What's the sneakiest way a user has tried to misuse your IT systems?
Posted by Immediate-Cod-3609@reddit | sysadmin | View on Reddit | 791 comments
I want to hear all the creative and sneaky ways that your users have tried to pull a fast one. From rouge virtual machines to mouse jigglers, share your stories!
Otto-Korrect@reddit
We had a user using a VPN to completely get around our web filtering (before we had one smart enough to block it).
When confronted she denied doing anything wrong. All the way out the door.
MajesticCat98@reddit
I did this back in high school using Google translate to get around the schools web filtering to visit Minecraft forums. The tech director was more impressed than pissed that I found out that loophole, then a few days later Google translate was black listed lol
biggles1994@reddit
Ok I’m curious how this worked, I’ve never heard of google translate getting around web filtering
MajesticCat98@reddit
They may have changed how this was done since then as this was back in 2015ish but all I would do is paste the URL into the translate prompt and it would pull up the website in the actual translate window.
Public-Big-8722@reddit
Were you able to actually navigate around the website from there, or was it essentially just a snapshot of the webpage?
MajesticCat98@reddit
IIRC, I was able to navigate it like I was actually visiting it not in translate. I don’t think this works anymore because I just tried it when someone else asked, it now opens a new tab with the translated webpage but it still functions like a webpage. Before it used to stay contained within the translate tab.
biggles1994@reddit
That's bizzare, I've never typed a URL into google translate before though. The trick we used for a while when I was at secondary school in the mid-late 2000's was changing the web address from HTTPS to HTTP and that got around filtering for most sites for a long time.
smoike@reddit
My guess is the translate servers download the original page, translate the test and then send you the translated text. No idea on if they refer you to the original site for images or if they would be cached and re-displayed to the user too.
It's honestly a clever trick though.
MajesticCat98@reddit
IIRC it redirected me to the original site. I was able to navigate to the different sub-forums, login to my account, post and comment, see users profiles etc…. Then again this was almost 12ish years ago now. Thinking about it now not sure if it changed the URL to something the web filter didn’t recognize or what was exactly happening in the background… but I do know nothing was going to stand in my way of 14 year old me bumping the post advertising the server I moderated LOL.
BlackV@reddit
This was very very common back in the day, and way back machine too, there was another big one that did that too that alludes me now
dr_warp@reddit
That's the great thing about pulling these shenanigans in high school and college. At least back in the day. I found out I could install programs to a zip drive, and if they didn't need any registry info (like if they were dos games or simple software) they would run on the colleges computer labs. Napster is one such program, as is OG quake 2.... The computers get wiped and reimagined every night, so they never bothered to look at logs or anything....
MajesticCat98@reddit
Man now you’re making wish I would have tried this back then… I had quite a few study halls where I was in the computer lab most of the day and that would have been sick to have some games to play.
That sparked another memory, me and a buddy wrote a batch script that repeatedly opened the DVD/RW and changed the icon/name to Chrome and watched all the chaos that happened lol. At this time they didn’t have the machines in one lab setup on the local domain and was just a user account and password. They changed that pretty quickly after too lmao
zvii@reddit
I did the ol' batch file that calls another instance of itself repeatedly.
dr_warp@reddit
Hearts was our go-to multiplayer game, lol!! I only did quake as an experiment, but it was too involved to not get noticed. At least with Napster I could run it minimized for the most part. Never bothered to change it's logo either, I figured if anyone noticed it was "if you know you know, wink wink nudge" sort of thing.
Remarkable-Host405@reddit
I got one. Many years ago, I was in what we'll call.. a locked down environment. The only network access out was for tele-school. So like a good student, I used it for school. Except the school left outlook as it was preinstalled. I used the email client to login, and since I had google voice set up, I was trying to convince my friends to sneak me out. Unfortunately, it was quite a drive to where I was and I was eventually found out.
dalarrin@reddit
This was super common when I was in highschool, everyone would use VPN apps to get on their mobile games and social media apps, I'm guessing most Highschool IT teams are savvy enough to block it now but when those apps were first coming out it was great.
TerraWarriorPro@reddit
yeah when i was in highschool they had a google chrome extension to block websites and it came preinstalled and unremovable on the profiles that you used to login on the school chromebook... they also allowed you to bring your own laptop to use (which i did) and had no other form of network blocking, just that extension
DarthJarJar242@reddit
Tl;Dr at the bottom.
