This was pretty cool! Also, it was interesting to see that there are companies out there that take this stuff seriously and had their PC configured reasonably for actual security. Without access...
This was pretty cool! Also, it was interesting to see that there are companies out there that take this stuff seriously and had their PC configured reasonably for actual security. Without access to the hardware, it seems like this would have been more difficult (although they may have ended up going with social hacking in that case, which is always a weak link).
This was pretty cool! Also, it was interesting to see that there are companies out there that take this stuff seriously and had their PC configured reasonably for actual security. Without access to the hardware, it seems like this would have been more difficult (although they may have ended up going with social hacking in that case, which is always a weak link).
This blog describes an IT attack on a company network from just a stolen laptop (blackbox).
read: backdoored