and Replaying IR Signals: A Practical...
A practical tutorial on capturing IR signals with the BLEShark Nano, storing them, and replaying them. Covers distance, lighting, troubleshooting, and what protocols you'll encounter.
Multi-Node WiFi Scanning: Building a Complete P...
One device misses APs behind walls and in RF dead zones. Multiple Shiver nodes aggregate scan results by BSSID with per-device RSSI. Here's how the distributed scan works.
Multi-Node WiFi Scanning: Building a Complete P...
One device misses APs behind walls and in RF dead zones. Multiple Shiver nodes aggregate scan results by BSSID with per-device RSSI. Here's how the distributed scan works.
Using BLEShark Nano in a CTF Challenge
Wireless CTF challenges test real-world skills. Here's how the BLEShark Nano helps with WiFi handshake capture, BLE analysis, and IR decoding in competition.
Using BLEShark Nano in a CTF Challenge
Wireless CTF challenges test real-world skills. Here's how the BLEShark Nano helps with WiFi handshake capture, BLE analysis, and IR decoding in competition.
IR Code Databases: How Universal Remotes Know S...
IRDB and similar open databases power universal remotes with codes for thousands of devices. Here's how they're structured, how codes get added, and where they fall short.
IR Code Databases: How Universal Remotes Know S...
IRDB and similar open databases power universal remotes with codes for thousands of devices. Here's how they're structured, how codes get added, and where they fall short.
Captive Portal A/B Testing With BLEShark Shiver...
Deploy different portal pages on different nodes, different SSIDs, different areas. Results sync to the master node in real time. Here's how multi-node portal testing works.
Captive Portal A/B Testing With BLEShark Shiver...
Deploy different portal pages on different nodes, different SSIDs, different areas. Results sync to the master node in real time. Here's how multi-node portal testing works.
BLEShark Nano for Network Administrators: Real-...
Beyond hobbyist use - here's how network admins use the BLEShark Nano for deauth testing, rogue AP detection, and quick wireless audits.
BLEShark Nano for Network Administrators: Real-...
Beyond hobbyist use - here's how network admins use the BLEShark Nano for deauth testing, rogue AP detection, and quick wireless audits.
AODV Routing in an ESP-NOW Mesh: How Packets Fi...
Shiver uses AODV (Ad-hoc On-demand Distance Vector) routing for multi-hop delivery. Here's how route discovery, RREQ flooding, and route expiry work in a real mesh.
AODV Routing in an ESP-NOW Mesh: How Packets Fi...
Shiver uses AODV (Ad-hoc On-demand Distance Vector) routing for multi-hop delivery. Here's how route discovery, RREQ flooding, and route expiry work in a real mesh.
How Hackers Find Your Home Network: What You're...
Your home network broadcasts more than just an SSID. Here's what anyone nearby can passively collect and the simple steps to reduce your exposure.
How Hackers Find Your Home Network: What You're...
Your home network broadcasts more than just an SSID. Here's what anyone nearby can passively collect and the simple steps to reduce your exposure.