Years ago when I was the white glove tech at an MSP I was sent a call to help a client set up a user account in their AD. He didn't need it to be able to login but their financial software was tied to it.
They did this a lot for contractors, would set them up as an 'internal user' who couldn't do anything inside the domain but it allowed for easier integration to be able to cut the person checks etc. It was unusual for me to be getting this level of request but they were newer to our MSP so I figured it was just to establish good rapport. So I'm chatting with the guy, asking what the users name is etc and he goes 'Just make it up', I'll change it in QuickBooks. So I set it up as Jane Smith and let it ride.
Couple weeks later I get a call from the owner's wife about a quickbooks issue. So I'm helping with that and she happened to see this Jane Smith account and mentioned these random accounts showing up ever since getting us as an MSP and it being weird cause she used to be the one that setup all the QuickBooks access. I clarified that I had actually set it up per her husband's request. She goes, oh well at least it makes sense now, I'll ask him about it. We hang up and I think nothing else of it for months.
Eventually we get an email about a year later that they won't be renewing our contract. Late I mentioned to their sales rep I was shocked to see them go, we didn't have any major issues that I knew of and handled them well. Turns out they weren't renewing because the company was being split up as the husband/wife owners were getting divorced but she had already resigned with us under her new company. I laughed and asked him if he had managed to get the husband to sign a separate contract too and he said 'No, he blames us for the divorce, apparently someone here tipped her off to his cheating.'
It was me. Apparently the dude was using escorts and was hiding the payments to them by making them look like payments to contractors using bogus accounts in AD/QuickBooks. Me telling her about the Jane Smith account got her looking into it, apparently she hired a forensic accountant and was able to prove he had made payments to 20+ escorts over the years.
Tl;dr - Owner of a company I did MSP work for used AD integrated QuickBooks to hide payments to his escorts using company money from his co-owner wife.
zfs_@reddit
This is insane. Wow.
DarthJarJar242@reddit
Was certainly one of my weirder IT experiences.
The other was working at a sperm bank and having an official company paid for porn hub premium account so that I could download videos to our internal porn server in case any of the donators didn't want to use the internet.
lastcenturion04@reddit
I'm sorry what
DarthJarJar242@reddit
Yeah thats a whole other story. But the basics were that as the sole IT guy part of my responsibilities included a monthly meeting with the head of customer experience and our CEO to go over what tags were trending on pornhub and then verify that I had the top (by popularity) 20-30(ish) videos from that tag downloaded to our internal video database.
I never got used to that meeting even though it happened monthly it was always a surreal experience.
timbotheny26@reddit
I can't help but wonder what it's like to do IT for a major porn site.
lastcenturion04@reddit
I have a lot of technical questions actually, but this story hilarious. The fact that you have two of these is kind of impressive.
DarthJarJar242@reddit
I actually left the MSP to go work for the sperm bank because the CEO and I got along pretty well and he offered to give me half what they were paying the MSP to come work directly for them. Got me a huge pay jump and an 'architect' title. Worked there for a while but the stress and pressure of being the sole IT guy made it too much. When he told me he was retiring I started looking and got a different job quickly.
pdp10@reddit
Too much pressure at the sperm bank. They were relying on him too much.
Yeah. I can see that.
mrtuna@reddit
how would they know where the video was hosted?
tarlane1@reddit
One of our smaller MSP clients had a massive layoff(like went from 40 users down to <10). They were essentially going skeleton crew to see if they could rebuild.
The COO was including himself in the layoffs and so I had a good chat with him as we were going through the accounts. Apparently it happened because the CEO had picked up a mistress in Australia(I'm in US) and was blowing an insane amount of money, up to and including payroll, flying out to see her and buying her gifts.
Geno0wl@reddit
I am always amazed at the money some of these sex fiends will blow without a second thought.
smoike@reddit
Especially if it is someone else's money.
fuknthrowaway1@reddit
Years back I had a client come to me because the standalone machine they used for Peachtree didn't seem to be backing anything up. It was Thursday, so the accountant was super busy doing a payroll run and couldn't be interrupted, but would I mind swinging by over the weekend when he isn't there to look at it?
I hit their office on Saturday afternoon and right off the bat my key to the accountant's office doesn't work, and neither does the one from the key box. After a call to the owner and 'Are you sure you're using the right key?' I'm forced to resort to popping the door with a bit of a cut up Coke can and leaving a note for the building engineer.
As for the backup, it looks like someone's mucked with it so that it's only backing up the desktop and registry. I point it back at C:\sage, pop in a CD-R, and fire one off.
