Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
Security News

Convicted VoIP Hacker Robert Moore Speaks 183

An anonymous reader writes "Convicted hacker Robert Moore, who will report to federal prison this week, gives his version of 'How I Did It' to InformationWeek. Breaking into 15 telecom companies and hundreds of corporations was so easy because most routers are configured with default passwords. "It's so easy a caveman can do it," Moore said. He scanned more than 6 million computers just between June and October of 2005, running 6 million scans on AT&T's network alone. 'You would not believe the number of routers that had "admin" or "Cisco0" as passwords on them,' Moore said. 'We could get full access to a Cisco box with enabled access so you can do whatever you want to the box. We also targeted Mera, a Web-based switch. It turns any computer basically into a switch so you could do the calls through it. We found the default password for it. We would take that and I'd write a scanner for Mera boxes and we'd run the password against it to try to log in, and basically we could get in almost every time. Then we'd have all sorts of information, basically the whole database, right at our fingertips.'"
This discussion has been archived. No new comments can be posted.

Convicted VoIP Hacker Robert Moore Speaks

Comments Filter:
  • by camperdave ( 969942 ) on Wednesday September 26, 2007 @05:38PM (#20761525) Journal
    It's so easy a caveman can do it

    So, not only do cavemen work in video production, they do network admin?
  • by Stormwatch ( 703920 ) <(rodrigogirao) (at) (hotmail.com)> on Wednesday September 26, 2007 @05:41PM (#20761565) Homepage
    "So the combination is one, two, three, four, five? That's the stupidest combination I've ever heard in my life! The kind of thing an idiot would have on his luggage!"
  • Well (Score:5, Insightful)

    by El Lobo ( 994537 ) on Wednesday September 26, 2007 @05:42PM (#20761577)
    Once again, the weakest link in security is often NOT the software (which could also have problems). The weakest link is often the user: leaving the default password of a router, not activating encryption for wireless networks, using the same ID and password.... And , no, don't try to educate the masses. I have tries as an administrator of a large network. They never learn. Or they learn and the next day, they change their password to "qwerty" back again.
    • Re:Well (Score:4, Informative)

      by Joe The Dragon ( 967727 ) on Wednesday September 26, 2007 @05:48PM (#20761641)
      In XP the default blank password does not let you do remote logins so it is some times more gives you more security.
    • Re:Well (Score:5, Insightful)

      by Timmmm ( 636430 ) on Wednesday September 26, 2007 @06:12PM (#20761861)
      It *is* a problem with the software. The software is designed for use by *people*. People who may not remember to change the default password.

      Easy solution - disable the product until the password is changed and intercept http connections so you can give people a helpful page saying "The default password is 'password'. This must be changed before this router/switch can be used. Click [here] to do so."

      I fail to see any flaws with this solution. Also read 'The Design of Everyday Things'.
      • ***I fail to see any flaws with this solution. Also read 'The Design of Everyday Things'.***

        I suppose that you probably don't. So let me help you out. The first problem you are going to encounter is that something like 15-20% of the customers are goijng to take an utterly irrational "It's MY router. How about you clowns let ME determine how to configure it?" attitude The second is that quite possibly a small percentage of them will actually need to run with default passwords. You can't imagine why.

        • Re:Well (Score:4, Insightful)

          by nuzak ( 959558 ) on Wednesday September 26, 2007 @07:04PM (#20762259) Journal
          It won't feel like you're shoving policy down their throats if you don't have a default password at all, but make it so that it won't function until you complete the setup, which involves setting a password.

          Considering that you get folks like SAC who set the PAL codes for all their nukes to 00000, yeah there will always be people that bypass it. But at least won't be because nobody touched it at all -- someone had to run the setup. And when users get cranky and bypass it, then it's now 100% their problem. Especially when the SOX auditors come knocking.

          • Well, to be fair it wasn't as if the permissive-action links were set to zero because that was the manufacturer's default that nobody bothered to change ... they were all deliberately set to the same code to (so the story goes) to improve response time during a conflict. Also, unlike Joe Neighbor's WAP, they had other safeguards.

            Plus which I get a sense that the military didn't really trust the things anyway.

            The problem with consumer-level equipment is that vendors are terrified that good ol' Joe User
          • I've definately seen people whose opinion on passwords is, "Hey, it's my equipment, why should I ever have to enter a password?"
          • The Payment Card Industry (PCI) standards require you to change default passwords in the part of your network that handles credit card data.
          • ***Considering that you get folks like SAC who set the PAL codes for all their nukes to 00000***

            Got a reference on that? The only relevant things I can find on Google are your post and an article in German that credits the story to USA Today which is not my idea of a really reliable news source. Searching the USA Today archives for "pal code" and "pal codes" gets no relevant hits.

