17.8K Followers
193 Following
1.4K Posts
jesus i just found some pics of barnaby jack on old sd card of mine from vegas in like 2003-4? here's one of ben nagy giving me the finger, and some guy passed out drunk at alexa park. Does anyone know who the guy in the orange shirt is? cc @thegrugq @thegrugq ? I got a video of him and barns together I think he'd like.

Your network access just sold for £15 on a dark web forum. Not because you're unimportant. Because stealing credentials at scale is now so efficient, the market treats them like bulk discount purchases.

https://www.computing.co.uk/feature/2026/cybercrime-who-are-the-initial-access-brokers

Cybercrime: Who are the initial access brokers, and why do they sell us so cheap?

Initial access brokers (IABs) are some of the most important players in cybercrime. Relied upon by ransomware gangs, spies and scammers, their role is simple: ...

A memory popped up on Facebook. To rephrase with the passage of time:

I wrote my first computer program 55 years ago. In the process, I deprived some birds of housing, kept my fingers, and ensured a lasting supply of wedgies.

https://www.cerias.purdue.edu/site/blog/post/50_years_and_lessons_not_learned/

(No one ever commented on my subtle pun by the use of "batchelors")

New Myths for Old - CERIAS - Purdue University

The Center for Education and Research in Information Assurance and Security (CERIAS) is currently viewed as one of the world’s leading centers for research and education in areas of information security that are crucial to the protection of critical computing and communication infrastructure.

https://www.youtube.com/watch?v=gJM9pZydzVg ← my new old talk was released as a standalone; it's a fun story of how you go from being able to write '2' (0x32, 1 byte) anywhere on the FS to full RCE with admin/root privs
CTF In A Box ? The Weirdest NETGEAR Network Switch 2021 Exploit Chain - Gynvael Coldwind

YouTube

The problem with renewable energies is that they're just not reliable enough.

Where is your wind and solar power supposed to come from now that the strait of Hormuz is blocked?

@jerry @zackwhittaker Pulse Secure's problems started way before Ivanti. I was at NetScreen when we acquired Neoteris in 2003 - back then, the SSL VPN product was *fantastic*. The Juniper acquisition was the beginning of the decline - Pradeep didn't give a shit about anything that didn't run JunOS, so ScreenOS and Secure Access were among the many red-headed stepchildren that came into the product portfolio by acquisition and then were completely neglected.
When we found out the (rebranded) Pulse Secure line was being sold, I was initially excited at the chance to be something other than a wart - but Siris was chasing that 10x return and when they couldn't get it by generating more revenue, they started cutting headcount. Many of the developers, QA, and support engineers who understood the products were let go long before the Ivanti acquisition... which compounded the problem of an aging codebase and increasingly complicated set of bolt-ons as Siris chased the latest buzzwords.
This whole China debacle was *entirely* predictable and *entirely* avoidable. The incentives in the security industry are just fucked. (@haroonmeer absolutely nailed this back in 2019, btw: https://m.youtube.com/watch?v=GHuQC1qLnJ4 )
Keynote address: The security products we deserve

YouTube
Software engineer here. It was pretty obvious the volume of spam calls was going to go through the roof with AI being ubiquitous. So I always try some prompt injection when they call me. Proudest achievement was a 3 minute recital of the digits of pi.

I just blew on a Nintendo Switch game card that wasn’t loading, as a joke, to see if it helped.

And it did.

Vegetarian sub shop called Never Meat Your Heros

A few days ago, a client’s data center (well, actually a server room) "vanished" overnight. My monitoring showed that all devices were unreachable. Not even the ISP routers responded, so I assumed a sudden connectivity drop. The strange part? Not even via 4G.

I then suspected a power failure, but the UPS should have sent an alert.

The office was closed for the holidays, but I contacted the IT manager anyway. He was home sick with a serious family issue, but he got moving.

To make a long story short: the company deals in gold and precious metals. They have an underground bunker with two-meter thick walls. They were targeted by a professional gang. They used a tactic seen in similar hits: they identify the main power line, tamper with it at night, and send a massive voltage spike through it.

The goal is to fry all alarm and surveillance systems. Even if battery-backed, they rarely survive a surge like that. Thieves count on the fact that during holidays, owners are away and fried systems can't send alerts. Monitoring companies often have reduced staff and might not notice the "silence" immediately.

That is exactly what happened here. But there is a "but": they didn't account for my Uptime Kuma instance monitoring their MikroTik router, installed just weeks ago. Since it is an external check, it flagged the lack of response from all IPs without needing an internal alert to be triggered from the inside.

The team rushed to the site and found the mess. Luckily, they found an emergency electrical crew to bypass the damage and restore the cameras and alarms. They swapped the fried server UPS with a spare and everything came back up.

The police warned that the chances of the crew returning the next night to "finish" the job were high, though seeing the systems back online would likely make them move on. They also warned that thieves sometimes break in just to destroy servers to wipe any video evidence.

Nothing happened in the end. But in the meantime, I had to sync all their data off-site (thankfully they have dual 1Gbps FTTH), set up an emergency cluster, and ensure everything was redundant.

Never rely only on internal monitoring. Never.

#IT #SysAdmin #HorrorStories #ITHorrorStories #Monitoring