I was told to steal a register from one of our stores.... They held the
door and thanked me as I walked out with the register unauthenticated.

Forgotten

On Tuesday, January 14, 2014, Tim Krabec <[email protected]> wrote:
> You could look at a way of tagging laptops as stolen to show how "easy"
it is to steal them
> then use a similar approach to Robin
> Tim Krabec
> tkrabec.com
> Bio
>
>
> On Wed, Jan 8, 2014 at 7:12 PM, Robin Wood <[email protected]> wrote:
>>
>>
>>
>> On 8 January 2014 23:45, Jamil Ben Alluch <[email protected]> wrote:
>>>
>>> Hello,
>>> I was working on a mental exercise to see how far a pen test could be
taken, and came up with this question for which I'd like to have some input
from those who have done it or would never do it and why (any specific case
that could be shared).
>>> Has it ever come in your scope/rules of engagement the concept of
stealing a corporate laptop/device from a given employee given the
possibility (with the organization's blessing of course) and use that to
leverage access say to a VPN, admin panels, etc?
>>> The concept itself seems to be at the very edge of legality, but I was
wondering if this is something that has been attempted and successfully
bore fruit.
>>> The given scenario I was thinking was about people who work out of the
office but still have access to critical systems/data within the
organization and become careless with their devices outside of the work
place (starbucks, restaurant, airport, bus station, etc..) - It's not hard
to imagine somebody snatching or borrowing the device in order to gain
access to a deeper level.
>>
>> I've never stolen one but I've been given a corporate iPad and told to
see how far I could get. I guessed the PIN, found stored VPN creds,
connected, exploited the Citrix environment, pivoted and exploited more and
ended up as domain admin.
>>
>> It is really fun exercise having to go through so many different
technologies.
>>
>> Robin
>>
>>>
>>> Anyways, food for thought.
>>> Best Regards,
>>> --
>>> Jamil Ben Alluch, B.Ing., GCIH
>>> [email protected]
>>> +1-819-923-3012
>>> ᐧ
>>> _______________________________________________
>>> gpwn-list mailing list
>>> [email protected]
>>> https://lists.sans.org/mailman/listinfo/gpwn-list
>>>
>>
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to