            I am pretty skeptical that actually happened with a live, deployed nuclear weapon. The reason is that before a nuclear sys

      • by dgatwood ( 11270 )

        Presumably these devices don't route packets, handle VoIP calls, etc. until you've at least put in basic network settings anyway. Seems like all you really need to do is make the device ask you to set an initial password as the very first step in the setup process.... It isn't rocket science. It's like when you get a UNIX account on some university box. They set an initial password based on your student ID/name/whatever. and the very first thing is a prompt that requires you to set a real password....

        • IME scanning local subnets around me (hey, I get bored) the only routers I have never seen using the default password are Belkins, presumably because one of the first requirements in the 'setup' software (IIRC) is to set the admin password.
    • by grumbel ( 592662 )
      No matter how much you educate, the user is the one piece in the equation that you can't 'fix', at least not on a large scale, which is why software and hardware *must be* designed in such a way that it works in a secure way even with a 'broken' user. The default password thing is easily fixed: don't set the same default one for each device, instead use a random one or none at all if possible (i.e. disable remote login). You don't want users to use 'qwerty' password, so use a function to check that the user
    • Re: (Score:3, Interesting)

      by mcrbids ( 148650 )
      The weakest link is often the user: leaving the default password of a router,

      Are you sure it's the user?

      So, let me ask you this - why is the default password on routers all the same? Why isn't it different for each unit, and imprinted on the box or something? Such a trivial thing to do, yet it would do so, so much for improving security, and would have a trivial effect on usability.

      Routers are security devices. Other security devices (such as bike locks) have the default being rather secure, why can't route
      • "Routers are security devices. Other security devices (such as bike locks) have the default being rather secure, why can't routers?"

        I've seen bike locks where the default is the same for all new, same model locks and I'm not sure I've ever seen a briefcase where the default wasn't 000 000. I think many people never change their briefcase combination but everyone changes their bike lock combination if it is a default of 0000 or 1234. I'd say the difference is that a briefcase is rarely left unattended or l
        • If the average TSA employee can't open your briefcase lock with a paper clip, they'll destroy it and leave you a condescending brochure.
    • Re: (Score:2, Insightful)

      Of course you can't stop people from being stupid, but you can design around their stupidity. Why have a password at all if its default? Better to have no password and block remote access until one is set, which is basically what mysql had to do for similiar reasons. What is funny is this is just a new version of old school. Anyone else remember war dialing?

      "Those who cannot learn from history are doomed to repeat it."

      Here's my analogy. What if every lock manufacture sold you house locks with the same
  • by User 956 ( 568564 ) on Wednesday September 26, 2007 @05:42PM (#20761581) Homepage
    Convicted hacker Robert Moore, who will report to federal prison this week

    Apparently Moore's law isn't quite up to snuff.
  • Random passwords (Score:4, Interesting)

    by MobyDisk ( 75490 ) on Wednesday September 26, 2007 @05:47PM (#20761623) Homepage
    It doesn't seem too hard to ship the routers with random passwords. Is it just cheaper to not bother? Just thinking here...
    - They must run a test suite before shipping them so it should be easy to make that tool generate a random password and assign it to the router
    - You would have to print it on the router, or on a slip of paper
    - If it is printed on the router itself then you could make the router's reset button go back to that password, instead of Cisco0.

    Even if you don't implement that last bullet, it still seems like it would help a lot.
    • Re: (Score:3, Insightful)

      This moves the burden to the hardware manufacturer. What if this was the case, and network administrators (even good ones) the world over immediately assumed that everything they purchased out of the box was secure - right before a provider had a disgruntled employee upload the default password list for thousands/millions of routers to the internets? ... although that is just the FUD part of my brain talking. I actually like this idea.
      • by grumbel ( 592662 )
        If you argue that way you can never feel safe, since who says that there isn't a hidden backdoor in your otherwise secured router?
    • Re: (Score:3, Insightful)

      by chill ( 34294 )
      They must run a test suite before shipping them...

