X
Tech

Wall of Sheep at DEFCON illustrates what not to do

Because most of the common web technologies used in the world are still using clear text authentication, hackers at DEFCON illustrate why this is such a bad idea. Every year at DEFCON when one would think that attendees should know better, the Wall of Sheep is populated with careless users. I actually stopped by because of my paranoia and breathed a sigh of relief when I verified that I wasn't on the wall.
Written by George Ou, Contributor

At DEFCON 2006 in Las Vegas, a few "lucky" attendees "volunteered" to be real life examples what clear text authentication protocols you shouldn't be using.

sheep.jpg

User's passwords caught and posted on Wall of Sheep.

Because most of the common web technologies used in the world are still using clear text authentication, hackers at DEFCON illustrate why this is such a bad idea.  Every year at DEFCON when one would think that attendees should know better, the Wall of Sheep is populated with careless users.  I actually stopped by because of my paranoia and breathed a sigh of relief when I verified that I wasn't on the wall.

wallofsheep.jpg

DiscDuce, CRYPTO, DooLittle, Damien, Riverside, Cedox

Here we have members of the Wall of Sheep team performing the traffic analysis and password harvesting off the wired and wireless network.

Editorial standards