View Single Post
Estel's Avatar
Posts: 5,028 | Thanked: 8,613 times | Joined on Mar 2011
#1062
I don't see point in Your personal attacks/arrogance. Just in case for further posts, I prefer meritocratic arguments, and enjoy constructive critic

That said - constructive. Everything You've pointed out as my mistakes was written in my last post, really 0_o. I clearly said that Rainbow tables are precomputed before (for weeks, or even months). Still, using them after that is same for N900 or desktop computer or notebook, except speed difference in doing remaining computing work, and browsing through partially generated passwords.

I really don't like to "quote myself" - it was all written in my last post. Even things about resources in N900 and possibility to use hostmode and huge "spinning disks" HDs. Mix it with pre-computing Rainbow Tables for any network SSID You like (prepared attack, for example using relatively cheap but powerful 4x AMD graphic cards setup via CLI, same as for BitCoins generating), and You can perform active "attack" with N900, if You really want to do so.

I don't argue with fact that it's mostly proof-of-concept thing (although, using N900 got advantage of security through obscurity - almost no one except "phone" to do such things, while guy-with-a-laptop is much more "suspicious"), yet still, it proves your FUD, autocratic assumptions ("impossible, EOT") plain wrong. By the way, we're jusgt proof-of-concept'ing here, right? I don't think someone hacking networks as daily work would be stupid enough to write advices here. Or, at least, to not guise it as pentesting

Respect,

/Estel

Ps.

I really like "yesterday" stuff. Especially, when they work fine
__________________
N900's aluminum backcover / body replacement
-
N900's HDMI-Out
-
Camera cover MOD
-
Measure battery's real capacity on-device
-
TrueCrypt 7.1 | ereswap | bnf
-
Hardware's mods research is costly. To support my work, please consider donating. Thank You!

Last edited by Estel; 2011-08-11 at 23:30.