      No, they mustn't. Frequently, if your production QA is good you don't do 100% testing before shipping. Random sampling is usually good enough and significantly cheaper. I can't speak to any specific router manufacturer, but this is SOP in manufacturing.
      • Re: (Score:3, Interesting)

        by John_Sauter ( 595980 )

        Every device with an Ethernet interface has a 48-bit unique identifier built in. All such devices, in my experience, also have a sticker that displays their Ethernet address. Would it be so difficult to include, at manufacturing time, a small ROM that contained an initial password, unique to each device, and also displayed on a sticker? The additional cost of such a feature needs to be weighed against the additional security provided, but I think in some markets it would be a definite win.

        The manufactu

        • by chill ( 34294 )
          Keep in mind, the first half of that 48-bits isn't unique, it identifies the vendor. And they really aren't globally unique, but I'm not sure they have to be.

          Either way, this is going about it the long way. The simple solution is to make it so you have to change the default password the first time you config the device. Feel free to leave it "admin" from the factory, as long as it can't be "admin" after it gets configured.
        • Technically what you'd do is ship it with no password and have the behavior for handling a null password be generate one based on the MAC address, saving you from having to modify every single ROM you make.

          Then just need to use the same formula to generate the stickers, which might be a bit harder.

          I'd rather just see them take the approach common wireless routers use-- Hold a button down to auth your device to it. Make this the only way to login initially or reset the pass.

          • Technically what you'd do is ship it with no password and have the behavior for handling a null password be generate one based on the MAC address, saving you from having to modify every single ROM you make.

            The problem with using the MAC address to generate the default password is that it is easy to determine the MAC address from the outside, and therefore the default password.

    • Re: (Score:2, Interesting)

      by steelshadow ( 586869 )
      I just received a modem/router from Verizon for DSL access and they had wireless access preset to a "random" SSID and WEP key which was printed on the modem. Of course, they then went and had the administration account be admin/password.
      • by Solra Bizna ( 716281 ) on Wednesday September 26, 2007 @06:16PM (#20761897) Homepage Journal

        I just received a modem/router from Verizon for DSL access and they had wireless access preset to a "random" SSID and WEP key which was printed on the modem. Of course, they then went and had the administration account be admin/password.

        That's actually not so bad. In order to get on the wireless network to use the admin password in the first place, they would need to guess your SSID and WEP key. And everyone knows that's impossible, right?

        -:sigma.SB

        • Pretty sure any quality wireless router won't actually let you do wireless administration of the device. I know the Linksys box I have sitting on my desk requires you do be physically plugged in if you want to do any administration.
          • Pretty sure any quality wireless router won't actually let you do wireless administration of the device. I know the Linksys box I have sitting on my desk requires you do be physically plugged in if you want to do any administration.
            that's usually a flag you can set. my router (linksys) is setup so that you can do wireless administration of the device.
          • Pretty sure any quality wireless router won't actually let you do wireless administration of the device.

            It is an option, but it is turned off by default. I actually turned it on for my WRT54G (running Thibor) so that I could access the admin pages from my laptop. However, since I am also using AES [wikipedia.org], HTTPS, MAC whitelist filtering, and strong (not default) admin password the extra risk is very minimal.
            • I used to think that MAC whitelisting was a useful contribution, from a security viewpoint, except that I think that MACs can be sniffed using netstumbler or the like, so it wouldn't be too difficult to short-list the MAC addresses that connect to your router. MAC address spoofing isn't impossible either.

              That leaves you with your WPA-PSK (presumably) and AES encryption as your security measures. Not that these are insignificant hurdles though.
              • MAC address spoofing isn't impossible either.

                In fact it is quite possible, I do it on my laptop. One of the first things that I did when I configured my XP laptop was override the default MAC address on the wireless card to a different address (random) of my choosing to futher enhance my security and privacy when I connect to public WiFi networks (in the unlikely event that somebody, for whatever reason, would attempt to trace back that MAC address to the laptop and wireless card manufacturer who issued
      • I can't believe they're still selling equipment that is not preconfigured to use WPA1/2 security.

        But maybe it's a peculiarity of the German DSL market that AVM (www.avm.de/en) is now the market leader. And they DO provide their Fritz!Box series with preconfigured, random WPA2 keys and an 802.11g USB dongle that syncs the key when it's sticked into the Fritz!Box USB port.

        Heck, I tried to find some "free" access in my mother's apartment. ALL her neighbours had some flavour of the Fritz!Box running, ALL were

    • On Cisco wireless access points, the radio is disabled by default until you've either set a WEP key, or manually enabled the radio with no key set. It's not a great leap to make "commodity" routers that don't route until they've been given a new password.
    • It doesn't seem too hard to ship the routers with random passwords. Is it just cheaper to not bother? Just thinking here...

