AJ McLennan

From WLCS

First Quarter

Goals for First Quarter

  1. Set up a small network
    1. Install Server OS.
    2. Set up Mail Server.
    3. Make Network work, computers working together and commutating.
    4. Set up firewall.
  1. Experiment with Network Security.
    1. Research packet sniffing.
    2. Install talk, or some other commutation means.
    3. Find and install a program to sniff packets.
    4. Successfully intercept a packet.
    5. Try to reverse a password hash.
    6. Try to 'hack' into the firewall.

First Quarter Goal Completion

Our Network.
  1. Setting up our Network
    1. I installed the server version of Ubuntu on my computer then got an xubuntu GUI to make it easier.
    2. While my computer has the capiblity of being a mail server, it hasn't been set up yet.
    3. We have Set up a Small network with three computers. Two running Xubuntu and my computer is running the server edition of ubuntu with an xubuntu GUI.
    4. We are still waiting on a Network card to set up our fire wall.
  1. Experimenting with Network Security
    1. We researched packet sniffing and found a program Wireshark that sniffs packets.
    2. We all had pidgin install already on our machines. Pidgin is an instant messaging service that can use AIM, MSN messenger or other hosts.
    3. We found Wireshark in our research and installed it on Willie's and Nick's computers.
    4. We successfully intercepted many packets. This long list included an e-mail, multiple g-mail chat messages, AIM messages, and a password hash.
    5. Once we intercepted a password hash we tried our best to reverse it. As of yet we are unable to reverse the hash.
    6. We have not tried an attack on a firewall yet.

Second Quarter

Goals for Second Quarter

  1. Research Magnetic strip cards.
    1. Understand Low coercitivity and High coercitivity.
    2. Understand The difference between the three tracks and how they are separated.
  2. Build Magnetic strip reader.
    1. Connect cat5 wire and db-15 connector
    2. Modify track reader to read the 3rd track, enabling multi-track reading.
  3. Find or create software to read and write code on magnetic cards.
  4. Swipe cards such as credit cards and drivers licenses to see what is stored on them
  5. Learn to Program Magnetic strips
  6. Find out if metro cards are Low or High coercitivity.
  7. Research the code for metro cards.
  8. Put money on metro cards

Goal Completion for Second Quarter

  1. I reasearched magnetic stipe cards
    1. Low coercitivity and High coercitivity is how hard it is to change the information on magnetic stripes
    2. The three tracks store different information on cards in different forms. For example on a credit card the information is all the same on each track, the difference is how they are stored, hex, binary, or ASCII. The tracks are separated by an unmagnetized portion of the card that on the stripe
  2. I built a card reader.

Third Quarter

At first we wanted to make the magstripe reader actually work, then see if we couldn't build or modify it to write on the magstripe cards as well. After a bit of tinkering and research we realized that we couldn't build a writer in a quarter much less the rest of the year. So we took a different course and decided to try to attack a WEP encrypted wireless network

Goal Documentation for Third Quarter

  1. First we set up a wireless router and encryped it with a random WEP key.
  2. Next we tried to get one of the computers left over from our network to connect to the network with a wireless USB card. But drivers for Ubuntu and the wireless USB card were almost impossible to find, and when they were found the instructions on how to download and install were about as unclear as pond water. So we decided to dual-boot Willie's laptop. Which solved our problem of needing a computer with wireless capabilities
  3. Once we had our network set up we researched WEP security and programs that would help us crack the key.
  4. Willie found a program called Aircrack and then went about installing it on his laptop and configuring his wireless card so it could perform packet injection
  5. I brought my laptop in and connected to the wireless network while Willie did a client-present attack, which involved him collecting all the packets that my laptop and the router sent to each other.
  6. After Willie's laptop had collected over 100.000 packets the program tried to find the key and did so successfully.
Aircrack decrypting the WEP key of our network.
  1. After we had cracked the the key we both went our separate ways. I decided to try and create a project using a micro controller. I researched micro controllers and found this website that contained a couple of tutorials about programing a micro controller.

Fourth Quarter

I was talking to a friend of mine about a game we used to play called murder, where one person was the murderer, one person was the detective, and everybody else were victims. When we used to play it we had to play in the dark and stay in one room (so the game wouldn't last all night). As we were talking we decided that we would like to play the game again, expect with a much bigger area, no time limit, and more people. So I thought of a way to replace the little pieces of paper that had "murderer", "detective", and "victim" written on them. I remembered reading somewhere that python could send e-mails, that coupled with the fact that e-mails can be sent to phones as text messages I figured I could write a code to randomly choose two people, one murderer and one detective, then send text messages(e-mails) to those two and send every body else a text message to tell them they're victims.

Planning the code