Go to Post I want to help them to get what's made such a difference to me... - Beth Sweet [more]
Home
Go Back   Chief Delphi > Technical > Programming
CD-Media   CD-Spy  
portal register members calendar search Today's Posts Mark Forums Read FAQ rules

 
 
 
Thread Tools Rate Thread Display Modes
Prev Previous Post   Next Post Next
  #13   Spotlight this post!  
Unread 23-03-2010, 19:32
ErichKeane ErichKeane is offline
Registered User
FRC #3210
Team Role: Mentor
 
Join Date: Nov 2003
Rookie Year: 2004
Location: Hillsboro, OR
Posts: 113
ErichKeane is just really niceErichKeane is just really niceErichKeane is just really niceErichKeane is just really niceErichKeane is just really nice
Send a message via AIM to ErichKeane
Re: Driver station coding and other

Quote:
Originally Posted by BEEKMAN View Post
Agreed, all this code is written by WPI Grad Students, who have lives of their own, its OKAY to mod their code! You can even send it to them and maybe they'll reconsider their methods
They are Grad students, they DON'T have lives of their own.

Quote:
Originally Posted by Vikesrock View Post
This thread is very likely to go the same route as your posts in the other thread did.

Having said that I will repeat my claim that the robot is protected by WPA encryption when on the field. WPA encryption has not been fully cracked to my knowledge, although there are vulnerabilities with the handshaking which allow for offline dictionary attacks. I don't recall the exact length or nature of the keys in use but I believe they are randomly generated keys that at the very least contain lower case, upper case and digits. A key generated in this fashion, even of the minimum 8 characters, should take far too long to brute force unless you are extremely lucky.

If I am wrong and you have a way to crack a WPA key in a timeframe that would be useful for attacking the FRC network please let me know what it is via PM and I will gladly test it and agree with you after confirming it works.

An FTP password would either be obnoxious for teams (randomly generated) or more vulnerable to a dictionary attack than the WPA key (team chosen)
The issue I mentioned before is that you don't NEED to break the WPA key (which I can do fairly consistently in less than ~30 mins).

All you have to do for this system is make the wireless 'reconnect', which will make it reconnect, thus getting stuck in 'disabled' mode for the rest of the match. Making the wireless connection reset is extremely easy, and I'll leave googling it as an exercise to the reader.

Since hacking a WPA key takes a short period of time, a person in the stands could capture the hash during practice/qual matches, then crack them at their convenience. This would allow the person to alter the assembly on the cRio at the wrong time, which I would imagine could cause immense problems.
__________________
2004: Team 219- Programmer/Designer/Builder
2009: Team 2374- Mentor
2010: Team 3210- Mentor
 


Thread Tools
Display Modes Rate This Thread
Rate This Thread:

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump

Similar Threads
Thread Thread Starter Forum Replies Last Post
2010 Driver Station Netbook Driver Account and Java joshholat FRC Control System 2 10-01-2010 15:04
Spare router and/or driver station? TD912 FRC Control System 4 28-09-2009 18:04
paper: Set and display your Auto-Mode using LabVIEW and the Driver Station PhilBot Extra Discussion 0 11-02-2009 12:32
Camera and driver station viperred396 General Forum 8 05-02-2009 10:12


All times are GMT -5. The time now is 23:22.

The Chief Delphi Forums are sponsored by Innovation First International, Inc.


Powered by vBulletin® Version 3.6.4
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.
Copyright © Chief Delphi