I had to get that database fast.
After a long security team meeting, garnished with lots of pepperoni and green olive pizza, we divided the staff into 2 teams. Team A started scanning and probing the target department’s servers in search of vulnerabilities that would provide us with admin access over the network.
Team B started planning a physical intrusion in case Team A failed.
After a couple hours, I was notified that the vulnerability team came up short. None of the identified vulnerabilities could be used to escalate our permissions.
A member of the physical intrusion team called maintenance and requested help from a specific maintenance guy: Zeke. The security team member said that we “needed Zeke’s help locating an electrical breaker panel” in a certain department.
This is the fourth post in a series. See Behind Locked Doors: Part 3. The next post will be the conclusion.
Continue reading →
Like this:
Like Loading...
Filed under Audit, Case Files, fraud, Security, Technology
Tagged as database, guard, Leeda, SALY, Security, steal, wastebasket, Zeke
My Blog Comment Deleted!
I left what I considered a thoughtful comment on another security blog, but my comment was deleted. Denied. Ignored.
Read about what happened in Creating a Culture of Security and my thoughts about it, which I added at the end of that post.
Ever had a similar experience? Think I got carried away? Afraid to leave a comment of your own? Let me know about it here.
Leave a Comment
Share this:
Like this:
7 Comments
Filed under Security
Tagged as blog, comment, culture, deleted, Security