After about ten minutes: "Not enough space on target device. Please contact your administrator." Huh? This is only a \~30 person company and they specifically chose backup to CD because they never had more than a few hundred megabytes of data.
One quick peek later I see the PC is a total mess. There's \sage, \sage\sage-2000, \sage\sage-old, \sage\arthur-2, \sage\peacht-1, etc, etc. I'm not sure what the fuck is going on, and I'm not going to muck with any of it without some CYA, so I call the owner again. "There's multiple copies of multiple versions of the accounting data, it seems. I'll go ahead and back it up to an external drive, but you're going to have to talk to the accountant."
Sunday evening I get another call from the owner, who'd like me to come over sometime the next day, after the accountant had been fired, to reinstall everything and restore the data from backup. Huh? The owner had decided to have a look at what was going on before bothering his totally busy employee and discovered why he was so busy; He was running a business out of the office, doing accounting work for a half a dozen other companies.
DarthJarJar242@reddit
I actually had to let one of my junior sysadmins go because he did basically the same thing when we started WFH during COVID. He got a job as a help desk agent for our outsourced IT call center. His output had been slipping and I was considering putting him on a PIP after multiple attempts to talk him through it. Only found out he was double dipping when he responded to one of our engineering tickets with his desktop support email by accident. Made firing him a no brainer.
kitolz@reddit
Their divorce was totally your fault for honestly answering a routine question about a task, and not his cheating and lying.
Slicester1@reddit
Back in the day when I worked for Compaq I was addicted to playing Everquest. Corporate firewall blocked it but there was an outside phone line in the server room down the hall. I tapped into the phone line and ran a cable in the overhead ceiling down to my office.
Brought it in at the side of my desk and terminated it in my bottom desk drawer where I hide a modem so I could dial out and play EQ in my office.
Lanky_Presentation_8@reddit
When I worked for Compaq, we occasionally "burned in" workstations by playing Unreal Tournament and or whatever the latest game was.
Slicester1@reddit
Oh yea, when I worked on the help desk, we had huge lan parties afterhours. Unreal, Hexan, C&C, etc.
Lanky_Presentation_8@reddit
My house was basically a nonstop LAN party.
SemiAutoAvocado@reddit
This is some 'the website is down' shit.
Reddit_Homie@reddit
That video was spectacular. I can't believe I've never seen that.
narcissisadmin@reddit
B: Did you restart the web server?
A: No
B: Karen said you did
A: Well I mean yeah
DoctorOctagonapus@reddit
ring ring
You idiot, which rack is it in?
ElvinLundCondor@reddit
I don’t want to get into an IP Telephony conversation with you right now.
blckshdw@reddit
You pee telephony? I pee urine.
Conlaeb@reddit
Hah you must have been in IT/communications. Was the POTS line out of band access for equipment, or something like an elevator/alarm line?
Slicester1@reddit
Yea, the ISP had Us robotics modems in the rack with an outside line in case they needed to dial into the equipment. I just spliced off their line :)
Conlaeb@reddit
I am sure no one would ever have noticed that. What a sweet setup! I was also hooked on EverCrack, but playing it from my childhood bedroom at the time. Ironically in the years since, as a contractor, I've set up plenty of ISP equipment with out of band access, though it's largely cellular modems these days. Did you ever get busted for your extracurricular cable run?
Slicester1@reddit
No, after I left Compaq I stuffed the phone line back into the hole in the wall and just left the little unpatched hole at the base of the desk. Probably was never discovered until they renovated it when they sold the offices.
tarlane1@reddit
I worked at an MSP and we spotted network traffic for a client showing a user was playing WoW. My boss went to block it and I told him it would be better to put a strict quota on it so he'd keep lagging out and getting killed.
If you block it the user will probably just look for ways around. Much more effective for them to think its just a miserable experience with the office's network.
RippedTarsier@reddit
I did something similar to a guy that was abusing a load balancer. His stupid fucking app was querying his database as fast as it possibly could for every single record in the DB generating a consistent 1Gbps worth of traffic through the load balancer. They were pretty beefy F5s so it wasn't a major thing for them, but given it was 24/7 well, that's a problem. I told him to fix his shitty app, he said he did. He didn't. So I set a rate limit of 1 Mbps. He kept putting in tickets complaining about performance issues, all of them got closed with "No evidence of performance issues present in LB. Closing." He ended up getting fired or quitting a few months later. His app never got fixed either. He was straight up incompetent.
