It's been a while apparently

This commit is contained in:
Isaac Greene 2025-11-14 23:10:36 -05:00
parent 41fdd2145d
commit 45aa23f860
Signed by: isaac
SSH key fingerprint: SHA256:Jr4CSXfwzXSuwhYRd3vX12Wt/v8vkvq0hOJ0NLwubH8
9 changed files with 322 additions and 71 deletions

View file

@ -0,0 +1,25 @@
\documentclass[12pt]{scrartcl}
\usepackage[T1]{fontenc}
\usepackage[letterpaper]{geometry}
\usepackage{scrlayer-scrpage}
\clearpairofpagestyles
\lohead{F25IEC\_Lab2\_Greene\_Isaac}
\lofoot{No AI used. <ig7.us/ai>.\\Work available under the Esoteric Common License. <ig7.us/license>}
\ohead*{\pagemark}
\begin{document}
\part*{CIS258 Lab 2}
\section{Importance of strong cryptographic solutions}
Using modern cryptography, including post-quantum solutions, can help ensure that communications stay secure. Several factors that can affect which specific method of cryptography is used include the method the information is sent (like choosing QUIC if you only support modern HTTP devices, TLS for more general HTTP content, or SSL if you need to support old devices even though it's insecure, or something like steganography if you need to store information in some alternate format) and ability of the client to decrypt the information. If you need to broadcast secret information, you would need to figure out the method beforehand and disseminate the information in a way that only the recipient knows what it means. This could be something like secret languages or codes, or even clues left behind.
\section{Updating MAC address}
Because I did not actually do this and have not learned how, I will be answering this section as if I did.
\subsection{Trying to access restricted network}
If I needed to gain access to a network that requires a specific MAC address, if I didn't have the correct address, I would hopefully be blocked.
\subsection{Accessing a network with a spoofed authorized MAC address}
To test the security of a network that requires a specific MAC address, I would spoof my MAC address. I'd imagine that there are other checks that can be performed, hopefully those would happen and access would be blocked.
\end{document}

View file

@ -0,0 +1,47 @@
\documentclass[12pt]{scrartcl}
\usepackage[T1]{fontenc}
\usepackage[letterpaper]{geometry}
\usepackage{scrlayer-scrpage}
\clearpairofpagestyles
\lohead{F25IEC\_Lab3\_Greene\_Isaac}
\lofoot{No AI used. <ig7.us/ai>.\\Work available under the Esoteric Common License. <ig7.us/license>}
\ohead*{\pagemark}
\begin{document}
\part*{CIS258 Lab 3}
\section{Which passwords did you crack?}
Passwords cracked:\\
- joybird1\\
- kirkles\\
- ddmack
\section{What happen if wrong format used?}
It would get the wrong results every time. I would think that passwords are checked by taking a guess, hashing it, then comparing with the known hash. If you used the wrong algorithm, your guesses would always return a result different from what you wanted.
\section{What is the result of adding custom rules?}
Password is not cracked
\section{Did I manage to crack the password?}
I managed to crack the password, it was "dragon2025". I initially had some problems because I had done \texttt{echo -n dragon2025 | md5sum > test.txt} but that added a hyphen that john couldn't parse.
\section{Part 3}
\subsection{What command did I run to see my user?}
\texttt{whoami}
\subsection{What user am I?}
\texttt{root}
\subsection{What's the password for marlinspike?}
The password is \texttt{marlinspike}
\subsection{What command did I run to see current user?}
\texttt{whoami}
\subsection{Differences between wordlists and brute-force?}
Wordlists are useful because they can narrow down the search from all possible passwords to common passwords. If our goal is simply to find any password, this method can effectively utilize available resources.
If we are trying to obtain the password for a specific user, we can try and brute-force the password because we will need to search for every password. Since we are only trying to get one password, as opposed to several, we can spare the extra compute.
\end{document}