AJ McLennan

From WLCS
Revision as of 11:55, 4 March 2009 by Amclennan (talk | contribs) (Goals for Third Quarter)

First Quarter

Goals for First Quarter

  1. Set up a small network
    1. Install Server OS.
    2. Set up Mail Server.
    3. Make Network work, computers working together and commutating.
    4. Set up firewall.
  1. Experiment with Network Security.
    1. Research packet sniffing.
    2. Install talk, or some other commutation means.
    3. Find and install a program to sniff packets.
    4. Successfully intercept a packet.
    5. Try to reverse a password hash.
    6. Try to 'hack' into the firewall.

First Quarter Goal Completion

Our Network.
  1. Setting up our Network
    1. I installed the server version of Ubuntu on my computer then got an xubuntu GUI to make it easier.
    2. While my computer has the capiblity of being a mail server, it hasn't been set up yet.
    3. We have Set up a Small network with three computers. Two running Xubuntu and my computer is running the server edition of ubuntu with an xubuntu GUI.
    4. We are still waiting on a Network card to set up our fire wall.
  1. Experimenting with Network Security
    1. We researched packet sniffing and found a program Wireshark that sniffs packets.
    2. We all had pidgin install already on our machines. Pidgin is an instant messaging service that can use AIM, MSN messenger or other hosts.
    3. We found Wireshark in our research and installed it on Willie's and Nick's computers.
    4. We successfully intercepted many packets. This long list included an e-mail, multiple g-mail chat messages, AIM messages, and a password hash.
    5. Once we intercepted a password hash we tried our best to reverse it. As of yet we are unable to reverse the hash.
    6. We have not tried an attack on a firewall yet.

Second Quarter

Goals for Second Quarter

  1. Research Magnetic strip cards.
    1. Understand Low coercitivity and High coercitivity.
    2. Understand The difference between the three tracks and how they are separated.
  2. Build Magnetic strip reader.
    1. Connect cat5 wire and db-15 connector
    2. Modify track reader to read the 3rd track, enabling multi-track reading.
  3. Find or create software to read and write code on magnetic cards.
  4. Swipe cards such as credit cards and drivers licenses to see what is stored on them
  5. Learn to Program Magnetic strips
  6. Find out if metro cards are Low or High coercitivity.
  7. Research the code for metro cards.
  8. Put money on metro cards

Goal Completion for Second Quarter

  1. I reasearched magnetic stipe cards
    1. Low coercitivity and High coercitivity is how hard it is to change the information on magnetic stripes
    2. The three tracks store different information on cards in different forms. For example on a credit card the information is all the same on each track, the difference is how they are stored, hex, binary, or ASCII. The tracks are separated by an unmagnetized portion of the card that on the stripe
  2. I built a card reader.

Third Quarter

At first we wanted to make the magstripe reader actually work, then see if we couldn't build or modify it to write on the magstripe cards as well. After a bit of tinkering and research we realized that we couldn't build a writer in a quarter much less the rest of the year. So we took a different course and decided to try to attack a WEP encrypted wireless network

Goals for Third Quarter

  1. First we set up a wireless router and encryped it with a random WEP key.
  2. Next we tried to get one of the computers left over from our network to connect to the network with a wireless USB card. But drivers for Ubuntu and the wireless USB card were almost impossible to find, and when they were found the instructions on how to download and install were about as unclear as pond water. So we decided to dual-boot Willie's laptop. Which solved our problem of needing a computer with wireless capabilities
  3. Once we had our network set up we researched WEP security and programs that would help us crack the key.
  4. Willie found a program called Aircrack and then went about installing it on his laptop and configuring his wireless card so it could perform packet injection
  5. I brought my laptop in and connected to the wireless network while Willie did a client-present attack, which involved him collecting all the packets that my laptop and the router sent to each other.
  6. After Willie's laptop had collected over 100.000 packets the program tried to find the key and did so successfully.
Aircrack decrypting the WEP key of our network.