Digital Credential Analysis

June 23, 2014 in Howto, Information Security, Programming, Publications, Web Secuirty, WiFi Hacking by trevelyn

Rather than write a “free” article for an online magazine, I figured I’d just put this right here on my site. It’s a simple proposal for credential analysis from leaked credentials and from those gleaned during a penetration test for more accurate, targeted credential attack vectors. I propose not only simple methodology practices as examples, but even terminologies for the practice as well. Hope you enjoy, ~Douglas

WARCARRIER for Android Version 1.1

March 1, 2014 in 802.11, Android, gallery, Information Security, Mobile Development, Phone Phreaking, Programming, Warcarrier Application, WiFi Hacking by trevelyn

Almost complete. WARCARRIER for Android Tablets. This is the main screen at startup, including the menu options. Click on “catchMeNG! in the settings bar at the top right and you can input a string to troll for. This includes Bluetooth devices, BSSIDs, ESSIDs, etc. You can also choose “Plot Waypoint” to plot a new way point onto the Google Map: If you long-press on a any field (as the “Help” dialog shows from the Settings menu) You can find more information on the specific data that is presented. And as of 1.1 Beta, you can plot and scan for Bluetooth
read more

WARCARRIER 802.11 Probe Request Scanner for Android

February 24, 2014 in 802.11, Android, Howto, Information Security, Mobile Development, Programming, WiFi Hacking by trevelyn

The Application I just finished up coding a simple 802.11 scanning application for Android that uses Probe Requests to ask for all AP info in the vicinity. A station sends a probe request frame when it needs to obtain information from another station. It’s considered an “active” scan since it’s sending a request – using RFMON on your radio is passive and only sniffing. What’s cool about this type of scan is that it is easier to scan for networks when already associated to a service set. In passive scanning, with software like Airodump-ng, you get this same data from
read more

Harness Unused WiFi Signals for Power with Metamaterials

November 12, 2013 in 802.11, In the Media, In the News, Mathematics, WiFi Hacking by trevelyn

I recently saw this article ( from a comment iBall made on FaceBook. First, this isn’t that new. It’s been worked on for about a decade now and founded/hypothesized back in 1968. And yeah, from 1968 to about 1999 most of the work was “theoretical.” What I am talking about is a material designed to “catch” electro[magnetism]. In Physics, there is something called the “index of refraction” which is measured by how electro[magnetic] energy changes velocity in a new material. A simple example of refraction is in the case of light into glass or water. Have you ever seen a
read more

Catching Pink Dolphins with Libpcap via 802.11

September 9, 2013 in 802.11, Howto, Information Security, Publications, Systems Administration, Warcarrier Application, WiFi Hacking by trevelyn

Having trouble understanding libpcap with 802.11? Having a hard time finding documentation that makes you really grasp the concept of packet sniffing programmatically with 802.11? libpcap is the libraries most commonly used for packet sniffing and generation. Most of the best network hacking tools use it and the documentation is few and far between for a newbie. I’ve actually wanted to write this for a long long time. I just finished creating a lot of C Programming tutorials and if you followed through with them, you will have no problem at all with this tutorial – so let’s put these
read more