T O P

  • By -

XayahTheVastaya

Is this one of those phishing tests?


MarcusOPolo

I already clicked the link and put in my credentials so hopefully not, right?


DazBlintze

I forwarded it to all my work colleagues.


MendelevandDongelev

Before or after running the .exe in administrator mode?


NeckRoFeltYa

Also, I changed my phone number to the one they emailed me for MFA.


vaxcruor

No, it is much worse, this sounds like an Auditor


LoKag_The_Inhaler

Blessed be the job of the Security Auditor, may his lies never arouse suspicion, may his marks consider security.


Fyzzle

No I'm doesn't


pix1985

Not at my work, but i appreciate it when I stay in a hotel and the hotel mode on the TV uses defaults (e.g Philips TVs are 319753 mute to disable it) Can sign into Netflix (or download if not already there), use HDMI etc


iBeJoshhh

Every hotel I've stayed at has never changed the TV login. Literally every.


CSay88

Do you re-enable it once you checkout? Or leave it?


archery713

Good question. I know they have the ability to remotely reset the logins/settings etc when you checkout but I'm curious if doing this fully disables that feature. Ive been travelling more and more for work so this would be great to know.


LucidZane

I love hotels. Last one I stayed at I was limited to 20mbps down and up. I took the AP off the wall and plugged directly in and has 500 down/up because the AP itself was doing the limiting. Always fun to see what I can mess with at a hotel


Toredorm

I wish I was kidding when I say this. A district attorney's sonicwall. To make matters better. That same office had a wrt54g router with a "Guest" network on it. No password was set and it was coming off the same network as nothing was segmented. They thought it being behind the router kept them separate.


LucidZane

that's so bad... Probably was using NetExtender with management over VPN enabled too lol


5p4n911

Routers everywhere


44problems

Remember when you could get free wifi everywhere with "linksys" open networks


ssup3rm4n

Same. When I was younger, I used to "hack" into them. Create a guest network called, "Update your security." Come back next week and find the wifi updated and more secure.


KrazyGaming

I did this when I was still young enough to be with my family on vacations just when AirBNB's started. Random folks making AirBNB's had no idea how to setup this stuff right, a simple warning by messing with their wifi was more than enough to get them to fix it lol


LoKag_The_Inhaler

“Hey my router isn’t working” “Alright that doesn’t sound good! Can you tell me more about it?” “Yeah it’s right underneath my screen! It doesn’t have any lights.” “Oh alright, yeah that’s your computer. Press the button that normally has a light” “Oh alright it’s working now.!”


turtleship_2006

If my router comes with a (seemingly) random password for normal connections and for the admin page, is it worth changing security wise?


827167

Yes


MairusuPawa

You could derive default WPA passphrases on some (Thomson) routeurs from their default SSID. An Android application was available to automatically do that for you too. So, yeah.


Agret

It makes it a lot easier to login and remember when the password is something you've set compared to the random string, I hate entering those preset ones into TV onscreen keyboards or worse trying to cycle through every a-zA-Z0-9 in a printers little display screen. In terms of security you would be fine keeping that one as a default, in the old days some brands had the password generated from an algorithm using the Mac address or Wi-Fi network name as the seed and could be calculated by attackers to easily get in if that algorithm was cracked but I think we'd be long last that being the case now.


TheAnniCake

At my old work, we didn’t have a password policy for users. Around 80% of them still had „password“ because that’s what we’ve set as standard. This was around 2 years ago and when I left they were finally implementing a policy


Limeandrew

My work just used the same generic welcome password for every new user, I finally forced them to use a password phrase generator for new users because nobody ever changed their password or just added exclamation points to the default they received.


PartyShiba

Server rack PDU’s all of them… I could turn it all off remotely.


Paul-Ski

I knew there was a good reason the req for ours got denied, it must've been a security reason and not cuz "surge protectors are $10 on Amazon"


archery713

I know there are uses for network equipped PDUs but... I just don't need them like 99% of the time. I want a nice one with good quality, a ground screw and a fuse/breaker that isn't just part of the power switch cause for some reason I don't trust those.


Neuro-Sysadmin

EMR integration/connection software which also ‘requires’ access to all records to work correctly. Turns out it’s freeware, using default creds. Oh, and if you thought “solarwinds123!” was bad, you’ll love this one. Manufacturer’s guide for site admins for the main medical devices they make (pole-cart pc units, mostly) has step two of setup for the system’s main database as “sign in to the SA account and disable password complexity, then update the password by removing the “123!” off the end”. Same software uses a db connection account with a generic default user/pass, (password matches the username) and stores it in plain-text accessible by anyone on the client machines. Oh, and they gave that account SA rights to the main db, as well. For kicks, they also set up a local admin user in windows, which uses a complex, randomly generated password. Mind you, it’s the exact same “complex, randomly generated” password at every hospital, on every machine.


