Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "rogers"
-
Navy story continued.
And continuing from the arp poisoning and boredom, I started scanning the network...
So I found plenty of WinXP computers, even some Win2k servers (I shit you not, the year was 201X) I decided to play around with merasploit a bit. I mean, this had to be a secure net, right?
Like hell it was.
Among the select douchebags I arp poisoned was a senior officer that had a VERY high idea for himself, and also believed he was tech-savvy. Now that, is a combination that is the red cloth for assholes like me. But I had to be more careful, as news of the network outage leaked, and rumours of "that guy" went amok, but because the whole sysadmin thing was on the shoulders of one guy, none could track it to me in explicit way. Not that i cared, actually, when I am pissed I act with all the subtleness of an atom bomb on steroids.
So, after some scanning and arp poisoning (changing the source MAC address this time) I said...
"Let's try this common exploit, it supposedly shouldn't work, there have been notifications about it, I've read them." Oh boy, was I in for a treat. 12 meterpreter sessions. FUCKING 12. The academy's online printer had no authentication, so I took the liberty of printing a few pages of ASCII jolly rogers (cute stuff, I know, but I was still in ITSec puberty) and decided to fuck around with the other PCs. One thing I found out is that some professors' PCs had the extreme password of 1234. Serious security, that was. Had I known earlier, I could have skipped a TON of pointless memorising...
Anyway, I was running amok the entire network, the sysad never had a chance on that, and he seemed preoccupied with EVERYTHING ELSE besides monitoring the net, like fixing (replacing) the keyboard for the commander's secretary, so...
BTW, most PCs had antivirus, but SO out of date that I didn't even need to encode the payload or do any other trick. An LDAP server was open, and the hashed admin password was the name of his wife. Go figure.
I looked at a WinXP laptop with a weird name, and fired my trusty ms08_067 on it. Passowrd: "aaw". I seriously thought that Ophcrack was broken, but I confirmed it. WTF? I started looking into the files... nothing too suspicious... wait a min, this guy is supposed to work, why his browser is showing porn?
Looking at the ""Deleted"" files (hah!) I fount a TON of documents with "SECRET" in them. Curious...
Decided to download everything, like the asshole I am, and restart his PC, AND to leave him with another desktop wallpaper and a text message. Thinking that he took the hint, I told the sysadmin about the vulnerable PCs and went to class...
In the middle of the class (I think it was anti-air warfare or anti-submarine warfare) the sysad burst through the door shouting "Stop it, that's the second-in-command's PC!".
Stunned silence. Even the professor (who was an officer). God, that was awkward. So, to make things MORE awkward (like the asshole I am) I burned every document to a DVD and the next day I took the sysad and went to the second-in-command of the academy.
Surprisingly he took the whole thing in quite the easygoing fashion. I half-expected court martial or at least a good yelling, but no. Anyway, after our conversation I cornered the sysad and barraged him with some tons of security holes, needed upgrades and settings etc. I still don't know if he managed to patch everything (I left him a detailed report) because, as I've written before, budget constraints in the military are the stuff of nightmares. Still, after that, oddly, most people wouldn't even talk to me.
God, that was a nice period of my life, not having to pretend to be interested about sports and TV shows. It would be almost like a story from highschool (if our highschool had such things as a network back then - yes, I am old).
Your stories?8 -
"If advertisers spent the same amount of money on improving their products as they do on advertising then they wouldn’t have to advertise them." - Will Rogers
-
"Advertising is the art of convincing people to spend money they don’t have for something they don’t need." - Will Rogers
-
HOW I GOT A HACKER TO RECOVER MY INVESTMENT FROM FAKE PLATFORM
My story is that all hell broke loose when my cousin introduced me to Byconomy and claimed it was a good investment opportunity. The promoter of Byconomy, “Rogers”, promised to return a profit of $1,200 after just 48 hours of crypto trading. I was suspicious of the deal so I only deposited $200 into my Byconomy account and watched as my balance quickly rose to nearly $1,000. I saw it as an opportunity to increase my savings so I increased the deposit amount to $1,000 and as expected, the balance rose to $6,000. Again, I thought it was wise to withdraw a larger amount at once so I deposited additional $18,000, where I got close to $90,000 total. After the 48-hour period, Rogers told me that they needed me to pay $4,000 commission or trade the gains. After paying the requested amount, Rogers told me they needed another $4,000 fee to withdraw the account balance. At this point, I refused to continue to pay Rogers and he inturn claimed that failure to make the payment would result in the loss of the whole amount. I found the whole idea manipulative because my cousin received the same messages after depositing $12,000. After numerous consultations on how we would get back our deposits, we came across a review about a crypto hacker who helps crypto investment victims. We emailed them through gearhead(@)engineer(.)com and the response was quite fast. After explaining the situation and providing all details related to the scam, they forwarded the approach they implemented and within 6 hours, we each got back our initial investment amount. I applaud GearHead Engineers and I 100% recommend them for recovery services. Visit their website gearheadengineersorg for more info. -
How DevOps is beneficial for Mobile app development?
Can anyone explain to me with a budget-friendly Mobile app development company?1