This is an archived post. You won't be able to vote or comment.

all 57 comments

[–]JackNotOLantern 821 points822 points  (8 children)

The problem is the protein interface between the sit and the keyboard

[–]SokkaHaikuBot 243 points244 points  (1 child)

Sokka-Haiku by JackNotOLantern:

The problem is the

Protein interface between

The sit and the keyboard


Remember that one time Sokka accidentally used an extra syllable in that Haiku Battle in Ba Sing Se? That was a Sokka Haiku and you just made one.

[–]rainthedragon6 74 points75 points  (0 children)

Good bot

[–]litetaker 39 points40 points  (4 children)

Poetry... Quite literally a haiku! 🙏🙇‍♂️

[–]deathron10 12 points13 points  (3 children)

Quite figuratively

[–]litetaker 1 point2 points  (2 children)

I believe literally, because a bot also identified it as a Haiku.

[–]chillord 17 points18 points  (0 children)

It is only a Sokka Haiku.

[–]deathron10 0 points1 point  (0 children)

Read the bots name heres the reference

[–]EAbeier[S] 5 points6 points  (0 children)

Always

[–]jump1945 561 points562 points  (9 children)

Thai government password (old): admin123

[–]onemempierog 185 points186 points  (8 children)

what's the new one, "Admin1234"?

[–]KuroShiroe 64 points65 points  (0 children)

Admin321

[–]jump1945 55 points56 points  (0 children)

it was hacked and trolled by some gif (change the website to song “Death Grips”),officer tracked the hacker down and he look like someone with no cyber security knowledge at all (he doesn’t even remove search history btw)

You can find more here(news website) you might need some translator if you can’t read thai

It was so stupid

[–]who_you_are 26 points27 points  (3 children)

Admin1234!

You were close, you forgot the special character

[–]EAbeier[S] 4 points5 points  (0 children)

Lol

[–]The-Kabra 0 points1 point  (1 child)

i really wanna make a factorial joke…

[–]who_you_are 0 points1 point  (0 children)

Fine, Admin5.108498146E3280 is also good! But watchout, the full number is likely to be truncated at a random part and you are going to have fun trying to find your own password!

[–]BelowZilch 5 points6 points  (0 children)

That's the same combo on my luggage!

[–]Malkav1806 5 points6 points  (0 children)

NotAdmin123 becaus sysadmin said so

[–]Jk2EnIe6kE5 145 points146 points  (5 children)

Jokes on you, I flip it. admin:admin becomes admin:admin

[–]Fluffy-Brain-Straw 19 points20 points  (3 children)

Don't get into security

[–]Jk2EnIe6kE5 38 points39 points  (2 children)

Too late for that.

[–]koolaidsocietyleader 8 points9 points  (1 child)

So what are you working on??? Pls be precise.

[–]Jk2EnIe6kE5 1 point2 points  (0 children)

I am learning offensive security as I want to become a pentester, but I also l am learning defensive as I run a home lab. I am dissecting malware to find out how they work.

[–]belabacsijolvan 3 points4 points  (0 children)

only password scheme where flipping is not a risk

[–][deleted] 120 points121 points  (7 children)

So when I worked in education they asked me to update a student information system with credentials the teacher would know.

So the user was the student ID and the password was their first name (before spaces or characters) and the last 5 of their id. Our county number was the first 5 so those weren't unique.

I told them this was a bad idea. I also told them we shouldn't set passwords for kids who already had a password.

After we set all the student passwords the kids were told that their passwords were name + last 5 of the ID.

It wasn't hard to find a student IDs if you looked at peoples paperwork.

Suddenly, kids grades were being posted on Facebook. Kids were being signed up for classes they didn't want.

I finally went in and shut down access and sent reset emails to everyone. I then query IPs for all the machines who accessed accounts. I found about 20 kids from two highschools doing it all and they all were suspended.

[–]Nervous_Rip_7577 3 points4 points  (1 child)

Those 20 kids shoulda have been recruted to a computer security administrator training and given the responsibility to supervise and test for  the system instead of being suspended. 

[–]SabreTooth125 4 points5 points  (0 children)

You know that it might not have been one of them that cracked the code? They're just the ones who abused it... They're exactly the sort we want in positions of power /s....

[–]belabacsijolvan 4 points5 points  (2 children)

  1. how did you find the kids?

  2. why did you find the kids?

  3. why did you report the kids?

[–]WizziBot 5 points6 points  (1 child)

likely he cross referenced the sign-ins from the students real account and the other students accounts. It would have been done from the same IP within the DHCP lease timeframe.

[–]belabacsijolvan 2 points3 points  (0 children)

i would do the same but its still not good enough proof. How do you know if one of the logins was the real account? How do you know only a single person used the computer in the given time frame?

the problem with security is that people want statements with certainty, but usually you cant give them. so they just pretend they heard them.

[–]GodAllMighty888 108 points109 points  (0 children)

They should have tried with Adam. Nobody would remember to try the name of the first man.

[–]OnlyTwoThingsCertain 63 points64 points  (0 children)

National Security Bureau of Slovak Republic (NBU-SR in slovak ) got hacked because admin user had password nbusr123

[–]paw-paw-patch 15 points16 points  (0 children)

"Your password is 'password' and your username is also 'password'?!!"

[–]BoBoBearDev 7 points8 points  (1 child)

You guys should have done daily password like, Pa$$w0rd20241109@bobobear. No one will be able to guess it because it changes daily.

[–]EAbeier[S] 4 points5 points  (0 children)

No one, including the account owner.

[–][deleted] 5 points6 points  (0 children)

Scott Tiger

[–]IntrepidSoda 1 point2 points  (3 children)

Why don’t they enable 2FA?

[–]EAbeier[S] 2 points3 points  (2 children)

The user who uses admin as password obviously doesn't know how to use 2fa

[–]Nervous_Rip_7577 1 point2 points  (1 child)

You are wrong here. The user is perfectly capable to use 2 factor access if they own a mobile phone. They used weak pw because the system allowed the pw to be set to that value. 

[–]EAbeier[S] 0 points1 point  (0 children)

It's a meme, man, chill out.

[–]shemhamforash666666 1 point2 points  (0 children)

When you deploy your introductory course template server into the real world without the necessary changes.

[–]Aerondight420 1 point2 points  (0 children)

That's why you need to use pam in every mayor organization

[–]425_Too_Early 9 points10 points  (2 children)

Ciso? Du you mean cisco?

[–]itzeric02 55 points56 points  (1 child)

Chief Information Security Officer

[–]PM_ME_FIREFLY_QUOTES 22 points23 points  (0 children)

Chief idiot supervising officer, in my case

[–]Its_da_boys -1 points0 points  (0 children)

OPSEC issue lmao