Hi there đź‘‹
Interested in making things, reading and all things cyber security.
Here you can expect my research, writeups and everything else I deem interesting.
I have a habit of buying used hardware whenever I see something interesting where I might think: “Let’s open it up and see how it works”. Therefore, I have a bin full of scrap electronics that wait their turn to be analyzed by me. As the title suggests, I recently picked a router from that pile, the T-Home Speedport W700V. This router is pretty old (from around 2008) so it makes a good target as I won’t be sad when I brick it by accident. The goal is to check if it has any debugging ports we can connect to and potentially dump the firmware. ...
A few weeks ago I took a mobile security class at university which also included a portion about wifi-security. Along those studies, I stumbled upon the process of performing a dictionary attack against the current consumer-grade, “standard”, WPA2. I knew tools like aircrack existed, however, I never knew how these tools worked under the hood. Therefore, it was clear that I want to build something similar with my newly acquired knowledge and took it upon myself to start working on this after my exam was over. ...