I've run across cases like this. They are generally the exception, not the rule. I am delighted when it is the case.
Cases like this, I've often found, are in older and larger companies with a large legacy infrastructure. Companies that have never used MS infrastructure don't have this problem, they have their own set of new problems :) > On Sep 11, 2015, at 05:04, Thomas Quinlan <[email protected]> wrote: > > Well if you play your cards right, you might find that you can access all the > lovely data still on site, since most companies that have things to protect > can't move them off site due to paranoia/regulations/laws. There may just be > a SQL server somewhere that contains all their data and matching tokens that > make people *think* their data is in the cloud. > > If you can find the SQL server that is... > > > >> On 10 Sep 2015, at 19:48, [email protected] wrote: >> >> Dave, >> Active Directory has long been my favorite target because of the power a >> Domain Admin wields combined with the odds and ends that get integrated >> means any bug can be devastating >> >> The "cloud" has been making vast inroads in Enterprise customer bases. I >> find companies that have started post 2010 that are large enough to require >> pen tests favor the out sourced infrastructure. >> >> Alas AD is becoming less important and Microsoft might come out ahead on the >> technical debt because the pushed the can down the road far enough to where >> they are no longer as important. >> >> DaveM >> >> >>> On Sep 10, 2015, at 13:17, Dave Aitel <[email protected]> wrote: >>> >>> Yagate shinu >>> Keshiki wa miezu >>> Semi no koe >>> - Basho >>> >>> I updated my SILICA this morning while making pancakes for the kids, as you >>> do, and of course, all around me looked about with new eyes. I have a new >>> mesh network that a friend installed in my house and it's interesting to >>> see what it looks like to a wireless hacker. If you haven't seen the new >>> SILICA video it is here: https://vimeo.com/136964755 >>> >>> There's this sense that hackers get which is divorced from what is in Wired >>> or Business Insider or BlackHat which is "Works in the Wild". It's a >>> palpable thing, that sets priorities like a hot oil such that you can tell >>> who has "Gone Active", as they say, from their recoiling from various >>> technologies. One technology that is currently on the hot plate is Active >>> Directory. You can see from talks even at DefCon that people are looking at >>> WMI as a persistence mechanism in the wild. And the Microsoft talk from >>> INFILTRATE 2014 went over a whole methodology for attacking Active >>> Directory networks that dragged public discussion of the techniques into >>> the modern age. For decades AD has been a disaster from a security >>> perspective - by design - and now all that technical debt is coming due >>> like a storm of cicadas chirping their last song. >>> >>> -dave >>> >>> >>> >>> >>> >>> _______________________________________________ >>> Dailydave mailing list >>> [email protected] >>> https://lists.immunityinc.com/mailman/listinfo/dailydave >> _______________________________________________ >> Dailydave mailing list >> [email protected] >> https://lists.immunityinc.com/mailman/listinfo/dailydave _______________________________________________ Dailydave mailing list [email protected] https://lists.immunityinc.com/mailman/listinfo/dailydave
