On the technical front, the big bummer is that the Office wifi base station, which I could previously access from my apartment across the hall, now has MAC address filtering. Of course, my first reflex was to attempt to login to the router using the default passwords (easily obtainable with a quick Google search) in order to add my laptop's airport card's MAC address to the allow list, but the technician who installed it has cleverly (and most reasonably, although right now I think he's a bastard) changed it to something different without telling the office (and unfortunately he did not make the mistake of using a dictionary word I could crack with hydra, unless of course it's a japanese dictionary word – which is a bit more likely. If anyone knows a nice UNIX CLI brute force cracker which deals with HTTP AUTH, and will compile on PPC, please get in touch). So then I thought it might be just as simple to spoof the MAC address of one of the office computers (while it's turned off), which should be easy since OS X (10.4 and above) has the required set of command line tools. However, either for legal/security reasons, or for some unknown other reason, neither ifconfig or Apple's own 'airport' system tool will change the built-in airport card's MAC address. So unless I can figure something out, I'll have to resort to a wired connection, which requires me to stay in the office while surfing (therefore severely impeding the satisfaction of my addiction to web/email/etc).
Shame, for once tools like hydra or methods like MAC spoofing could actually have been used for a legitimate (and legal) purpose...
Post a Comment