https://www.theregister.com/2025/04/19/us_crosswalk_button_hacking/
One could argue that the password "admin" is slightly more secure than "1234" because
a) it is longer, and
b) it is composed of characters from an alphabet that has 26 characters instead of only 10.
Sure; not at work, bcs most places I have worked would fire people if such obvious access was available because it would get picked up on the most trivial security audit, however, I've reasonably often been round to help a friend with 'internet issues', and everything on the router is set to factory defaults, and I learned that admin:admin works for a terrifying number of older routers.
@bytebro @WastelandWandrr @srslypascal @GossiTheDog
The one I found was on a VAX in the HQ of a large corporate entity in the food sector (on the other end of a private link). I was at a remote site, testing a LAN extension that shared an existing DECnet LAT with a new Novell IPX deployment. On the same wire. Which was coaxial.
Gradually, PC terminal software replaced the flickering glow of VT52 and VT100 terminals.
I was making sure that 'average' traffic could coexist for both systems.
@bytebro @WastelandWandrr @srslypascal @GossiTheDog
I was just making sure that the site's LAT was still reaching CORPVAX1 in HQ with Novell users active. I wasn't expecting an "I'm in" moment on a machine several hours drive away.
So I logged out, and raised my concern about the test/test account with the most appropriate person at the local site.
The admins in the company HQ determined that a 3rd party vendor had left the backdoor in place. I don't know what happened about that.
@GossiTheDog Yes well, can you imagine the bureaucratic hassle involved in correctly and accurately recording a separate password for each device, and making sure it can be found in fifteen years' time next time someone needs to change the programming?
Password control doesn't sound like a very clever design choice to me, given how impractical it would be in real life to change the default password.
So ... in real life, if the password were changed then legitimate people making legitimate configuration changes would have to fall back on sticking a pin up the factory reset hole to get the default password back. And ... guess what ... the hacker could do that too!
Has the Microsoft president already announced that this must have been the work of 1000+ Hackers?
https://www.infosecurity-magazine.com/news/microsoft-1000-hackers-worked/
https://specopssoft.com/blog/solarwinds-hack-weak-password-solarwinds123-cause/
Haha, hilarious!
β