      Well they do it for $2 padlocks...
    • Simple solution for ALL hardware: Default password requires you to have a local connection, or anything besides changing the password cannot be done using the default password. Using EITHER of these rules solves the default password problem. Anything that connects to a network should have one of these rules as part of the firmware. After all, it is common knowledge that around 80% of all hardware devices that contain a default password will never have it changed. Get your hands on a manual for the devic
    • It would have to imprinted upon the router in such a way that the password could not be easily rubbed off or otherwise made illegible. It would also add more cost than you might think to manufacturing of the router. It would probably be better to place a temporary sticker on the router with the default password printed on it and something along the lines of, "name of company strongly recommends that you change the admin password to something other than the default after configuring this router"
    • How difficult would it be to make the default something like the unit's serial number, then have the code require a change before even enabling network interfaces?
    • What about this: Upon first boot and after a reset, it won't open a connection to the outside world but instead lead you to a homepage on its internal server asking you to change the password. Shouldn't be too hard, and is still relatively user-friendly.
  • by Anonymous Coward
    Maybe not a lot, but more than most of the media's super-hyped so-called "hackers" ever do.

    A few years ago a major New Zealand ISP was "hacked" -- or so the media said. The biggest talkshow host of the time interviewed the alleged "h4x0r" live, and proclaimed him to be a "computer genius". We were all in deadly and imminent danger of being hacked by guys like him he said.

    The "hacker" in question was a 13 year old whose friend's older brother worked for the ISP. The older brother had stupidly given his staff
  • Ridiculous! (Score:3, Funny)

    by cromar ( 1103585 ) on Wednesday September 26, 2007 @05:50PM (#20761659)
    You would not believe the number of routers that had "admin" or "Cisco0" as passwords on them...

    That's ridiculous. Everyone knows the most commonly used passwords are "love," "secret," and "sex." Oh and don't forget "God." It's that whole male ego thing.
    • Re: (Score:2, Funny)

      by wilymage ( 934907 )
      It's got a 28.8 bps modem!
      • Hey, be careful what you say, I might get offended, take time off from battling 'the plague' and then you would have to crash override!

        (see username)

        And yes, it is sad that I have watched that movie enough times to know the 'hackers' handles
        • Mess with the best, die like the rest!

          "Pool on the roof. Sprung a leak."

          "And yes, Mom, I'm still a virgin!"

          "Crash 'N Burn"

          eof.

  • by Anonymous Coward
    this guy should be congratulated for uncovering such slack security.



    imagine what havoc he could have made if he had been malicious, or had sold the passwords to Osama....

    • by Ungrounded Lightning ( 62228 ) on Wednesday September 26, 2007 @07:06PM (#20762291) Journal
      this guy should be congratulated for uncovering such slack security.

      If he told the owner about the insecurity and didn't exploit it himself, yes.

      imagine what havoc he could have made if he had been malicious, or had sold the passwords to Osama....

      Or if he kept it quiet and exploited it himself - stealing services and running up bills for the victimized system owners, building a business on it and pocketing money for himself and his co-conspirators.

      Wait... That's what he did, isn't it?

      No, he should not be congratulated. He should be convicted and punished as the thief he is.

      Wait... That's what happened, isn't it?

      Isn't it nice
    • ...doesn't mean it is OK to walk right in and check out what's in the fridge (unless of course it is your home). If the damage was minimal or nonexistent then the punishment should fit the crime of course, but it IS still illegal.

      On the other hand, why hasn't anyone thought of launching suit against the VOIP providers over the security breach? Tort law in the good ol' US of A is the most stringent in the world when it comes to "duty of care". Leaving passwords at factory defaults certainly could constitu
  • The problem in most of these cases is a user with little to no experience in network setup, and who also avoids reading directions, will almost always just "plug it in and go". Most routers that I've used come with a default password that is the same for all similar products that the company makes.

    Instead of having a default password, why not have pre-generated passwords that are decently strong that are already on the router when you get the device, and have a sticker on the router with that password. Th
    • Come on, most already have stickers for the MAC address.

      And the managers will say, "Yeah. We have the MAC address on there already. We can use that for the default password."
    • HP does this on their servers with ILO. The ILO password is a variation of the host name and random alphanumeric characters. Sadly, they don't do this with their procurve line of switches.
      • by AJWM ( 19027 )
        The ILO password is a variation of the host name and random alphanumeric characters.

