/>
X
Innovation

Wall of Sheep at DEFCON illustrates what not to do

Because most of the common web technologies used in the world are still using clear text authentication, hackers at DEFCON illustrate why this is such a bad idea. Every year at DEFCON when one would think that attendees should know better, the Wall of Sheep is populated with careless users. I actually stopped by because of my paranoia and breathed a sigh of relief when I verified that I wasn't on the wall.
Written by George Ou, Contributor on

At DEFCON 2006 in Las Vegas, a few "lucky" attendees "volunteered" to be real life examples what clear text authentication protocols you shouldn't be using.

sheep.jpg

User's passwords caught and posted on Wall of Sheep.

Because most of the common web technologies used in the world are still using clear text authentication, hackers at DEFCON illustrate why this is such a bad idea.  Every year at DEFCON when one would think that attendees should know better, the Wall of Sheep is populated with careless users.  I actually stopped by because of my paranoia and breathed a sigh of relief when I verified that I wasn't on the wall.

wallofsheep.jpg

DiscDuce, CRYPTO, DooLittle, Damien, Riverside, Cedox

Here we have members of the Wall of Sheep team performing the traffic analysis and password harvesting off the wired and wireless network.

Editorial standards

Related

How much RAM does your Windows 11 PC need?
adobestock-339222220

How much RAM does your Windows 11 PC need?

What is ChatGPT and why does it matter? Here's what you need to know
chat bot

What is ChatGPT and why does it matter? Here's what you need to know

These are my 5 must-have devices for work travel now
ipad-mini-firewalla-purple-macbook-air

These are my 5 must-have devices for work travel now