According to an employee with knowledge of the system, the password to the Louvre's video surveillance system was simply "Louvre" at the time of the robbery last month.
Proving once again that humans are the weakest link in your security chain. No firewall or other security protocol matters when people are too lazy to use more secure passwords (or just click on random links in their email).
I once read an interview with a white hat hacker. He said that people expect him to try to remotely connect to their network and try to brute force his way in. The first thing he actually does is put on a suit, visit the company’s headquarters, walk in the front door, start a conversation with the receptionist, and see how far he can get.
was that the one where the corporate security was unexpectedly S-tier and ended up with him getting dogpiled by security guards after their IDS caught him popping powershell on his work machine?
I’ve done quite a bit of freelance work and visited various office spaces with multiple companies in a single building. It was pretty common just to call to the building reception and tell them that I’m working for this-and-that-company upcoming weekend for their network stuff and I’d need access to network cabinets and whatnot and they’d have keys ready for me with very little (if any) verification if I’m actually doing what I’m supposed to or if I am who I claim to be. Some of the locations just handed me keys with access to practically everything, including shared server rooms hosting their CCTV setup, key managing servers and all.
So, just get a name tag with a local operator logo and clothes to match and ask nicely. You’ll get access to a lot more than you think.
In marching band, I learned you can get pretty much everywhere with a white polo, black slacks, and (optionally) an instrument. The same usually holds true for a hi-vis vest and jeans.
Proving once again that humans are the weakest link in your security chain. No firewall or other security protocol matters when people are too lazy to use more secure passwords (or just click on random links in their email).
I once read an interview with a white hat hacker. He said that people expect him to try to remotely connect to their network and try to brute force his way in. The first thing he actually does is put on a suit, visit the company’s headquarters, walk in the front door, start a conversation with the receptionist, and see how far he can get.
This reminds me of an excellent episode of Dark Net Diaries, “Jeremy from Marketing”. https://pca.st/episode/52252c9e-e4a8-42f6-85f5-f162ec3f6b40
was that the one where the corporate security was unexpectedly S-tier and ended up with him getting dogpiled by security guards after their IDS caught him popping powershell on his work machine?
I’ve done quite a bit of freelance work and visited various office spaces with multiple companies in a single building. It was pretty common just to call to the building reception and tell them that I’m working for this-and-that-company upcoming weekend for their network stuff and I’d need access to network cabinets and whatnot and they’d have keys ready for me with very little (if any) verification if I’m actually doing what I’m supposed to or if I am who I claim to be. Some of the locations just handed me keys with access to practically everything, including shared server rooms hosting their CCTV setup, key managing servers and all.
So, just get a name tag with a local operator logo and clothes to match and ask nicely. You’ll get access to a lot more than you think.
In marching band, I learned you can get pretty much everywhere with a white polo, black slacks, and (optionally) an instrument. The same usually holds true for a hi-vis vest and jeans.
Not the onion?