Traditional_Ad_3154@reddit
That´s pure evil. How can you be that mean
Milkshakes00@reddit
He was probably tired of getting killed by the coworker in PvP and wanted some revenge. Lmao
Gadgetman_1@reddit
My guess; he worked on the Helldesk once...
WhiteChocolateSimpLo@reddit
Gotta do the time.
Skullpuck@reddit
You're a genius.
CelestialFury@reddit
Wow, that's a really smart way to deal with it. It's like souring the milk for a baby.
Basic_Chemistry_900@reddit
Would you have been terminated if you were caught?
Slicester1@reddit
Probably, but I also worked in support for CompuServe, Prodigy, and AOL so I felt I could bullshit my way out of a justification if they found the line.
BlackV@reddit
Oh man at my hp/Compaq days someone was testing this massive omni directional antenna, that I think was going to be used for some rural work, decides to plug in random ap with no password on the thing and piggy backed on to corporate lan
We got warchalked, hard, angry people everywhere, corporate emails everywhere
ComputersForMeAlas@reddit
Got SOW?
TU4AR@reddit
A true champion of Norrath. And people thought wow was addicting.
Chris_87_AT@reddit
I did some bad guy stuff back in the early 2000s. Wrote a backup program that used a DAT Walkman connected to the optical port. Later this evolved into a soft modem using the sound interface. Was good for about 3 MBits using a 192kHz capable on board HD Audio chip using both channels.
Immediate-Cod-3609@reddit (OP)
Fascinating way to exfiltrate data
mgerics@reddit
virtual machines have colors ? :)
Kiernian@reddit
Yes, Mauve has the most RAM.
mgerics@reddit
omfg glad i swallowed my coffee before reading this response! would have been all over the kb, desk, etc.
thanks for the morning laugh
Muted-Shake-6245@reddit
This was at a hospital I worked. One of the medical techs had setup a computer in his office connected to some Internet only port or wifi, can't remember, but he ran a newsgroup leecher on that thing. The thing was that he setup a scheduled service to only start downloading at Friday evening and quit late Sunday morning.
This proves my monitoring processes were in place cause I did catch him after seeing some reports with some REALLY weird traffic increases in the weekend where you'd normally, even in a hospital, see decreases. Reporting lead to investigation and seeing a very bulky newsgroup session each weekend made his manager have a talk with him ...
Quit smart to do it outside work hours, but also not 😂
Forumrider4life@reddit
We have a customer service employee run an EICAR script on their end user machine multiple times… tripping every alert we have setup…
nighthawke75@reddit
What was he trying to prove? Aside from having their buttons handed to them at the door.
Forumrider4life@reddit
He was “testing our security” is all he said before he got walked to the door.
Nereo5@reddit
You get walked to the door for downloading the eicar file? Why?
Forumrider4life@reddit
It wasent that they downloaded it, it was that they downloaded it then ran it on a shared machine in our executive boardroom as it had local admin… had…
Nereo5@reddit
Seems like he found some flaws in your security alerts then. Btw you don't "run it":
This 1 string is not something you run, it is simply a test string that doesn't do anything.
IMO fired on wrongful termination.
Forumrider4life@reddit
Changed the wording, very aware you do not “run” it but they downloaded it ontop of other scripts they ran around the same time that they downloaded…
And it was well deserved…
dopey_giraffe@reddit
I work in IT and I haven't heard of EICAR until now. Some of these replies are unhinged. Arrested as "suspected terrorist"? For running a string of characters that's not even an actual virus? I can understand a writeup at most. Reddit is so weird sometimes.
Nereo5@reddit
The EICAR file has been a standard part of my tool kit for years.
SimplifyAndAddCoffee@reddit
I mean to be fair its not like he was going to accomplish anything else...
nighthawke75@reddit
He should have been arrested. "Suspected terrorist." Let him stew that one over while fermenting in a cell.
DiHydro@reddit
Why? While stupid, that's exactly what the EICAR is for.
nighthawke75@reddit
Unauthorized use/access to hacking tools. Especially in a highly regulated environment.
BlackV@reddit
Do you know what the EICAR string is?
It's not a "tool" as such, just a known text string
sarosan@reddit
"hacking"? You can create the EICAR test file using notepad.
nighthawke75@reddit
Then, a lobotomy is in order.
i_amferr@reddit
You are extremely dramatic
ProfessionalEven296@reddit
If you have permission, yes. Most people would never have the authority.