        That's pretty hard considering the host name isn't assigned until the OS is installed. ;-) It's usually the host serial number plus some alphanumerics, but either way it's unique and is printed on a (removable) tag attached to the server.
    • Better yet: Why not have a unique default password that's printed on the device, or a function of a unique number that's printed on the device and NOT accessible from the network?

      That way the bad guy would need physical access to the particular box to read that label to get what he needs to construct the default password. (Since it's a default password the "view the label" hole could be instantly plugged just by changing it.)

      (Not from the MAC address, of course, nor the serial number if that's available i
  • Damn... (Score:4, Funny)

    by Cornflake917 ( 515940 ) on Wednesday September 26, 2007 @06:02PM (#20761763) Homepage
    That caveman from the Geico commercials was just starting to make progress with his therapist. Let's hope the poor guy doesn't stumble upon this article. This hacker might get a few unexpected prison visits from whiny cavemen.
  • on the systems that I manage, no Web/telnet/ssh admin ports get opened to the outside world. If you want in, you'd better have a valid VPN key as well as a password, and VPN logs get checked regularly to prevent abuse. Good defence is multilayered.

    -b.

  • Whoever they is. Somebody, please ban default passwords.
  • by SplatMan_DK ( 1035528 ) * on Wednesday September 26, 2007 @06:09PM (#20761841) Homepage Journal
    Mjeah.

    So easy a caveman could do it.

    But apparently not so easy a caveman could avoid getting caught?

    What ever happened to the supercool hacking-thang called "not getting caught"?

    - Jesper
    • Re: (Score:1, Interesting)

      by Anonymous Coward
      What ever happened to the supercool hacking-thang called "not getting caught"?

      Oh like that'll get you a book deal and job in the computer security field.

      If you don't get caught you'll never even merit an article on /.
      • So what you are saying is ...

        1.) Hack stuff using script-kiddie techniques
        2.) Keep at it until you are caught
        3.) Tell everyone the story about you being an idiot who got caught
        4.) Do a month of jailtime
        5.) $$$!

        Is that the kind of people who programmed my personal firewall and my anti virus app.?

        (Pleeeease, say "no", pleeeease, pretty-please)

        - Jesper
    • by lawpoop ( 604919 ) on Wednesday September 26, 2007 @07:23PM (#20762381) Homepage Journal

      What ever happened to the supercool hacking-thang called "not getting caught"?
      I'm sure it happens all the time; it just never makes the news...

      It could even be happening right now...
    • Well, that is the whole problem - the *real* hackers don't get caught, it is only the bozos that get caught.
  • Isn't a hacker usually considered someone who finds a clever way into a system or does "scanning for default passwords" pass as a hack nowadays..

    this sounds kinda like "hacking" into your neighbors open wireless network.

    He's no hacker, just a nuisance and a thief. This guy deserves jail time.

    • Re: (Score:3, Funny)

      I believe he more or less falls into the category of a "researcher". You probably could write a master's thesis on the password data/statistics alone!
  • by rgaginol ( 950787 ) on Wednesday September 26, 2007 @07:01PM (#20762241)
    Having these flaws present in a secure system, even for small companies is almost bordering on negligence. It takes 20 seconds to change a password, and god forbid if you've got too many to remember, write it down somewhere and store it in the company safe.

    The REAL problem I see with IT is a combination of inept administrators and an abundance of managers who don't understand the significance of things like this. A mistake like this not only represents a failure of an IT worker, but poor oversight by their manager. I've seen an administrator hired who had no technical competence but was able to talk to the managers about cricket. He was then replaced with a person who was even worse when the first dumb admin did the IT thing and left after making a huge mess. And yeah, a year after I'd left, the second administrator, after purchasing a new Cisco router with zero scoping calls me up and asks, "How do I install a Cisco router".

    There are books out there like "The practice of system and network administration", they help new administrators immeasurably, but so many just don't give a damn. There needs to be more incentive to have serious consequences for sloppy work. If we're ever going to be taken seriously, we need to find and flog administrators who set up a production router/firewall with a default password.
    • by Anonymous Coward on Wednesday September 26, 2007 @09:26PM (#20763197)
      None. Imagine you have 80,000 switches, routers and other network devices. Some are 15 years old. Some are older and don't allow the password to be changed at all. You have hundreds of network admin folks spread all over the world.

      Now imagine that you want to change the passwords. You can't bring the network down or impact any current work. Networks of this size are constantly being modified. New devices added, routes being updated/refreshed. Redundancy deployed or a failure causing it to be exercised.

