Dadliest Weapon

8.2K posts

Dadliest Weapon banner
Dadliest Weapon

Dadliest Weapon

@dadliestweapon

Christian, husband, dad of 4(!), DIY enthusiast, amateur gardener, hands-on, get dirty but get it done, silly, opinionated, small government conservative.

Louisville, KY 参加日 Kasım 2022
367 フォロー中308 フォロワー
ACERVO
ACERVO@AcervoCharts·
Um homem chamado Jonny Kim trocou de carreira três vezes e teve sucesso em todas. Seal da Marinha, médico de Harvard e astronauta da NASA.
ACERVO tweet mediaACERVO tweet mediaACERVO tweet media
Português
61
529
14.8K
639.1K
Dadliest Weapon がリツイート
Yanky 🇺🇲
Yanky 🇺🇲@Yanky_Pollak·
Neve deleting this app 🤣🤣
Yanky 🇺🇲 tweet media
English
42
926
13.8K
127.1K
Dadliest Weapon がリツイート
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🖥️🔥 Two inmates at an Ohio prison built a secret hacking operation from behind bars, using computers they were supposed to be recycling, they downloaded and sold porn in return for snacks, built a hacker toolkit with Kali Linux and password crackers, and created fake passes to move freely around the facility. All from two secret computers they built from recycling scraps and hid in a ceiling... Marion Correctional Institution in Ohio housed 2,500 inmates.. In 2014, the prison signed a deal with a recycling nonprofit called RET3 to have inmates disassemble old computers for parts. Inmates Adam Johnston and Scott Spriggs had other plans. Instead of breaking the machines down, they rebuilt two fully functioning computers from the scraps. Johnston hid the two PCs on plywood boards in the ceiling above a closet in a third-floor training room. He ran cables from the hidden machines directly into the prison's network switch. To get the computers there, he loaded them onto a hygiene cart alongside soap and shampoo. He wheeled the cart 1,100 feet across the prison, past a corrections officer, through a metal detector, into an elevator, and up three floors. Once connected, Johnston had full internet access and could remote into the hidden computers from any inmate terminal in the facility. He obtained a staff member's login credentials by shoulder surfing, watching him type his password. That password hadn't been changed in years. The prison's systems didn't enforce password rotations, in violation of their own policy. Using the stolen credentials, Johnston accessed DOTS, the state's offender tracking database. He browsed inmate records, searching for a young prisoner serving a long sentence whose identity he could steal. He found Kyle Patrick. Johnston pulled Patrick's Social Security number and date of birth from the system, bypassing a security filter that was supposed to hide SSNs by simply adjusting the browser's view settings. Johnston then applied for five credit and debit cards in Patrick's name. He texted his mother from prison using a free online messaging service and had her provide a neighbor's address across the street as the mailing address. One card, a Visa debit from MetaBank, was approved. His mother received it in the mail, called him at the prison, and read him the card number, expiration date, and activation code over the phone. Johnston activated the card from inside the prison using the hidden computers. Both the application and the activation were traced back to an Ohio state government IP address. He wasn't done. Johnston had also pulled up a Bloomberg article detailing how to file fraudulent tax returns and have refunds wired to prepaid debit cards. That was his next move. The computers were loaded with a full hacker's toolkit: Kali Linux, Wireshark, Nmap, password crackers like Cain and THC Hydra, VPN software, the Tor browser, proxy tools, and encryption software. Investigators also found articles on making homemade drugs, explosives, and fake credit cards. Johnston used DOTS to create fake passes, giving inmates unauthorized access to restricted areas of the prison. He also downloaded pornography onto thumb drives that another inmate sold to other prisoners for commissary items. The scheme only unraveled because the prison upgraded its web filtering software. In early July 2015, the new Websense system flagged Canterbury's credentials being used for three straight hours on a Friday, a day Canterbury