CosmicMiru@reddit
Yes but it doesn't make you a terrorist lmao
withdraw-landmass@reddit
Calm down. People who pull the fire alarm aren't arsonists.
Ganthet72@reddit
"I was just testing" - the defense of every fool who gets caught screwing around.
smooth_like_a_goat@reddit
Eicar? Soryy not heard of that before
sarosan@reddit
It's a harmless test virus, generally used to trigger and ensure alerts are working on a system.
mudgonzo@reddit
It’s not a virus. It’s just a specific string of ascii characters that all AVs are designed to trigger on as a test.
slazer2au@reddit
Also fun to use as passwords.
TheRealLazloFalconi@reddit
Don't do that.
narcissisadmin@reddit
Why? If something is storing the password in plain text then it deserves to be broken.
agoia@reddit
Aww little Bobby Tables
TheRealLazloFalconi@reddit
Are you really asking why you shouldn't use a password everybody knows?
slazer2au@reddit
What's wrong with correcthorsebatterystaple?
Iregularlogic@reddit
It’s not as good as hunter2
williamp114@reddit
Every antivirus program: "Yes it is."
smooth_like_a_goat@reddit
Thanks, sounds quite the useful tool.
Forumrider4life@reddit
Meh, we use it periodically for “science” but for most things we have other tools.
IronVarmint@reddit
A string of characters that triggers AV for testing. Comes in multiple formats.
There's another for spam filters out there.
admh574@reddit
I had fun trying to download one for a test while being lazy and circumventing the security system. Ended up finding a loop hole and getting the other testing done in one go
jaysea619@reddit
I found if you type format c: in notepad and save it as .bat it will get flagged as malware.
Ithurial@reddit
What does this actually do?
blanczak@reddit
The key being to save it as two distinct strings and then run a simple script to concatenate them at 2am on a Saturday.
fahque@reddit
That command doesn't run on windows. I tried it like 20 years ago when I first heard it and it wouldn't run.
blanczak@reddit
It works for me. I run it quarterly to test my teams ability to detect and respond to malware events.
RoosterBrewster@reddit
I wonder of there are malwares that would come in as multiple innocuous pieces. But then form a malware with a trigger to combine the pieces.
blanczak@reddit
I believe the term is "multi-phase malware".
Traditional_Ad_3154@reddit
Better switch over to echo 141yy|fdisk. "No ROM basic"
fresh-dork@reddit
i guess you could also base64 encode it, then decode and run the string
Box-o-bees@reddit
Lol, that's cleverly cruel.
Longjumping-Pizza-48@reddit
As the SOC guy being on-call, I can only say r/angryupvote
MonstersGrin@reddit
Calm down, Satan...
hells_cowbells@reddit
Years ago, I had a guy who took the CEH class. In the class, they gave out a CD with all kinds of "hacking tools" like Metasploit and that kind of thing. He then tried to copy the contents of the CD to his laptop. I started getting a ton of alerts from our EDR, so I went to his office to look at the system. He couldn't grasp why he wasn't allowed to use any of the tools on his work issued laptop, on our network.
Forumrider4life@reddit
Sounds about par for the course with “tech savvy” users
likejackandsally@reddit
My company has a Pentest team that had to justify every tool they use during our security overhaul. To say it was tedious was an understatement. And that’s actually their job, lmao.
hells_cowbells@reddit
We're pretty much the same. This guy had nothing to do with security or pentesting. I don't know why they let him sit in on the class.
TheOhNoNotAgain@reddit
Is pen testing only for the bad guys?
hells_cowbells@reddit
No, but it is only for approved people, either internally or externally. This guy was not a member of the security team and had no such approval. I don't even know why he took that CEH class.
fireandbass@reddit
There is a security researcher who did a speech at Black Hat or somewhere similar about abusing EICAR, and he has been selling shirts with a QR code of EICAR. It crashes a lot of stuff with QR code readers, self-checkouts, toll license plate readers, etc, as you go about your day and get scanned.
Forumrider4life@reddit
See now I need to buy something…
PsyOmega@reddit
I wanna get the EICAR QR code tattoo'd to my arm. Not my fault if every self-check i pass it over scans it.
jeniceek@reddit
If you are interested, I've found the video https://www.youtube.com/watch?v=cIcbAMO6sxo
CelestialFury@reddit
This is so simple and so genius, I'm jealous.
