
WEP is under control now…
Hello Guys,
Today was a great day, from today we started working on the original project which we are assigned to, because of that I was able to use my Python in the project not directly but yeah I used Python to achieve some things needed in the project actually we had an excel file and we needed to generate 3 json files using some of the fields of that excel sheet. We were suggested to do that using the code shared to us which was in JAVA but it was very complicated and the main problem was it requires so many dependencies that was the major problem for me to get all the dependencies and then configuring them.
So, I just shifted the objective from JAVA to the Python, we just needed to achieve that json file anyhow so I just tried it using Python and it worked, I will look into that JAVA code also but later, so for now we just did what we told to do and everything is going fine, other than this I just continue my Cyber Security course.
I was not able to complete the 2 sections today but I still completed 1 section of it, that was of WEP cracking, from the theory to practical everything is completed in that I understood 2 attacks 1 was fake authentication attack, and the other was ARP Replay attack they both were greatly clear.
The good thing about this course is the instructor is also covering what is going on in the backend of the command or how the attack is working which we are actually performing, not only this but even how the network in which we are attacking how is it working, what is the architecture behind the network which algorithm is used in it for encryption and all everything the instructor is explaining in such a way that if you don’t know anything about the networking and all then also you can understand.
That might be one of the reason I am able to understand the course easily, well I am also able to do those things in practical on live network I didn’t tried this WEP cracking yet because I don’t have any live WEP networks around my house but I tried what I learned yesterday which was De Authentication Attack or in simple words disconnecting a device from the network without even connecting to that network.
The section of tomorrow will cover the WPA/WPA2 networks so that is more profitable because now a days most of the networks use that encryption or security method atleast mostly private networks use that only, so once I will complete that section I will try it on the live networks I have around me.
I am thinking to make a python programs for all the attacks I am running so that it will be easy to attack the system using scripts and if I want I can also give it to anyone who have python interpreter in his or her system. Well, for now I am just learning the major reason because of which is time, I actually have to look into the packages available for the Python for that attacks or I might have to create them and it literally takes a heck of time.
So, for now I am happy with learning the commands and working with them manually in my Kali Linux but it is possible and I will have time I will definitely do that, upload the scripts to GitHub and let you all know, so that is it for today as the major part of my day went in the project work only, so let’s see what will happen in the future till then hoping for the best and waiting for the rest…
“Life is the journey we all have to go through, so don’t worry about the destination just keep enjoying the journey…”