Probably because it’s going to be something boring, like social engineering to get credentials, maybe a disgruntled employee or idiotic security configuration.
Security isn’t really glamorous. Generally, you can just ask someone for their password and they will tell you. This takes a little bit of flair if you are blindly calling a company, but it can still work.
More often than not, people will just leave a server exposed on the Internet that has bad credentials. AWS makes this really easy to do with EC2, as an example.
Exotic attacks still happen though. Given that this is an just IPTV service show schedule, my first guess would be a blind SQL injection. That is not really “exotic”. though.
@remotelove@dependencyinjection
Agreed. Such things are usually keeping in a kind of sandbox, so even if you access this list, you cannot go further. From the other hand, properly configuring security on this level usually skipped due to luck of time/money/wishes.
Nobody interested in how they were hacked huh?
Everybody be like, yoo a translator. Like y’all never seen one before.
Probably because it’s going to be something boring, like social engineering to get credentials, maybe a disgruntled employee or idiotic security configuration.
Boring is subjective. I’m always intrigued by how people gain access.
Although, I am aware of many of the techniques used I find it fascinating.
Darknet diaries is a great podcast for these kinds of things.
Security isn’t really glamorous. Generally, you can just ask someone for their password and they will tell you. This takes a little bit of flair if you are blindly calling a company, but it can still work.
More often than not, people will just leave a server exposed on the Internet that has bad credentials. AWS makes this really easy to do with EC2, as an example.
Exotic attacks still happen though. Given that this is an just IPTV service show schedule, my first guess would be a blind SQL injection. That is not really “exotic”. though.
@remotelove @dependencyinjection
Agreed. Such things are usually keeping in a kind of sandbox, so even if you access this list, you cannot go further. From the other hand, properly configuring security on this level usually skipped due to luck of time/money/wishes.
I’m more interested in how long this is going on. A few minutes? An hour? A day?