crouching_tiger/Docs/User_Docs.md
anoduck 832e46bf1d feat(Features): 🚧 Work continues on development of Hidden Dragon
polishing signal reception, creation of ap class, added time class,further work on logging and features.

Hidden Dragon is unfinished, do not use.
2024-03-29 21:12:29 -04:00

2.2 KiB

Crouching Tiger User Documentation

Hazaa! You made it to the docs!

Forward

Out dear little program finally grew to the point where it was felt that more thorough documentation was a neccessity. Personally, yours truly, has always been frustrated with projects where the doccumentation is lacking in substance. Thankfully, I am rather long winded, literorically speaking. So, if my attention span holds up, this should be something worth while.

What set aside the original AT&T Unix from other operating systems of the time was Dennis Ritchie's unwavering dedication to thoroughly well-written documentation, and project transparency. As also the creator of the "C" programming language, Ritchie created most of the codebase for modern computing. In honor of this spirit of dedication to documentation, we all should struggle to make our own documentation worth it.

Well, that was a load of long winded bullshittery, let get to the good stuff.

A word about investment of effort

I do not claim to be any whiz at anything concerning network security, but what little I have learned proves that nothing happens like it does in the movies. There are are very intelligent and adept programmers out there, but it took them years if not a lifetime to obtain this knowledge, and more often than not, they had a hell of a lot of help and a little bit of luck to get there. The point of mentioning this is to stress the amount of effort real network security requires. You really have to invest time and effort into studying your target, and this will take a lot of time.

Acquiring access point information

The Hidden Dragon feature takes an approach that has to have been exploited by several hundred chaps before us. It is to acquire the name of local access points in your target area. You can do this by performing wardriving on your own, or you can acquire a list of access points from publicly available sources that shall remain unnamed. The point being, you will need one of these lists prepared in advance, and hope the law of averages benefits your efforts.