this post was submitted on 06 Nov 2025
395 points (99.7% liked)

World News

50674 readers
3493 users here now

A community for discussing events around the World

Rules:

Similarly, if you see posts along these lines, do not engage. Report them, block them, and live a happier life than they do. We see too many slapfights that boil down to "Mom! He's bugging me!" and "I'm not touching you!" Going forward, slapfights will result in removed comments and temp bans to cool off.

We ask that the users report any comment or post that violate the rules, to use critical thinking when reading, posting or commenting. Users that post off-topic spam, advocate violence, have multiple comments or posts removed, weaponize reports or violate the code of conduct will be banned.

All posts and comments will be reviewed on a case-by-case basis. This means that some content that violates the rules may be allowed, while other content that does not violate the rules may be removed. The moderators retain the right to remove any content and ban users.


Lemmy World Partners

News !news@lemmy.world

Politics !politics@lemmy.world

World Politics !globalpolitics@lemmy.world


Recommendations

For Firefox users, there is media bias / propaganda / fact check plugin.

https://addons.mozilla.org/en-US/firefox/addon/media-bias-fact-check/

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] SaraTonin@lemmy.world 28 points 1 day ago (4 children)

I once read an interview with a white hat hacker. He said that people expect him to try to remotely connect to their network and try to brute force his way in. The first thing he actually does is put on a suit, visit the company’s headquarters, walk in the front door, start a conversation with the receptionist, and see how far he can get.

[–] Mikina@programming.dev 11 points 22 hours ago

I've done exactly that, worked as a Red Team Lead, and the success rate is pretty disturbing. That, and vishing - calling people from the company you find on Linkedin from a spoofed number of their IT that they fucked something up and need to download and run this .exe to fix it before The Audit that's currently happening notices it.

Even if we do internal infrastructure tests where they let you in, switch AVs to "detect mode" instead of "block mode" and the goal is to find as many unpatched systems/vulnerabilities as you can (instead of, well, testing the AV solution), what we usually do is run a password spray for all domain accounts with a combinations (you can try like 3 to not lock the accounts) of "" we every single time got at least few accounts.

Fortunately this kind of tests are getting more popular, and passwords such as this should've definitely been caught in some kind of security test. But it is also pretty depressing, when you repeat the same test next year, and 80% of the passwords are still the same, and vulnerabilities are still not patched.

[–] AnarchistArtificer@slrpnk.net 4 points 18 hours ago (1 children)

This reminds me of an excellent episode of Dark Net Diaries, "Jeremy from Marketing". https://pca.st/episode/52252c9e-e4a8-42f6-85f5-f162ec3f6b40

[–] missfrizzle@discuss.tchncs.de 1 points 37 minutes ago

was that the one where the corporate security was unexpectedly S-tier and ended up with him getting dogpiled by security guards after their IDS caught him popping powershell on his work machine?

[–] IsoKiero@sopuli.xyz 2 points 17 hours ago

I've done quite a bit of freelance work and visited various office spaces with multiple companies in a single building. It was pretty common just to call to the building reception and tell them that I'm working for this-and-that-company upcoming weekend for their network stuff and I'd need access to network cabinets and whatnot and they'd have keys ready for me with very little (if any) verification if I'm actually doing what I'm supposed to or if I am who I claim to be. Some of the locations just handed me keys with access to practically everything, including shared server rooms hosting their CCTV setup, key managing servers and all.

So, just get a name tag with a local operator logo and clothes to match and ask nicely. You'll get access to a lot more than you think.

[–] Sunschein@piefed.social 2 points 17 hours ago

In marching band, I learned you can get pretty much everywhere with a white polo, black slacks, and (optionally) an instrument. The same usually holds true for a hi-vis vest and jeans.