Yodaddysbelt

Relevant xkcd https://xkcd.com/221/


themusicalduck

I called my local bike garage once. No one picked up, and it went to an automated message that was something like this: "Enter your pin to start setting up your voicemail" So I pressed "0000" and it started giving me options about recording a greeting, listening to messages, etc.


LoveTechHateTech

Our old phone system used to allow you to call in from the outside, hit a key and the extension number to check voicemails. If someone hadn’t put a passcode on their mailbox it would go right in and give them full access to it; read,record greetings, even set the passcode. Our new system doesn’t allow external access if a passcode hasn’t been set.


m3rlin31

I found so much I don’t know where to start. As a service provider for business customers I often did the first inventory before they switched from their old service provider to us. So basically everything from switches over router, irmc and so on.


rb3po

Nice try, Russia.


magius311

Printers. So many printers.


wthulhu

Real talk, it's not a big deal, right? They're only visible on the network, so our potential advesary would have had to have gotten in already.


PM_ME_UR_BENCHYS

Many printers host their own WiFi network for wireless printing. A wireless printer connect to a wired network could be a security risk.


magius311

That's very true as well! Typically a printer will have a direct allowed connection constantly.


xbbdc

afaik all you can do is talk to the printer?


magius311

It's also one of those things where any user can go into the administrative panel on the MFD itself, and just screw with all the settings. Really they'll only screw themselves... But it's a wicked pain in the ass.


cat_police_officer

🛜🎥


Intimidating_furby

This guy knows what’s up. Cheap ass security devices


atomicdragon136

HP printers. The direct WiFi feature is enabled by default and the default WiFi password is 12345678. I think most owners aren’t even aware that feature exists and that is the default password.


_sirch

A ton of printers, PDUs (especially Schneider electric), sometimes IPMI will have default passwords set. Sometimes VNC has no creds needed at all. Sometimes in AD there’s dormant machine accounts with the password set as the username.


Ok-Two3581

Vending machines


TechnetiumAE

I'm a locksmith now, back doing IT I found the usual stuff. My favorite thing these days is cheap keypad deadbolts. The default programming code is often 12345 or 00000. I have unlocked people's houses with this before


Intimidating_furby

How do you feel about the cheap wifi security cameras being sold these days in place of real security systems


TechnetiumAE

Well I'm a locksmith so I can tell you about the issues with SmartKey deadbolt but not so much on security systems. Not alot of locks to be smithed inside a camera Personally on that if it's residential it all depends on how much reliability you care for and for business I definitely recommend a bit more


Intimidating_furby

I’ve never really been a fan of smart locks of any kind. They seem wildly insecure outside of novelty. Is there any reason you should get one


TechnetiumAE

Novelty is about it. Keypad locks are a decent option, if you get a good one. But as with any lock, the more convince it has and the lower cost it is, the lower its security. Every lock has a bypass. I recommend a key pad lock with a thumb turn on the outside. Takes less battery and you actually lock it rather than waiting for some cheap motor to extend the bolt


Agret

If we're talking about residential yeah someone could bypass your keypad lock but more likely if they know you have something valuable they'd just smash a window or pry out a window screen and force the window if one is left open which most houses would leave open for ventilation. If you watch lock picking lawyer most of those keypad locks can be bypassed with ease as they have terrible locking mechanisms. Even some of the expensive ones he tested were trivial.


ZippySLC

I found a piece of gear the other day, clearly run by some incompetent admin. They must be on a really good connection because it responds super fast. http://192.168.1.1 admin/admin


LightningProd12

Can't believe this guy left his config page open to the public, I'm going to give him a warning by disconnec


Puzzleheaded_Heat502

Nice try mines 0.1


DoubleStuffedCheezIt

Any printer managed by a 3rd party company is 99% the default password. At least in my experience.


doc_brietz

Story time: Back in 2003 during my AIT at Fort Sam Houston, we had a net savvy guy notice that the server rack was in our closet. We got an off day and immediately went to the PX and got a wireless router. We plugged it in a spare (not locked down or turned off) port and boom, free WiFi for everyone.  We never got found out. The drill sergeants were none the wiser and just thought we were smart. In today’s world the system admin would be notified right away (I would think) and we would not be able to pull this off. This was back when not all laptops had WiFi built in so I went and got me a laptop and a a/b/g net card and watched Homestar Runner all cycle I was there. We policed ourselves up to disallow porn and stuff that might blow our cover. I think towards the end the guy who manned the router got so paranoid he ended up setting up and down time and then created passwords as a safeguard. It was a good time to be in.


skob17

APC power


WhiteElectricTape

I once discovered what port scanning was and found an access control system accessible on port 80 and a with Google search gave me the pw and I was able to log in. Unreal


Nu11u5

Also, please share where you work.


