/ Docs / User_Docs.md
User_Docs.md
 1  <!--
 2   Copyright (c) 2024 Anoduck
 3   This software is released under the MIT License.
 4   https://opensource.org/licenses/MIT
 5  -->
 6  
 7  # Crouching Tiger User Documentation
 8  
 9  **Hazaa! You made it to the docs!**
10  
11  ## Forward
12  
13  Out dear little program finally grew to the point where it was felt that more thorough documentation
14  was a neccessity. Personally, yours truly, has always been frustrated with projects where the
15  doccumentation is lacking in substance. Thankfully, I am rather long winded, literorically speaking.
16  So, if my attention span holds up, this should be something worth while.
17  
18  What set aside the original AT&T Unix from other operating systems of the time was Dennis Ritchie's
19  unwavering dedication to thoroughly well-written documentation, and project transparency. As also
20  the creator of the "C" programming language, Ritchie created most of the codebase for modern
21  computing. In honor of this spirit of dedication to documentation, we all should struggle to make
22  our own documentation worth it.
23  
24  Well, that was a load of long winded bullshittery, let get to the good stuff.
25  
26  ### A word about investment of effort
27  
28  I do not claim to be any whiz at anything concerning network security, but what little I have
29  learned proves that nothing happens like it does in the movies. There are are very intelligent and
30  adept programmers out there, but it took them years if not a lifetime to obtain this knowledge, and
31  more often than not, they had a hell of a lot of help and a little bit of luck to get there. The
32  point of mentioning this is to stress the amount of effort real network security requires. You
33  really have to invest time and effort into studying your target, and this will take a lot of time.
34  
35  ### Acquiring access point information
36  
37  The Hidden Dragon feature takes an approach that has to have been exploited by several hundred chaps
38  before us. It is to acquire the name of local access points in your target area. You can do this by
39  performing wardriving on your own, or you can acquire a list of access points from publicly
40  available sources that shall remain unnamed. The point being, you will need one of these lists
41  prepared in advance, and hope the law of averages benefits your efforts.