Cmdpirx Corner

             ,----------------,         
        ,-----------------------,
      ,"                      ,"|
     +-----------------------+  |
     |  .-----------------.  |  |
     |  |                 |  |  |
     |  |                 |  |  |
     |  |   |  |  |
     |  |                 |  |  |
     |  |                 |  |  |
     |  `-----------------'  |," 
     +-----------------------+  
        /_)______________(_/  
   _______________________________  
  /  oooooooooooooooo  .o.  oooo /, 
 / ==ooooooooooooooo==.o.  ooo= // 
/_==__==========__==_ooo__ooo=_/' 
`-----------------------------'
        
··································
:╦ ╦┬┬  ╦┌┬┐  ╔╦╗┬┌┬┐┌─┐┌─┐┌─┐┬ ┬:
:╠═╣││  ║│││   ║ │││││ │├┤ ├┤ └┬┘:
:╩ ╩┴o  ╩┴ ┴   ╩ ┴┴ ┴└─┘└  └─┘ ┴ :
··································

Why This Website Exists

There are three main reasons for the existence of this webpage.


1) I need a space to put my notes online and easily share them with others.

2) I've been looking for a good reason to practice some basic web development.

3) It's a good place to show people what I can do.


In the blog, you'll find small notes that aren't big enough to be called full projects.
In projects, you'll find work I've dedicated significant time and effort to.


Recent Posts

Sarix Encoding Cracked

| Category: blog | Tags: iot, redteam
   _____   .    .___  _ _     _      .____  __    _   ___    ___   .___   _ __    _   ___          ___  .___     .      ___  .     .____  .___  
  (       /|    /   \ | `.   /       /      |\   |  .'   \ .'   `. /   `  | |\   |  .'   \       .'   \ /   \   /|    .'   \ /   / /      /   ` 
   `--.  /  \   |__-' |   \,'        |__.   | \  |  |      |     | |    | | | \  |  |            |      |__-'  /  \   |      |_-'  |__.   |    |
      | /---'\  |  \  |  ,'\         |      |  \ |  |      |     | |    | | |  \ |  |    _       |      |  \  /---'\  |      |  \  |      |    |
 \___.,'      \ /   \ / /   \        /----/ |   \|   `.__,  `.__.' /---/  / |   \|   `.___|       `.__, /   ,'      \  `.__, /   \ /----/ /---/ 

Reverse Engineering Sarix Camera Password Encoding: A Journey Through "Security by Obscurity"

Sometimes, corporate policy demands password changes …

Read more →

IoT Hacking Basics Intro

| Category: blog | Tags: iot, redteam
   _   _   _     _   _   _   _   _   _   _     _   _   _   _   _  
  / \ / \ / \   / \ / \ / \ / \ / \ / \ / \   / \ / \ / \ / \ / \ 
 ( I | O | T ) ( H | A | C | K | I | N | G ) ( I | N | T | R | O )
  \_/ \_/ \_/   \_/ \_/ \_/ \_/ \_/ \_/ \_/   \_/ \_/ \_/ \_/ \_/ 

IoT Security Assessment - Intro

This …

Read more →

HID1KBrute

| Category: Projects | Tags: python, rfid, hid, security
 _   _ _____ _____  _ _  ______            _       
| | | |_   _|  _  || | | | ___ \          | |      
| |_| | | | | | | || |_| | |_/ /_ __ _   _| |_ ___ 
|  _  | | | | | | ||  _  | ___ \ '__| | | | __/ _ \
| | | |_| |_| |/ / | | | | |_/ / |  | |_| | ||  __/
\_| |_/\___/|___/  \_| |_/\____/|_|   \__,_|\__\___|

HID1KBrute: Comprehensive RFID Card Analysis and …

Read more →

pyCardAccess

| Category: Projects | Tags: python, wiegand, osdp, access-control, security, library
 _____  __   __ _______ _______  ______ ______  _______ _______ _______ _______ _______ _______
|_____]   \_/   |       |_____| |_____/ |     \ |_____| |       |       |______ |______ |______
|          |    |_____  |     | |    \_ |_____/ |     | |_____  |_____  |______ ______| ______|

pyCardAccess: A Comprehensive Python Library for Access Control Systems

I've been working with Access Control for over a year, and noticed …

Read more →

Jenkins Pipeline Basics

| Category: blog
    ___                          _ __              _              
   ( /          /  o            ( /  )o           //o             
    / _  _ _   /< ,  _ _   (     /--',   ,_   _  //,  _ _   _  (  
  _/_(/_/ / /_/ |_(_/ / /_/_)_  /    (__/|_)_(/_(/_(_/ / /_(/_/_)_
 //                                     /|                        
(/                                     (/                         

Recently, I've had to learn Jenkins, so I've decided to dump my notes here …

Read more →

Wifi Penetration Basics

| Category: blog | Tags: wifi, redteam, wireless
██╗    ██╗██╗███████╗██╗        ██████╗ ███████╗███╗   ██╗
██║    ██║██║██╔════╝██║        ██╔══██╗██╔════╝████╗  ██║
██║ █╗ ██║██║█████╗  ██║        ██████╔╝█████╗  ██╔██╗ ██║
██║███╗██║██║██╔══╝  ██║        ██╔═══╝ ██╔══╝  ██║╚██╗██║
╚███╔███╔╝██║██║     ██║        ██║     ███████╗██║ ╚████║
 ╚══╝╚══╝ ╚═╝╚═╝     ╚═╝        ╚═╝     ╚══════╝╚═╝  ╚═══╝

██████╗  █████╗ ███████╗██╗ ██████╗███████╗               
██╔══██╗██╔══██╗██╔════╝██║██╔════╝██╔════╝               
██████╔╝███████║███████╗██║██║     ███████╗               
██╔══██╗██╔══██║╚════██║██║██║     ╚════██║               
██████╔╝██║  ██║███████║██║╚██████╗███████║               
╚═════╝ ╚═╝  ╚═╝╚══════╝╚═╝ ╚═════╝╚══════╝               

WiFi Security and Penetration Testing Guide

Types of WiFi Authentication

WiFi authentication types are crucial for securing wireless networks and protecting data from unauthorized access. The main types include WEP, WPA, WPA2, and WPA3, each progressively enhancing security standards.

1. WEP (Wired Equivalent Privacy)

The original WiFi security protocol, WEP …

Read more →

WPA and WPS Attacks

| Category: blog
░█░█░█▀█░█▀█░▀▀▄░█▀█░▀█▀░▀█▀░█▀█░█▀▀░█░█░█▀▀
░█▄█░█▀▀░█▀█░▄▀░░█▀█░░█░░░█░░█▀█░█░░░█▀▄░▀▀█
░▀░▀░▀░░░▀░▀░▀▀▀░▀░▀░░▀░░░▀░░▀░▀░▀▀▀░▀░▀░▀▀▀

WPA2Attacks

Types of WiFi Authentication

WiFi authentication types are crucial for securing wireless networks and protecting data from unauthorized access. The main types include WEP, WPA, WPA2, and WPA3, each progressively enhancing security standards.

1. WEP (Wired Equivalent Privacy)

The original WiFi security protocol, WEP provides basic encryption but is …

Read more →