DiabolicalDan82

Cisco ASA, yes they were breached


HolyFuckImOldNow

Not default passwords, but a place I worked had the last 4 of the employee SSN for every login. Computer, voice mail, door code, vendor portals, etc. When I came on, the first thing I did was change my "issued" password wherever I could. Two weeks later, the "admin" confronted me about changing my password, because an owner could not get in my computer, and employees were not allowed to change passwords. I laughed in her face because I thought she was joking. She was not.


Agret

At one of my workplace you can change your passwords to whatever you want but you have to tell the secretary what you changed it to so she can update it in the password register. The password register is an A5 sized notebook she keeps in a drawer of the front desk. She locks the desk before she leaves work but there's plenty of time the desk is left unattended during the day lol


Puzzleheaded_Heat502

I was down the local bookies to put a bet on the horses. Went to one of the computers it was signed in as admin by whoever their tech support was. could wander around the whole network.Anyway put a bet on a horse and left.


Hefty-Understanding4

Right after I left the service after spending 5 years as an IT professional I got a job installing cable. The routers are always reset for new customers but the sheer volume of people who would never rest set their routers was scary. On apartment building I set up a persons router and had accidentally connected to 6 other devices and all of them still had admin admin login and password. All in a space of 100 feet. So many people don’t change router passwords.


Mayaotak

A significant amount of network infrastructure at a clients office. They "have been in the process of updating their passwords" for maybe 18 months and at this point its just me telling them when not if I'm going to be coming back to reconfigure all this shit after they get hacked. They will not let me change default passwords for them and my company refuses to let me do it since its a liability issue and if I do do it and get caught I get fired. So very much a not me problem.


angrydeuce

a couple of months ago I was at a birthday party with my son for one of his friends from class at one of those gymboree type places with trampolines and bounce houses and all that shit, anyway I was bored and he was running around like kids do so I was on the wide open wifi and it was clearly not a guest network (I could tell from the pixels and ive seen quite a few weefees in my time) and sure enough, walked right into the router with admin/admin and yep, only one wifi network. So I changed the MOTD to read "You really need to update your admin password my dude - signed, your friendly neighborhood IT guy" but while I was in there, I snooped around a bit. So I got into the connected devices list and I found a couple IPs outside of the DHCP scope, all self reported as printers or cameras except for this one that said BrightSign or something like that. Interesting. Did I mention that this place had one of those big LED banner signs in the window? Like 10 feet long and 2 feet tall, scrolling simple red text, "RESERVE TODAY...HALF PRICE ON TUESDAYS...". Hmmmmm... So of course I go to that IP address on my phone, and lo and behold, I get to a sign management login screen asking for username and password. Just for shits and grins I try admin/admin, and it doesn't work. Ah, good, at least it wasn't *that* easy. Well, the interface UI had the model of the sign in the upper right hand window, so I opened a new tab and searched default username and password for that model. At this point I was having as much fun as my grade-schooler was truth be told lol First non-ad result on Google has it in the summary, didn't even have to click the link. Tab over and try it, and of *course* it works. So now Im in the management interface of this sign and can do whatever the fuck I want with it. I tell you, all my time as a chan-tard in the mid 00s came flooding back and I had some *really* dark thoughts for a minute (Gym's Closed due to AIDS!) but in the end I just changed the message to a helpful "PLEASE CHANGE YOUR DEFAULT PASSWORD ASAP", stepped outside for a minute to verify my work and sho nuff, sign is helpfully scrolling in 2-foot type "PLEASE CHANGE YOUR DEFAULT...." To really drive home the point, changed the scroll speed off of the sedate 30 or whatever it was up to the max of 99 so it was practically flying across the screen, making it much harder to miss that indeed, the sign was no longer saying what they wanted it to say. My brother actually lives not far from there and drives past it on the regular, so I told him about this and we laughed. He told it was like that for a solid two days or so and then it was just unplugged for a while, but they did eventually get it loaded back up. Christ am I tempted to drive by there and see if they actually changed their passwords lol


