Thursday, May 27, 2010



Some months ago I wrote a couple scripts to capture the workflow of cracking WEP. Essentially you could use the scripts to scan for targets and then specify the target to attack by ESSID or BSSID.

I came into a situation where I needed to learn python so I consolidated those scripts into a single python script and that is wepwn. It was developed on Backtrack 4 but may work on other Linux distros without modification.

I was reluctant to release it without much testing but it’s not going to get much testing in my environment beyond what I’ve done. I’d appreciate feedback, bug reports, or patches. Enjoy.

Friday, May 21, 2010

Friday, May 7, 2010

Todo Sushi

Todo Sushi off of Carroll Canyon Rd. Tuna roll: good. Baby lobster dynamite roll: very good. Volcano roll: incredible.

Saturday, May 1, 2010

Verizon Service for Android Purchase

When I went to buy my Droid Incredible the Verizon sales rep was very friendly and helpful. One thing that was lame was that he offered to sell me an 8GB or 16GB microSD card for my phone. I refused figuring I’m better off just picking one up at Fry’s or wherever. A few minutes later he pulls out a 2GB microSD card and says that it’s free. This seems like a totally shady upsell, not telling me it came with a 2GB card up front.

On the other hand, the second day with my phone I was trying to wiggle in the USB cable and a small thin bar of plastic above the USB connector snapped. Obviously it was my fault that it broke and I need to be more careful in the future. I went back to the store to talk about it and pick up a car mount for the phone. I explained that I had broke it and that it was still functional and my real concern was that this little piece of protruding plastic would catch on stuff. The same rep who sold me the phone looked at it carefully, made a note in the system about it and said that I could call an 800 number and get a new one under their 30-day Worry-Free Guarantee. This was all before I mentioned an intent to purchase the car mount.

The shady upsell in the beginning was weak, but the follow-up service for minor damage to my phone was excellent.

Walls Get Bombed

Walls Get Bombed

I like graffiti so I’ve started a semi-public blog for graffiti. Check it out.

From "The Privacy Blog" Intelligence collection *from* open proxy servers

From "The Privacy Blog" Intelligence collection *from* open proxy servers

The short version: you use an open proxy someone set up and the logs of what you’ve visited are stored there. Possibly those logs are poorly protected. It’s also possible that the proxy was set up with the specific purpose of surveillance.