• @[email protected]
        link
        fedilink
        177 months ago

        That’s still true, I was explaining this at work to the sysadmin that they should be careful and they said our email addresses couldn’t be spoofed, so I demonstrated it with his address. Spooked him a bit.

    • scops
      link
      fedilink
      English
      567 months ago

      Leader: “Alright, while he’s working on breaking into their system, we’ll–”

      Hacker: “I’m in.”

      Leader: “That fast? Did you find some zero-day to exploit?”

      Hacker who just tried username “admin”, password “password”: “Yyyyeeeeeees?”

      • Uriel238 [all pronouns]
        link
        fedilink
        26
        edit-2
        7 months ago

        To this day, database hacks (top 1000 most popular passwords) and reverse hacks (a few popular passwords on a few thousand accounts) still often result in successful penetrations.

        The weakest security link is between chair and keyboard.

    • @KISSmyOSFeddit
      link
      477 months ago

      Until your mom grounded you for hogging the phone line.

    • @[email protected]
      link
      fedilink
      177 months ago

      It was fun, indeed. People knew so little about the implications and possibilities of connecting two systems, that even if you didn’t hack anything worthwhile, it was easy to feel like a genius simply by war-dialing into another local nerd’s own Commodore 64.

    • @frankgrimeszz
      link
      English
      87 months ago

      The door was basically left wide open. You could do whatever you wanted with ease.