Just Checking

Started by wilnix, March 04, 2002, 02:39:11 PM

Previous topic - Next topic
Is it unethical to check for simple vulnerabilities in every single network you deal with? Should I tell the Admins? Should I care?

I have root / administrator accounts in just about every network I've touched due to Lazy/Ignorant Admins. The ones that I havent added myself to are ones I am already trusted in. Is that wrong?

Wilnix
alt email address: wilnix@hackphreak.org

Nope ! :)

I should do it more often
hehehehe
but the feds scare me big time...
hrmm.... It'd be fun to go on a rooting spree
no canned scripts, just good ole fashioned rooting...
hehe

Overall, I don't think it's unethical if one doesn't cause damage...
I know maddy very well and he wouldn't do that.... I know I wouldn't, as tempting
as a defacement might sound hehe.

"My Terminal is my Soul"

Yes Wil... it is! You are going to hell!!!  >:(

Oh... but don't worry... I'm driving the bus there and I just filled up the gas tank! h0h0h0  ;D
*** Sleep: A completely inadequate substitute for caffeine. ***
01010010010101000100011001001101

Thanks Metty

I am totally innocent  ::) <==See?

Uneek, on the other hand, is a complete looney!!!  ;D

Wilnix

alt email address: wilnix@hackphreak.org

lol @ Neek and Will

hahaha

good thread...

"My Terminal is my Soul"

Uneek should buy me a mocha freeze....  :'(
alt email address: wilnix@hackphreak.org

Hey will, could be worse man. You could have my job. You sit there and find holes, but when you bring them to the attention of those in charge of the (ekkk ;P) NT Domain they dont listen to you until its too late. Recently we had an instance where a contracted company came in to install survey and inventory software on all the workstations. They decided to circumvent the dillemma of having to install thier client software manually per machine by putting in the login scripts. All fine and good with one exception, they made all the domain users Administrators on all the domain machines including the servers and never said anything. About a week later some curious users found it was possible to get into User Manager and add themselves to any group they wanted to. Took me all day to make them realize this was a big problem.
"A well known hacker is a good hacker, an unknown hacker is a great hacker..."

I don't care what your parents told you, you aren't special.
  • https://github.com/tazinator

hahahaha
that's too funny

oh man... why do we have these 'experts' on the job ? ugh...
I don't claim to be an NT guru but uh.. that was stupid...

I'd rather tighten down a UNIX box any day...
"My Terminal is my Soul"

hrmmm....

Sounds like something our help desk would do. And: It's the exact reason I hate R&D. They are made to be users that are dangerous. Since they get paid more then us, they think they know more. Funny, I found six exploits on the R&D Director's side business website and a way into the ISP's 2k Domain (they added his box as a domain controller). Stupid morons. Then they wonder why I dont have an NT boxes in my DMZ.

Wilnix
alt email address: wilnix@hackphreak.org

That is EXACTLY why I'm glad that nothing gets added/deleted/changed on my network unless I approve it first! I swear I'd have to kill someone if that happened on our network. Plus with only a handful of peeps here with admin privs, it makes it easy to track who did what.
*** Sleep: A completely inadequate substitute for caffeine. ***
01010010010101000100011001001101

I iwsh we could lock down local admin rights on R&D, but they need them to test their software. Damn them...

Wilnix
alt email address: wilnix@hackphreak.org

Uhm... Not sure why this topic was locked, but I unlocked it. If someone locked it for a reason please let me know.

Anyhoo, Wil... do they HAVE to be on the production network? Can't you guys put them on their own network or at the very least a seperate VLAN or child domain where they don't have admin rights to the whole network?
*** Sleep: A completely inadequate substitute for caffeine. ***
01010010010101000100011001001101

NO, no, no...

They only have local admin rights to their machine. I'd leave the company if I had to put them in the domain admin group or even network administrators group... My own helpdesk doesn't even get those rights.
I do have them VLAN'd off and I have domain admin group under their local administrators group.

So, I have full control of their machines as wellas the network, but they only have control of their machines. I just can't lock it down anymore then that (they can install anything they want on their computer...including any software that Norton Antivirus doesn't pickup on)...

Wilnix
alt email address: wilnix@hackphreak.org

Heh... In that case, make them admin their own machines and fix whatever they fuck up, as long as it doesn't affect the production network. They'll learn real quick not to install crap or change system settings which they aren't supposed to fuck with.   ;D
*** Sleep: A completely inadequate substitute for caffeine. ***
01010010010101000100011001001101

Fortunately, if they have issues, they call help desk first. They suck, I fell for the help desk...wait...nevermind. I lied.

I couldn't care less.

Wilnix
alt email address: wilnix@hackphreak.org

SMF spam blocked by CleanTalk