Skip to main content

Posts

Showing posts from September, 2020

From Concept to Bench - Designing a Flipper-compatible nRF24L01 RF Module for Security Research

    Six months of design iterations, sourcing headaches, and a broken oscilloscope later — I am pleased to share a hardware module I designed to extend the Flipper ecosystem for RF security research. This write-up covers the motivation, engineering challenges, capabilities, and responsible-disclosure principles behind the project — and a frank look at a vulnerability that is very much alive in the Maldives today.   Left: 3D render of final PCB     ·     Right: Altium Designer PCB layout view Why I Built It  The trigger was reading the original MouseJack disclosure by Bastille Networks. It made me realize that a class of peripherals most people assume to be harmless — the cheap wireless mouse on your desk — can be weaponized from a car park. I wanted a research platform small enough to carry in a jacket pocket, native to the Flipper Zero ecosystem, and capable of passive scanning, protocol analysis, and controlled lab tests. What I...

NMAP - What is NMAP and what is it used for?

What is NMAP & use of it? Basically NMAP is a free security scanner and a network mapper mainly used by system administrators, hackers , pentesters and etc.  These are few use cases of NMAP and there are tons of ways to use NMAP. Finding hosts in the network ports used by hosts and its status Finding vulnerabilities Information on versions and OS used Basic NMAP Scan nmap -sP 192.168.1.0/24 Ping multiple host to check if the hosts are alive or not Screen capture of scan TCP scan (full open scan) nmap -sT 192.168.1.9 This is a TCP connect scan. TCP connections are done with a 3 way handshake SYN SYN-ACK ACK This is otherwise called as full open scan Screen capture of scan Wireshark packet capture Stealth Mode Scan (Half open scan) namp -sS 192.168.1.9 This is known as SYN scan / Half open scan / Stealth scan SYN SYN-ACK RST Screen c...