ThatITguy2015@reddit
I love this. Chaos at its finest.
williamp114@reddit
That's interesting... i've always wondered if you could perform some kind of (D)DoS attack on a machine using nothing but EICAR files.
TU4AR@reddit
Wonder if it would shutdown fast track readers.
Very cool tbh
RikiWardOG@reddit
That's hysterical
BloodFeastMan@reddit
Screen lock policy, guy has a private office, tells me over a beer once that the policy was a pain in the butt for him .. He made a little python script that double taps the scroll lock every few minutes :)
iliark@reddit
I've used the F15 key. It's a recognized key but since almost no keyboards have it, it's generally not bound to anything.
drthtater@reddit
Could we get a copy?
iliark@reddit
https://gist.github.com/jamesfreeman959/231b068c3d1ed6557675f21c0e346a9c?permalink_comment_id=5008311#gistcomment-5008311
the whole thread has a ton of ideas, but I use that one
Jawb0nz@reddit
keepawake.ps1 ftw
BlackV@reddit
All the way up to f26 (f25?), but not relevant on the keyboard just the os needs to support it
BloodFeastMan@reddit
That's a good idea, actually.
KindlyGetMeGiftCards@reddit
We had a mouse sit on a analogue clock to achieve the same thing, this was before mouse jugglers.
fahque@reddit
You can hit F13 as an alternative to hitting an actual keyboard key.
BedRevolutionary8458@reddit
We used these in my job at an msp to stop getting kicked out of RC on a certain customer's PCs. It does the job lol
RBeck@reddit
I once got put on a project where they were shipping me an RSA 2FA token, but demanded I start immediately. They helped me RDP in before putting the device in a FedEx box, but for 2 days I had to use a mouse jiggler anytime I wanted to use the restroom or go home. I was amazed it was connected when I got to my desk both mornings.
BedRevolutionary8458@reddit
IT Baby!
koshka91@reddit
Some remoting software has wake lock option.
BedRevolutionary8458@reddit
Totally, but for whatever reason it didn't work with this one specific client's equipment. It has been a while, I forget the specifics.
narcissisadmin@reddit
Having a Powerpoint open also defeats it.
Roland_Bodel_the_2nd@reddit
We have improved thigs since, now on my macbook I just touch the TouchID.
There was a while in corporate america where you had to change your password all the time and have a complicated password and type it so many times a day just to log in to your own computer.
NitraNi@reddit
Ah, the classic undoing of mischievous actors. They brag.
BloodFeastMan@reddit
Ah, I never said anything, project manager who's quite proficient in several scripting languages including, interestingly, Matlab and R. Isn't privileged enough to screw anything up :)
aXeSwY@reddit
using a PS doing this on almost every remote desktop.
it sends scroll lock twice every 60 sec. works perfectly
noocasrene@reddit
Tried to backup their desktop everyday, ran a scripted robocopy but it wasn't doing incremental it was a new full everyday. It killed our fileserver after a couple of weeks.
gandraw@reddit
Pay him a reward for showing that your monitoring sucks.
Top_Boysenberry_7784@reddit
Doesn't help that many of what may be considered the top monitoring tools only look at percentage of free space when monitoring out of the box. No estimated time till disk full calculation. Time till full could possibly give an alert well before a percentage in this case. But yea his monitoring did suck.
Stoked_Bruh@reddit
Why are folks so reluctant to say least dig in and script some custom powershell logic to report user quotas/audits? You just enable file auditing on the server OS and disks, etc. I mean it sucks that it's so granular it's crunchy, but the options are there. i guess you'd need the time flexibility to be inventive, at least. I'd say that is worth the price of admission for custom monitoring software. I wonder if there is a FOSS solution available.
noocasrene@reddit
I know at my old place, it wasn't about technology. It was about who will be the one responsible to tell the C-suite and friends, hey you can't store all your stuff here and even higher level executives. The CTO was the one who mentioned just give people more storage, we do not want to restrict business data that they store as we do not want to be the ones that make that decision. No quota's or anything, as long as it looks like it is business related. We would only action movies/mp3's etc files which alot of people were using it to sync Itunes with at the time.
Top_Boysenberry_7784@reddit
There is the ability to monitor Windows File Server Resource Manager quotas within Check_MK. I haven't had the need to get that granular with my monitoring, but it may be need for some. Check_MK offers a free version called RAW. I am using the enterprise version and my yearly cost is a little below half of what is advertised.
noocasrene@reddit
That is correct it depends on how much disk space you have, if you have a threshold of 80% on a 200TB disk that is 40TB usuable and you do not want to be alerted on it. If you start moving over to CIFS on file storage it sometimes you can use by GB/TB or % but I don't think you can do both. It might have changed depending on technology.
