Difference between revisions of "Willie Stehm"

From WLCS
Line 1: Line 1:
Today is {{CURRENTMONTHNAME}} {{CURRENTDAY}}, {{CURRENTYEAR}}
+
Today is {{CURRENTMONTHNAME}} {{CURRENTDAY}}, {{CURRENTYEAR}} Welcome to my page!
 
==Topics of focus==
 
==Topics of focus==
 
=====Networking and Network Security=====
 
=====Networking and Network Security=====

Revision as of 23:49, 30 September 2008

Today is May 18, 2024 Welcome to my page!

Topics of focus

Networking and Network Security
  • Basic concepts
  • Building test lab
  • Intercepting packets
  • Middle man attacks
  • Encryption
RFID
  • RFID Basics
  • Assembling RFID reader
  • Reading and writing information on RFID card
  • RF-dump
  • Editing information stored on card
  • RFID security
Magnetic Stripe
  • DIY reader/writer
  • Writing and editing information on card


Ten Goals for the Quarter

1) Set up test lab using a minimum of three computers connect to a hub or switch

  • After doing a bit of research we settled on using the Xubuntu operating system. Xubuntu is a streamlined version of the Ubuntu operating system that is less memory intensive and thus better for older computers such as the ones used in our test lab. It also cuts out some of the unneeded bundled applications that come with Ubuntu, allowing us to add on only what is useful to us.
  • While comparing hubs and switches we decided to use a hub. Hubs unlike switches broadcast packets out to all ports. This enables us to easily intercept packets, learn to analyze packet data, and learn about network security as a whole.

2) Research and use packet sniffers to intercept packets sent by other computers through the network

  • Under the recommendation of Mr.Bui we started using a program called wireshark (formally known as ethereal) to start capturing packets sent over our test lab network.
  • Using the im client Pidgin, we were able to capture packets containing everything from log-on info to messages contents, buddy info, and even password hashes.

3) Research and document findings on how to crack password hashes

  • The password algorithm used in the aim protocol is MD5.

Day by Day Journal