NetSecNoOps

5.6K posts

NetSecNoOps

NetSecNoOps

@beardedpackets

Packet spelunker by day, Something something by night. I guess I do some infosec stuff now. 🤷‍♂️ Chaotic Good

United States Sumali Şubat 2017
321 Sinusundan169 Mga Tagasunod
m. stanfield
m. stanfield@resetbasis·
@Keith_Wasserman Metaverse land. Big opportunity. If any of your followers bought some and want to unload at their basis, reply below. I promise I won't make fun of you.
English
3
1
48
2K
Keith Wasserman
Keith Wasserman@Keith_Wasserman·
What kind of RE deals are you all currently working on? Be specific!
English
72
0
52
52.7K
Audrey Renée Bentley
Audrey Renée Bentley@BentleyAudrey·
Trying to explain to my Gen Z daughter how to use my printer to make copies through text going to scream rn thanks
English
11
4
120
13.8K
McFranchisee
McFranchisee@McFranchisee·
On April 29th, @dunkindonuts is dropping their version of a dirty soda: Pepsi 🥤 Coffee Milk (coffee flavored milk) ☕️ Sweet Cold Foam 🥛 I’ve personally never heard of coffee in soda. How is it? Are you trying one?
McFranchisee tweet media
McFranchisee@McFranchisee

The best thing about this new beverage trend, @McDonalds already had the necessary & essential components for this type of launch. McD has the world’s best drinks already, with under $10k in smallwares and a handful of new beverage SKU’s - we are adding a new line of business in the hottest trend in our current footprint.

English
21
0
31
15.9K
Jim Farley
Jim Farley@jimfarley98·
It’s been 62 years since the birth of the @FordMustang. From day one, Mustang changed the industry forever! Thank you to everyone who’s built it, raced it, loved it, and kept pushing it forward all these years. Happy birthday to the #FordMustang! #FordHistory
Jim Farley tweet mediaJim Farley tweet mediaJim Farley tweet media
English
64
83
556
22.6K
IrishRover
IrishRover@IrishRover66·
@GovernorShapiro Looks like he will be stealing more Taxpayer money to refurbish his Private Residence.
IrishRover tweet media
English
1
1
4
117
Governor Josh Shapiro
Governor Josh Shapiro@GovernorShapiro·
BREAKING: We just saved 1.7 million Pennsylvanians $510 million on their electric and gas bills — up to $34/month in savings for some PECO customers. Pennsylvanians can’t afford another rate hike — so I demanded that PECO’s leadership put customers first. They listened — and agreed to withdraw their proposed increase, which would have significantly increased utility costs for consumers. I’m going to continue fighting to make sure utility companies are focused on keeping costs down while maintaining safe and reliable service.
English
138
70
522
44.9K
Cthulhu ( ;,;)
Cthulhu ( ;,;)@Cthulhu_Answers·
IMO Black Hat trainings are a rip off. $5-6k for 2-3 days of training is a money grab not a training program.
English
3
0
22
670
Dave Kennedy
Dave Kennedy@HackingDave·
👀
International Cyber Digest@IntCyberDigest

🖥️🔥 Two inmates at an Ohio prison built a secret hacking operation from behind bars, using computers they were supposed to be recycling, they downloaded and sold porn in return for snacks, built a hacker toolkit with Kali Linux and password crackers, and created fake passes to move freely around the facility. All from two secret computers they built from recycling scraps and hid in a ceiling... Marion Correctional Institution in Ohio housed 2,500 inmates.. In 2014, the prison signed a deal with a recycling nonprofit called RET3 to have inmates disassemble old computers for parts. Inmates Adam Johnston and Scott Spriggs had other plans. Instead of breaking the machines down, they rebuilt two fully functioning computers from the scraps. Johnston hid the two PCs on plywood boards in the ceiling above a closet in a third-floor training room. He ran cables from the hidden machines directly into the prison's network switch. To get the computers there, he loaded them onto a hygiene cart alongside soap and shampoo. He wheeled the cart 1,100 feet across the prison, past a corrections officer, through a metal detector, into an elevator, and up three floors. Once connected, Johnston had full internet access and could remote into the hidden computers from any inmate terminal in the facility. He obtained a staff member's login credentials by shoulder surfing, watching him type his password. That password hadn't been changed in years. The prison's systems didn't enforce password rotations, in violation of their own policy. Using the stolen credentials, Johnston accessed DOTS, the state's offender tracking database. He browsed inmate records, searching for a young prisoner serving a long sentence whose identity he could steal. He found Kyle Patrick. Johnston pulled Patrick's Social Security number and date of birth from the system, bypassing a security filter that was supposed to hide SSNs by simply adjusting the browser's view settings. Johnston then applied for five credit and debit cards in Patrick's name. He texted his mother from prison using a free online messaging service and had her provide a neighbor's address across the street as the mailing address. One card, a Visa debit from MetaBank, was approved. His mother received it in the mail, called him at the prison, and read him the card number, expiration date, and activation code over the phone. Johnston activated the card from inside the prison using the hidden computers. Both the application and the activation were traced back to an Ohio state government IP address. He wasn't done. Johnston had also pulled up a Bloomberg article detailing how to file fraudulent tax returns and have refunds wired to prepaid debit cards. That was his next move. The computers were loaded with a full hacker's toolkit: Kali Linux, Wireshark, Nmap, password crackers like Cain and THC Hydra, VPN software, the Tor browser, proxy tools, and encryption software. Investigators also found articles on making homemade drugs, explosives, and fake credit cards. Johnston used DOTS to create fake passes, giving inmates unauthorized access to restricted areas of the prison. He also downloaded pornography onto thumb drives that another inmate sold to other prisoners for commissary items. The scheme only unraveled because the prison upgraded its web filtering software. In early July 2015, the new Websense system flagged Canterbury's credentials being used for three straight hours on a Friday, a day Canterbury didn't work. More alerts followed on Saturday and the following Monday. IT flagged the activity to the warden. Everyone suspected an inmate was involved. Nobody called law enforcement. The prison's IT specialist, Gene Brady, was told exactly which network port the rogue computer was plugged into. He misread the email and checked port 10 instead of port 16. It took him three days to realize his mistake. When Brady finally traced the cable into the ceiling and found the two hidden computers on July 27, he brought two inmates along to help and had them pull the computers down, contaminating the crime scene. He then emailed the warden: "What do you want me to do with the PCs?" The warden admitted he knew illegal activity was occurring but had no answer for why he never reported it to law enforcement. The state highway patrol trooper assigned to investigate crimes at the prison literally shared an office with the prison's own investigator. Neither one was informed. It wasn't until August 7, over a month after the first alert, that anyone reported the incident to the Inspector General or law enforcement. And only because an outside IT security officer told them they were required to. After the discovery, inmates immediately began wiping other prison computers with CCleaner to destroy evidence. Investigators later found the cleaning software had been run at least 10 times in two days, while inmates still had unsupervised access. Four inmates were transferred to separate prisons and placed in segregation with their phone access blocked. Johnston simply used another inmate's PIN to call his mother five more times anyway. When investigators finally seized computers across the prison, they pulled 308 machines. Of those, 291 had no inventory tags. Brady had been swapping recycling-bound computers into the prison network for years without documenting any of it. The investigation uncovered a cascade of failures: no password enforcement, no IT inventory, no crime scene protection, no reporting of illegal activity, and years of unsupervised inmate access to computers, parts, cables, and network infrastructure. The warden resigned.

