12 votes

From stolen laptop to inside the company network

3 comments

  1. joplin
    Link
    This was pretty cool! Also, it was interesting to see that there are companies out there that take this stuff seriously and had their PC configured reasonably for actual security. Without access...

    This was pretty cool! Also, it was interesting to see that there are companies out there that take this stuff seriously and had their PC configured reasonably for actual security. Without access to the hardware, it seems like this would have been more difficult (although they may have ended up going with social hacking in that case, which is always a weak link).

    3 votes
  2. riQQ
    Link
    This blog describes an IT attack on a company network from just a stolen laptop (blackbox).

    This blog describes an IT attack on a company network from just a stolen laptop (blackbox).

    2 votes
  3. AresUII
    Link
    read: backdoored

    Lenovo

    read: backdoored