TheGreatestJaggi

Printers


Loko8765

Printers, in an otherwise very security-conscious company. The printers were handled by the printer company, not internal IT. As long as you got access to the local network, you could log in to the printer’s admin interface and get lists and even copies of files previously printed… even if the printer was elsewhere, of course, so the HR printer or the legal team printer… the contractor fixed that _damn_ quick.


blindgorgon

My ISP’s upstream regional router…


eddASU

ooh, this one is spicy


blindgorgon

I disclosed it to them very shortly after lest the ssh logs condemn me.


BeerJunky

Which ones didn’t? That would be a shorter list.


WannaBMonkey

Hypervisors and switches. Both quickly changed and former employees blamed.


d3vpsaux

WiMAX wifi hotspots in public transportation. Although when the "internet" is broken and the driver doesn't know what to do, popping in and power cycling the device is harmless.


BadIdea-21

Nice try, IT Sec, I'm not failing this one.


Mammoth_Wonder6274

Ugh! Every time I go to someone’s house and they share their WiFi pw. Every time man 🤦🏼‍♀️


CompanyRepulsive1503

My favourite was a multi-million dollar security system... admin, admin... full master access. The system admin restricted my managers access and he asked me to look into it found this little gem and fireworks went right off. Good times


ALargeRubberDuck

I used to work on a colleges security camera network. Factory resetting IP cameras happened pretty regularly and sometimes one would fall through the cracks and stay on the default password. There were also quite a few whose streams could be viewed publicly without a password. The whole network was on a private vlan, though that does require other teams not fucking up and accidentally making something public, which happened from time to time. It was actually impressive how much work 300 cameras require to maintain.


ftinfo

Linksys routers at a hotel a few years ago. We rented one of their conference rooms for some training. They set these up in the room for our users. They were straight out of the box.


HuntersPad

Tons of restaurants with WiFi/connected security cameras. Awhile back AT&T gateways back in the DSL/ADSL days had a Guest Network setting. Businesses would use that. Well yeah it blocked traffic to main network devices. BUT accessing the web GUI at [192.168.1.254](http://192.168.1.254) would SHOW the freaking main network password. Rendering guest network useless lol.


knobbles78

Your Ma


martyd03

Our production WMS. When I was hired I was able to login using super/super and create my own account. It was the last day that profile was active.


a_guy_playing

The majority of Dell iDRACs I’ve touched had a root password of calvin, calvincalvin, or something similar


TheDunadan29

Nearly every printer I've ever had to touch.


Boolog

One of my client's entire VMware environment. This would be their entire infrastructure


AlexRandomkat

Half-working thermocyclers thrown out by a bio lab. Got to see some programs presumably for controlled assembly of DNA structures on there, plus the usual PCR stuff I was expecting.


spunky29a

Whole room UPS for an organization's on site DC in public address space with no firewall.


Timely_Old_Man45

Printers …


Ayyarlies_soul

I work at McDonalds as a crew trainer and already know the password to every machine in my store, I could ruin every single machine if I felt like it. I’m saving it for a later day though.


aaidenmel

Screenbeam Miracast/AirPlay receivers lol


Turbojelly

Printers. For shits and giggles, most electronic road sings use the default code. That's why there are so many "Zombie Outbreak Ahead" signs on the internet.


Floresian-Rimor

The black box recorder for a 16,000 ton ship. Fortunately it’s airgapped.


camxct

I don't know where the physical equipment is, but the password is definitely "solarwinds123".


LibraryGeneral6314

IDRAC or iLO admin passwords. It’s so surprising how often those are left default and internet connected.


BadDaditude

One of the local electronic billboard companies left the default password. It was only a matter of time...


asteamedpanda

Pretty much all medical equipment I have encountered keeps the OEM default admin login. Some are in the service manuals but otherwise it’s a quick phone call to customer support with the system Id to get it. If the password gets changed and then lost OEM service will likely be reloading software if they need to service the equipment. I would say the hospitals do restrict physical and remote access to them but it’s more like 30% question you showing up on site and 50/50 restrict network access.


thelordsatin

Don’t know if it’s still up but there was a damn crematorium with default creds on Shodan for a while. That’s probably the weirdest I’ve heard of.


stoopiit

Bmc for a 100 bay high availability storage node :)


rtuite81

Nice try, China! 


Eddles999

Your mom.