Popular posts from this blog
Lab 1: Code Review
Code Review Aircrack-ng Aircrack has not many contributors, 16, 4 of which are the main contributors. I found it interesting that issues / bugs are posted right to their Github with collaborators encouraged to fix any issues that are live. Upon viewing the live issues, a group of 3 or 4 people can be seen talking and comparing code in order to fix the issue. Some issues listed are ways they can improve the software. I think this is a good way to continue progression on making your software higher quality. GetTor The tor project is a great github, they tell you directly on the page how people can help. They strongly encourage their community to get involved and want people to look at the source code to learn what it does. The creators of this project also host presentations and demonstrations on how their project works along with future goals. Here is one of the creators speaking abou...
Stage 3: CowPatty
CowPatty Stage 3 Introduction: Cowpatty being a tool that related to some of my interests I wanted to take a deeper look into how it works. At the start I understood the basics, feed it a 4-way handshake, SSID name and a dictionary file and it would spit out its best guess of the SSID. While Cowpatty has the ability to 'guess' the SSID's password, its only effective / used to audit networks that have poor / common / default passwords. Interestingly enough in this Defcon video titled "Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog" - Provided he made his warkitteh sniff for packets and save them, he could attempt to hash SSID+handshake to get passcodes. He got quite the list of SSIDs, Some WEP which I dont think is a setting on new routers (hopefully). I do not condone Weaponizing you pets or strapping batteries to them, do not attempt. However, it was neat! Since CowPatty has to match keys it has to got through a large d...
Comments
Post a Comment