

1·
1 month agoThis was the go to computer prank for 10 year old boys in the schools computer lab.
Real learning moment.


This was the go to computer prank for 10 year old boys in the schools computer lab.
Real learning moment.


deleted by creator


Here is the thing, does the corporate entity you work with use Microsoft? Then your password is stored as an NTLM hash in NTDS.dit. That means you are using MD4.
Has anyone in your organization clicked a phishing link? It only takes one weak link to get in. Then it only takes one (Maybe 2) bad configuration for a malicious actor to escalate privileges. Then dump the whole organization passwords from the Domain Controller.
Hope you aren’t reusing passwords anywhere.


Fr tho why does no one do port knocking? I know its not a comprehensive solution but it’s a pretty cool component imo.
I keep silicon based backup fingerprints in my lockbox at the credit union.