ART
12
5
117
21.1K
NetSecNoOps
NetSecNoOps@beardedpackets·
@clashreport @AntiToxicPeople "As I walk through the valley of the shadow of death, I take a look at my life, and realize there's nothing left" - Coolio 8:95
English
0
0
0
7
Clash Report
Clash Report@clashreport·
Pete Hegseth quoted a fake Bible verse from Pulp Fiction during a Pentagon sermon.
English
4.9K
23.5K
121.5K
29.7M
NetSecNoOps
NetSecNoOps@beardedpackets·
@potatoslav @SwiftOnSecurity A tad more sophisticated than when a classmate called the classroom phone just to interrupt class. This was a time when a student with a cellphone would have been fairly rare.
English
0
0
1
679
swamp hag ✨☕️🌸🍓🍰
when i was in high school someone recorded the sound of the school bell on their flip phone in an attempt to try to end class earlier. because we all had piece of shit flip phones they were extremely loud and this worked. sounded just like the regular bell. mp3 got sent around school and you’d be sitting in English class watching the clock and suddenly the bell rang two minutes early. teacher had no clue. thought it was a fluke. people got overconfident and started ringing the last bell early. whole classes start walking out 10 minutes early. principal trying to figure out what is wrong with the bells. this went on for a week or two until someone got caught and the teachers started having to watch the clocks so we didn’t Trick them. they had to staff people to watch the exits bc we succeeded in Tricking them. truly peak millennial experience, phones were perfect and should have stopped advancing there.
English
88
1.3K
48.1K
1.5M
TracketPacer
TracketPacer@TracketPacer·
once he took down the network by deleting a port channel without realizing it. another time he followed me to the office bathroom and listened at the door while i took a shit. anyway hope the shut/no shut manual commands still make you feel like a big boy in the NOC, chris
English
10
1
223
6.7K
TracketPacer
TracketPacer@TracketPacer·
every once in a while after a particularly brutal therapy session unpacking the trauma, i go to linkedin to make sure the guy who sexually harassed me at a previous workplace is still a shittyass level II network engineer at the same company & then have a nice chuckle to myself
English
15
4
652
16.6K
R A W S A L E R T S
R A W S A L E R T S@rawsalerts·
🚨#BREAKING: Watch as Kick streamer Sneako is attacked and punched extremely hard in the face after telling his chat “you deserve to be publicly executed,” when a possible stream sniper or a random man on a busy New York City street confronts him, sparking a sudden and chaotic altercation caught on camera.
English
1.2K
766
13.9K
2.3M
SH
SH@sommyhillz1592·
You want to know why I love Trump? 1. I love how he doesn’t hold back in saying his mind. 2. I love how he is super transparent and accessible to everyone. 3. I love how he fights for what he loves. Dems can’t understand this cos they have TDS. MAGA💯💯💯
English
6
0
2
332
SH
SH@sommyhillz1592·
@patriottakes Recently there has been a coordinated attack by the pope, Islamists and democrats against Trump. It’s indeed sad to see the pope agree to this coordinated attacks. Thankfully every sane person in the world agrees with Trump on Iran 🇮🇷. MAGA💯💯💯
English
1
0
0
21
NetSecNoOps
NetSecNoOps@beardedpackets·
@patriottakes Why are there jump cuts between him shooting and the target getting hit?
English
0
0
0
8