OcotilloWells@reddit
Also kudos for actually thinking about backups.
noocasrene@reddit
Yes Backups really did suck when I first started there, it was 40 different systems having their own tape drives and had to be checked manually. Hours of work until everything was able to be centralized and had monitoring setup.
noocasrene@reddit
Absolutely agree, when I first started there they didn't have any monitoring. They just ran treesize once a week, and compared it to the week before to see how much it was grown. They would export the data to a fileshare somewhere, and we would compare it to the week before. That was how they monitored it this was maybe 20 years ago,
Everything was a manual process, even our 40 backup system would take us around 3 hours to check manually every day to see if each one succeeded or not by login in and checking. The manager that time didn't like anything automated, so it really depends on who checked it. Some people got lazy and just copy and pasted the data from the week before.
Manager was canned after working there for 15 plus years, for embezzlement kinda funny it took so long for one of the mid size financial institutions.
LeftoverMonkeyParts@reddit
We had a similar situation, but it was our IT Department head who was instructing employees in other departments that they should use the built-in Windows Backup feature to backup their local documents folder to their home drive on our file-server. He was also instructing employees on how to create PST archives of their inboxes that should be put into their documents folders. He did this all on his own without telling the rest of us in the department what he was telling people to do.
We had just been sold a Dell Powerscale/EMC Isilon and hadn't set up proper monitoring at that point. Thankfully we caught it right when usage crossed the 90% threshold.
The fix was easy, but tracking down all the users he had "guided" took a while. He took zero responsibility
RoosterBrewster@reddit
I wonder about that as a user as I'm not sure if IT here is really monitoring and testing backups. They say Microsoft recovery is the backup for onedrive files, but from what I've read here, that's not a proper backup. But I'm not in a position to call them out...
redit3rd@reddit
It's a balance between an ideal and what's going to work most of the time. There are tons of stories of backups that should have been working, but weren't, and that fact was only discovered when it was time to restore. Whereas if you interact with OneDrive on a regular basis you're bound to notice when something isn't working and it can be fixed.
Most of the stories aren't that OneDrive lost the data, but are that the user deleted the data, waited more than 30 days - or whatever the dumpster retention time is - then found out that they wanted the file; and that's when the proper backup came to the rescue. But that depended upon keeping a backup for a longer period of time.
Aim_Fire_Ready@reddit
I may or may not have set up a robocopy script for an elderly friend to back up his PC without using the incremental parameter.
SoonerMedic72@reddit
It wasn't very sneaky, but when I was in medicine, the ER nurses at a super slow standalone facility would watch movies on some sketchy website. Like movies that were out in the theaters (sometimes ones that Pee-Wee Herman would see "in theaters"). One day our boss came to us, very mad, and said that the FBI had visited the IT department with some pointed questions. We had a web filter installed a few weeks later. This was like 2014, so well after having a web filter was standard practice for a hospital system with thousands of employees.
am0nrahx@reddit
When I worked for an MSP, the bus depot we serviced called about the internet being really slow. Found that the extra machine in the corner of the dispatch room was being used by a night shifter who left many, many, many torrents seeding while he was not at work.
agoia@reddit
Was this back when private trackers were really picky about your ratio?
am0nrahx@reddit
It was between 2012-2016. I would imagine his ratio was spectacular.
alopexc0de@reddit
I was that user in high school.
I made a chatroom using batch scripting that was actually pretty fully featured. You could pick your username and it would check if it was in use, later versions had multiple rooms, it ran from your home drive but installed from the common drive.
It showed the IT guy and he was impressed. About a week later, he pulled me out of class and said he had to delete the chat room because teachers complained, so he wanted to know where I put it. I showed him how to delete it from the home drives, but I also made it in a way that you can't delete the source (NTFS maximum file length prevented deleting files, but I could modify them lmao). He backed up my stuff to a CD for me :)
At a different school, they were incredibly locked down using Novell Netware (software, not OS) to make it so even the windows task bar was not allowed. I ran putty to ssh to a server and had a script that would literally just do `date; sleep 1; clear` infinitely just so I could have a clock.
Icolan@reddit
I worked at a shipyard quite a while back and some of the union guys built a secret room in a gap space where 2 buildings had been joined. They wired a consumer grade router to an internet only port on a nearby switch and setup a bunch of personal PCs that they could use to surf the net. They even had a couple couches and some cots for napping.
