Cmdpirx Corner

Blog Articles

WPA and WPS Attacks

░█░█░█▀█░█▀█░▀▀▄░█▀█░▀█▀░▀█▀░█▀█░█▀▀░█░█░█▀▀
░█▄█░█▀▀░█▀█░▄▀░░█▀█░░█░░░█░░█▀█░█░░░█▀▄░▀▀█
░▀░▀░▀░░░▀░▀░▀▀▀░▀░▀░░▀░░░▀░░▀░▀░▀▀▀░▀░▀░▀▀▀

WPA2Attacks

Types of WiFi Authentication

WiFi authentication types are crucial for securing wireless networks and protecting data from unauthorized access. The main types include WEP, WPA, WPA2, and WPA3, each progressively enhancing security standards.

1. WEP (Wired Equivalent Privacy)

The original WiFi security protocol, WEP provides basic encryption but is …

Read more...

Wifi Penetration Basics

| Tags: wifi, redteam, wireless
██╗    ██╗██╗███████╗██╗        ██████╗ ███████╗███╗   ██╗
██║    ██║██║██╔════╝██║        ██╔══██╗██╔════╝████╗  ██║
██║ █╗ ██║██║█████╗  ██║        ██████╔╝█████╗  ██╔██╗ ██║
██║███╗██║██║██╔══╝  ██║        ██╔═══╝ ██╔══╝  ██║╚██╗██║
╚███╔███╔╝██║██║     ██║        ██║     ███████╗██║ ╚████║
 ╚══╝╚══╝ ╚═╝╚═╝     ╚═╝        ╚═╝     ╚══════╝╚═╝  ╚═══╝

██████╗  █████╗ ███████╗██╗ ██████╗███████╗               
██╔══██╗██╔══██╗██╔════╝██║██╔════╝██╔════╝               
██████╔╝███████║███████╗██║██║     ███████╗               
██╔══██╗██╔══██║╚════██║██║██║     ╚════██║               
██████╔╝██║  ██║███████║██║╚██████╗███████║               
╚═════╝ ╚═╝  ╚═╝╚══════╝╚═╝ ╚═════╝╚══════╝               

WiFi Security and Penetration Testing Guide

Types of WiFi Authentication

WiFi authentication types are crucial for securing wireless networks and protecting data from unauthorized access. The main types include WEP, WPA, WPA2, and WPA3, each progressively enhancing security standards.

1. WEP (Wired Equivalent Privacy)

The original WiFi security protocol, WEP …

Read more...

Jenkins Pipeline Basics

    ___                          _ __              _              
   ( /          /  o            ( /  )o           //o             
    / _  _ _   /< ,  _ _   (     /--',   ,_   _  //,  _ _   _  (  
  _/_(/_/ / /_/ |_(_/ / /_/_)_  /    (__/|_)_(/_(/_(_/ / /_(/_/_)_
 //                                     /|                        
(/                                     (/                         

Recently, I've had to learn Jenkins, so I've decided to dump my notes here …

Read more...

IoT Hacking Basics Intro

| Tags: iot, redteam
   _   _   _     _   _   _   _   _   _   _     _   _   _   _   _  
  / \ / \ / \   / \ / \ / \ / \ / \ / \ / \   / \ / \ / \ / \ / \ 
 ( I | O | T ) ( H | A | C | K | I | N | G ) ( I | N | T | R | O )
  \_/ \_/ \_/   \_/ \_/ \_/ \_/ \_/ \_/ \_/   \_/ \_/ \_/ \_/ \_/ 

IoT Security Assessment - Intro

This …

Read more...

Sarix Encoding Cracked

| Tags: iot, redteam
   _____   .    .___  _ _     _      .____  __    _   ___    ___   .___   _ __    _   ___          ___  .___     .      ___  .     .____  .___  
  (       /|    /   \ | `.   /       /      |\   |  .'   \ .'   `. /   `  | |\   |  .'   \       .'   \ /   \   /|    .'   \ /   / /      /   ` 
   `--.  /  \   |__-' |   \,'        |__.   | \  |  |      |     | |    | | | \  |  |            |      |__-'  /  \   |      |_-'  |__.   |    |
      | /---'\  |  \  |  ,'\         |      |  \ |  |      |     | |    | | |  \ |  |    _       |      |  \  /---'\  |      |  \  |      |    |
 \___.,'      \ /   \ / /   \        /----/ |   \|   `.__,  `.__.' /---/  / |   \|   `.___|       `.__, /   ,'      \  `.__, /   \ /----/ /---/ 

Reverse Engineering Sarix Camera Password Encoding: A Journey Through "Security by Obscurity"

Sometimes, corporate policy demands password changes …

Read more...