Cmdpirx Corner

Tag: redteam

3 articles

Wifi Penetration Basics

April 03, 2025 | Category: blog
██╗    ██╗██╗███████╗██╗        ██████╗ ███████╗███╗   ██╗
██║    ██║██║██╔════╝██║        ██╔══██╗██╔════╝████╗  ██║
██║ █╗ ██║██║█████╗  ██║        ██████╔╝█████╗  ██╔██╗ ██║
██║███╗██║██║██╔══╝  ██║        ██╔═══╝ ██╔══╝  ██║╚██╗██║
╚███╔███╔╝██║██║     ██║        ██║     ███████╗██║ ╚████║
 ╚══╝╚══╝ ╚═╝╚═╝     ╚═╝        ╚═╝     ╚══════╝╚═╝  ╚═══╝

██████╗  █████╗ ███████╗██╗ ██████╗███████╗               
██╔══██╗██╔══██╗██╔════╝██║██╔════╝██╔════╝               
██████╔╝███████║███████╗██║██║     ███████╗               
██╔══██╗██╔══██║╚════██║██║██║     ╚════██║               
██████╔╝██║  ██║███████║██║╚██████╗███████║               
╚═════╝ ╚═╝  ╚═╝╚══════╝╚═╝ ╚═════╝╚══════╝               

WiFi Security and Penetration Testing Guide

Types of WiFi Authentication

WiFi authentication types are crucial for securing wireless networks and protecting data from unauthorized access. The main types include WEP, WPA, WPA2, and WPA3, each progressively enhancing security standards.

1. WEP (Wired Equivalent Privacy)

The original WiFi security protocol, WEP …

Read more →

IoT Hacking Basics Intro

July 30, 2025 | Category: blog
   _   _   _     _   _   _   _   _   _   _     _   _   _   _   _  
  / \ / \ / \   / \ / \ / \ / \ / \ / \ / \   / \ / \ / \ / \ / \ 
 ( I | O | T ) ( H | A | C | K | I | N | G ) ( I | N | T | R | O )
  \_/ \_/ \_/   \_/ \_/ \_/ \_/ \_/ \_/ \_/   \_/ \_/ \_/ \_/ \_/ 

IoT Security Assessment - Intro

This …

Read more →

Sarix Encoding Cracked

August 05, 2025 | Category: blog
   _____   .    .___  _ _     _      .____  __    _   ___    ___   .___   _ __    _   ___          ___  .___     .      ___  .     .____  .___  
  (       /|    /   \ | `.   /       /      |\   |  .'   \ .'   `. /   `  | |\   |  .'   \       .'   \ /   \   /|    .'   \ /   / /      /   ` 
   `--.  /  \   |__-' |   \,'        |__.   | \  |  |      |     | |    | | | \  |  |            |      |__-'  /  \   |      |_-'  |__.   |    |
      | /---'\  |  \  |  ,'\         |      |  \ |  |      |     | |    | | |  \ |  |    _       |      |  \  /---'\  |      |  \  |      |    |
 \___.,'      \ /   \ / /   \        /----/ |   \|   `.__,  `.__.' /---/  / |   \|   `.___|       `.__, /   ,'      \  `.__, /   \ /----/ /---/ 

Reverse Engineering Sarix Camera Password Encoding: A Journey Through "Security by Obscurity"

Sometimes, corporate policy demands password changes …

Read more →