      AND you are a business - the people making decisions don't know anything about security - the only question is "what will all this work do to make more money?" Nothing? Then don't do it.

      Tracking 80,000 passwords isn't easy. During emergencies - your phone won't ring - your mother with a pace maker needs 911, not having access to the password in a switch that needs to be reconfigured manually isn't a good excuse.

      Ok, 1 of those hundreds of people leave the company. Do you change all the passwords ... again? Next week or the week after, someone else leaves/retires. Change again? Routers don't have per user accounts, do they?

      I've never seen a switch or router guy that wasn't overworked. Just like security folks.

      Anyway, just a few thoughts. It is never as simple as it seems.

      BTW, I worked at the big telecom company that wasn't hacked. I've since moved to a different telecom that is constantly being hacked and in the news for it. Until a few months ago, they had laughable security standards that seemed left over from 1990 to me and a flat network. Simply stupid, but being secure is a huge undertaking that isn't just network security, as you know. Only security failures get Executive attention, sadly.
  • " Alan Paller, director of research at the SANS Institute, says it's not the companies' fault. He even says it's not IT's fault. The problem, he says, lies with the vendors."

    I don't think so Alan. The means is there for an able bodied person to setup appropriate credentials within a few minutes. Most of these stupid logins are web based anyway. You click "Admin" and then "Change Password" and things are a lot better than they were a couple minutes ago. The biggest problem is unskilled technical people in po
  • liability? (Score:2, Insightful)

    by jShort ( 1140435 )
    I'm not a hacker, an IT guy or a lawyer of any sort, but after RTFA, I have a question: Why isn't there some provision under which concerned invididuals can go after lax companies regarding their security? I mean, yes they were 'hacked', but aparenly only becase their IT people were not to be bothered by securing the companies' data. It seems silly to spend time and money going after the hacker, and then letting all the guys who actually compromised the data off the hook.
  • by Anonymous Coward
    ...after playing James Bond in all those movies.
  • hacking?? (Score:2, Funny)

    by Anonymous Coward
    This isn't hacking, this guy isn't a hacker.

    Are we supposed to be impressed by his elite port scanning abilities?
  • by kilodelta ( 843627 ) on Wednesday September 26, 2007 @10:39PM (#20763715) Homepage
    When you setup any new networking gear what is the very first thing you do? I can tell you what mine is, I change usernames and passwords. I even use strong passwords just in case.

    Nice to know telecom companies don't have a clue.
  • why? (Score:2, Interesting)

    why is he going to prison? why don't make him like a password administrator or something where he finds all the default passwords( seems like he had the time back then) and ask those owners to change them? and of course got paid for that. like that what's-his-name guy in the 'catch me if you can' movie..
  • To all the computer user all around the world who are still using the "weak" password, here are some tips from my computer security lecturer Mr. Uwe Heinz Rudi Dippel,

    "Make it a combination of capital letters, small letters, numbers and special character but PLEASE remember it! Or I'll fine you $5!! "

    Here you can find some tips on how to create a strong password. http://www.watchingthenet.com/how-to-create-strong-passwordsand-remember-them.html [watchingthenet.com]
  • Even if we try to do the RIGHT thing, we end up punished and bashed for 'doing wrong stuff', when you're dealing with a bunch of joe averages [specially one being your boss], sometimes it's better just watch it crash down and burn than to try to fix/warn the bosses about a potential security breach.

    i used to work as a cybercafe admin in a hotel [ClubMed(R)] and someday, when i was messing with the routers telnet interface, i decided to do a quick check on the pdf manual i had about it and look for the defau
  • The approach to this is all wrong. Instead of sending this guy to jail, more of these "caveman hacks" should be encouraged so that corporate gets off their lazy bums and do the mind-numbing simple steps to add a modicum of security to their networks -- like changing out the default passwords already! I am amazed that I am still seeing stories like this 20 years later. Hello! Is anyone paying attention?

    On the other hand, e-commerce system are extremely vulnerable if security is this lackluster. I am not su

  • ...and who is to blame?

    I would prefer to blame the device manufacturers that allows the use of easy passwords in the wild. It is so outdated by now and any sensitive devices should have a protection that is better than only using a password to protect them. Using a certificate solution (smartcard or similar [aladdin.com]) together with SSH will make things a lot harder for any intruders.

The truth of a proposition has nothing to do with its credibility. And vice versa.

Working...