Tinker ☀️ on Nostr: Oh noo.... Did someone forget to change the default credentials on your multifunction ...
Oh noo....
Did someone forget to change the default credentials on your multifunction printer?!?!?!
Ohhhh nooooo.....
Did someone set up the printer to do email address lookups on active directory?
Hmmm????
Are there stored Domain user service account credentials on this here printer????
Hmmmm???
Well..... since I AMMMMMM administrator on the printer because I looked up the default credentials on the public internet.....
Maybe you wouldn't mind if I changed the IP Address to point from the Domain Controller... to ME!!!!
Hahahaha!!!!
I'm the Domain Controller... I swear.... I even have port 389 open on my hack box... err... Domain Controller. LDAP. Like you like!
And you should do a little... mmm.... "Test Connection".... just to see if you can connect.
Oh what's that?! Your user name is is "PrinterServiceAccount" and your password is "Pr1nt3r$3cr3tP@$$w0rd"
Oh, I'm sorry. You have the wrong place buddy. Why don't you run along....
....while I connect to Active Directory with your username and password....
😈😈😈
#hacking #infosec
Published at
2024-05-20 18:48:12Event JSON
{
"id": "176e3ccd21029d161c8fc939088682755f066642283a76fbc58b1fc437a6c97f",
"pubkey": "b832cfc8b7c5ac07ae2f27717f806fd07093f599638aca5cfd1e7363444a252b",
"created_at": 1716230892,
"kind": 1,
"tags": [
[
"t",
"hacking"
],
[
"t",
"infosec"
],
[
"proxy",
"https://infosec.exchange/@tinker/112474907773606932",
"web"
],
[
"proxy",
"https://infosec.exchange/users/tinker/statuses/112474907773606932",
"activitypub"
],
[
"L",
"pink.momostr"
],
[
"l",
"pink.momostr.activitypub:https://infosec.exchange/users/tinker/statuses/112474907773606932",
"pink.momostr"
]
],
"content": "Oh noo....\n\nDid someone forget to change the default credentials on your multifunction printer?!?!?!\n\nOhhhh nooooo.....\n\nDid someone set up the printer to do email address lookups on active directory?\n\nHmmm????\n\nAre there stored Domain user service account credentials on this here printer????\n\nHmmmm???\n\nWell..... since I AMMMMMM administrator on the printer because I looked up the default credentials on the public internet.....\n\nMaybe you wouldn't mind if I changed the IP Address to point from the Domain Controller... to ME!!!!\n\nHahahaha!!!!\n\nI'm the Domain Controller... I swear.... I even have port 389 open on my hack box... err... Domain Controller. LDAP. Like you like!\n\nAnd you should do a little... mmm.... \"Test Connection\".... just to see if you can connect.\n\nOh what's that?! Your user name is is \"PrinterServiceAccount\" and your password is \"Pr1nt3r$3cr3tP@$$w0rd\"\n\nOh, I'm sorry. You have the wrong place buddy. Why don't you run along....\n\n....while I connect to Active Directory with your username and password....\n\n😈😈😈 \n\n#hacking #infosec",
"sig": "ff82f9e999fab56fe98454086f7351f8462d03192fbeeaab1c8917da860f52e6d8541f565eedd2f8c5b7e4119467bba4aebf208bb254f858b8d2d511a381eb97"
}