didn't work. More alerts followed on Saturday and the following Monday. IT flagged the activity to the warden. Everyone suspected an inmate was involved. Nobody called law enforcement. The prison's IT specialist, Gene Brady, was told exactly which network port the rogue computer was plugged into. He misread the email and checked port 10 instead of port 16. It took him three days to realize his mistake. When Brady finally traced the cable into the ceiling and found the two hidden computers on July 27, he brought two inmates along to help and had them pull the computers down, contaminating the crime scene. He then emailed the warden: "What do you want me to do with the PCs?" The warden admitted he knew illegal activity was occurring but had no answer for why he never reported it to law enforcement. The state highway patrol trooper assigned to investigate crimes at the prison literally shared an office with the prison's own investigator. Neither one was informed. It wasn't until August 7, over a month after the first alert, that anyone reported the incident to the Inspector General or law enforcement. And only because an outside IT security officer told them they were required to. After the discovery, inmates immediately began wiping other prison computers with CCleaner to destroy evidence. Investigators later found the cleaning software had been run at least 10 times in two days, while inmates still had unsupervised access. Four inmates were transferred to separate prisons and placed in segregation with their phone access blocked. Johnston simply used another inmate's PIN to call his mother five more times anyway. When investigators finally seized computers across the prison, they pulled 308 machines. Of those, 291 had no inventory tags. Brady had been swapping recycling-bound computers into the prison network for years without documenting any of it. The investigation uncovered a cascade of failures: no password enforcement, no IT inventory, no crime scene protection, no reporting of illegal activity, and years of unsupervised inmate access to computers, parts, cables, and network infrastructure. The warden resigned.
International Cyber Digest tweet mediaInternational Cyber Digest tweet mediaInternational Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
79
301
2.2K
407.8K
Dadliest Weapon がリツイート
Andrew Kolvet
Andrew Kolvet@AndrewKolvet·
A pretty amazing response from President Trump to this reporter question: REPORTER: Iran is going to execute four more protesters, including the first woman protester. What do you tell Iran? TRUMP: Tell that to the Pope.
English
1.6K
17.2K
80.7K
1.7M
Dadliest Weapon がリツイート
Dadliest Weapon がリツイート
Libs of TikTok
Libs of TikTok@libsoftiktok·
BREAKING: Gavin Newsom’s PAC used $1.5 million to buy 67,000 copies of HIS OWN BOOK. Total book sales were around 97,400. His PAC’s purchase accounts for about two-thirds of all sold copies
Libs of TikTok tweet media
English
3.5K
11.4K
42K
2.3M
Dadliest Weapon がリツイート
The Babylon Bee
The Babylon Bee@TheBabylonBee·
SCOTUS Rules Death Penalty Is OK For People Who Post 'BREAKING' And A Siren Emoji Before Every Tweet buff.ly/xEmaBEP
The Babylon Bee tweet media
English
125
474
4.5K
114.6K
Dadliest Weapon がリツイート
This Account Makes You Happy
A blind baby sees his mother for the first time after surgery. Look at his reaction.🥺💕
English
324
3.5K
38.8K
1.1M
Dadliest Weapon がリツイート
Eric Daugherty
Eric Daugherty@EricLDaugh·
🚨 GREAT NEWS: Tennessee Gov. Bill Lee signs a resolution telling Pride Month to SCREW OFF, instead declaring June as "NUCLEAR FAMILY MONTH" The left is LOSING IT! "The nuclear family, consisting of one husband, one wife, and any biological, adopted, or fostered children, is God's design for familial structure and has been the bedrock of society since the creation of the world," the resolution says Amazing decision.
English
434
3.8K
14.3K
160.5K
Dadliest Weapon がリツイート
Gain of Fauci
Gain of Fauci@DschlopesIsBack·
Trump cheated in 2016. Trump tried to cheat in 2020 and got caught. Trump cheated again in 2024. We MUST pass nationwide voter ID laws to stop Trump and his cohorts from cheating again in 2028. It’s time to pass the SAVE AMERICA ACT and SAVE OUR DEMOCRACY!! 🇺🇦🌊✊🏿💉😷
English
1K
1K
13.1K
270.9K