User_Docs.md
1 <!-- 2 Copyright (c) 2024 Anoduck 3 This software is released under the MIT License. 4 https://opensource.org/licenses/MIT 5 --> 6 7 # Crouching Tiger User Documentation 8 9 **Hazaa! You made it to the docs!** 10 11 ## Forward 12 13 Out dear little program finally grew to the point where it was felt that more thorough documentation 14 was a neccessity. Personally, yours truly, has always been frustrated with projects where the 15 doccumentation is lacking in substance. Thankfully, I am rather long winded, literorically speaking. 16 So, if my attention span holds up, this should be something worth while. 17 18 What set aside the original AT&T Unix from other operating systems of the time was Dennis Ritchie's 19 unwavering dedication to thoroughly well-written documentation, and project transparency. As also 20 the creator of the "C" programming language, Ritchie created most of the codebase for modern 21 computing. In honor of this spirit of dedication to documentation, we all should struggle to make 22 our own documentation worth it. 23 24 Well, that was a load of long winded bullshittery, let get to the good stuff. 25 26 ### A word about investment of effort 27 28 I do not claim to be any whiz at anything concerning network security, but what little I have 29 learned proves that nothing happens like it does in the movies. There are are very intelligent and 30 adept programmers out there, but it took them years if not a lifetime to obtain this knowledge, and 31 more often than not, they had a hell of a lot of help and a little bit of luck to get there. The 32 point of mentioning this is to stress the amount of effort real network security requires. You 33 really have to invest time and effort into studying your target, and this will take a lot of time. 34 35 ### Acquiring access point information 36 37 The Hidden Dragon feature takes an approach that has to have been exploited by several hundred chaps 38 before us. It is to acquire the name of local access points in your target area. You can do this by 39 performing wardriving on your own, or you can acquire a list of access points from publicly 40 available sources that shall remain unnamed. The point being, you will need one of these lists 41 prepared in advance, and hope the law of averages benefits your efforts.