• frongt@lemmy.zip
    link
    fedilink
    English
    arrow-up
    1
    ·
    16 hours ago

    I’ll admit it, I have systems at work with weak or default passwords. But they don’t handle any sensitive information, and exploiting them wouldn’t get you any additional privileges on the network.

    • FuglyDuck@lemmy.world
      link
      fedilink
      English
      arrow-up
      4
      ·
      13 hours ago

      that’s just it… any vulnerable system lets them get their nose in the door, then the camel starts snooping around the tent for whatever it can get. Eventually, they find away to something juicy.

      The thing is, whether we’re talking about digital or physical security, the weakest thing in any system is the humans. The sloppy passwords (c’mon it should have been Louvre25! lol.) is a human thing. clicking that phising scam is a human thing. kipping off to the egyption bedroom for tryste with receptionist is a human thing.

      the simple password isn’t the problem. The people being complacent is.

    • comrade_twisty@feddit.org
      link
      fedilink
      English
      arrow-up
      3
      ·
      15 hours ago

      Until someone figures out how to use this non critical system to exploit other parts of your network. An ssh shell on an internet connected coffee machine in a bank would make a great starting point to gain access to more critical systems for example.