One of the security guys happened to be in the area and noticed the wifi network. When he tracked it back to its source, the shit hit the fan. They locked down the space and confiscated the equipment. Stupidly a bunch of folks had been job searching in there and left their resumes on those PCs, a bunch more had left their personal mail accounts cached in the browsers. Anyone they could prove had been in there got fired for time card fraud, which is one of the few things that union would never fight.
thedanyes@reddit
If only they'd gone with wired networking.
Nesman64@reddit
Reminds me of a 99PI episode: https://99percentinvisible.org/episode/621-secret-mall-apartment/
Somebody noticed an unused space in a mall as it was being built and decided to make an apartment out of it.
Crow_T_Robot@reddit
Someone made a documentary about that place with the folks who did it. It's making the rounds at film festivals now but I'm sure I'll be on streaming soon enough.
PaladinSara@reddit
Isn’t this how people survived in Dawn of the Dead?
streuselcutie4427@reddit
Gotta love a 99% Invisible reference!
nwcubsfan@reddit
tech2but1@reddit
I was decommissioning some industrial spaces and when randomly wandering around the already derelict/unused areas I found a random door which led up some stairs to a huge purpose built grow room, clearly all done as part of the original build not just tacked on later.
Sure_Fly_5332@reddit
I did the same thing in middle school. School library storage room not a shipyard of course, but same thing.
tdhuck@reddit
I swear I saw something on reddit with a 'hidden' room in a warehouse or similar where labor workers had a microwave, small tv and a cot and would take turns sleeping, eating, watching tv, etc until someone found the room. It was a makeshift room and you wouldn't know it was there unless you were part of the click. I know it wasn't the shipyard scenario you are referring to, but similar concept.
The only sneaky user interaction I had was someone bringing in their home laptop, but at that time they just started allowing (or testing) BYOD so that was normal, but the user left a note for the help desk staff asking if there was a problem with the internet because they were trying to torrent (yes, they used that exact word) a safety training program online and was blocked and their torrent program wasn't connecting.
I'm not in HD, I work on the network side and we have many locations, I happened to be visiting that location, on that day, and the help desk person staffed at the location gave me the hand written note asking for help with the torrent program and I calmly wrote an email to the user's supervisor stating that there were two issues. Issue 1, user x was attempting to use a torrent program and we block torrent programs. I didn't bother getting into specifics of legal vs illegal torrenting and the fact that we block a lot of non-standard ports. Issue 2, if the company needed access to a 'safety training program' there were probably better ways to obtain a license for said program. I left it very open and did not offer more information but it was basically something along the lines of 'if you need software for company use, it needs to be documented and licensed.'
All I heard from the supervisor was 'thank you for letting me know' and the firewall never logged any 'torrent' events from that day on. This user that wanted to torrent didn't stay much longer at the company, they left on good terms and they never brought up torrenting or not being able to torrent. I think I did hear them mumble that 'they didn't have this issue at the last company they worked at' but I had no reason to engage in that conversation.
PaulTendrils@reddit
FYI it's clique, not click - I say this to educate, not demean!
dervish666@reddit
That is a user with just enough knowledge to be dangerous.
legendov@reddit
I have a similar story Working far up north in a camp for months at a time (mid 00s)
Took a router with me, cloned the mac address of the shared PC that had internet access on it. Hid the SSID. Had internet in my room until I got busted.
bennymuncher@reddit
How did you get busted?
wrt-wtf-@reddit
Depends on the technology and capability of systems. If a unit turns up on a rogue wifi and on the network it will highlight that there is an unauthorised AP.
SSID’s that don’t broadcast are not invisible.
dougmc@reddit
A "hidden" SSID usually just means that the access point explicitly not broadcasting its existence -- it can still be picked up (if being used) with any sort of WiFi sniffing, and I think it'll still even occasionally show up on the WiFi list on a device that's not actively "sniffing" but instead simply looking for an WiFi to use.
So my guess is that that is the most likely way for it to be found.
VulturE@reddit
If I'm not mistaken, there are also some higher end Cisco devices that can specifically find and locate those devices. I wanna say we had a doctor's office that used to specifically kill any wifi nearby it didn't know as a feature.
dougmc@reddit
Well, any of the many WiFi sniffing applications will easily find these devices (if they're in use) and by looking at signal strength as you move around it's usually not too difficult to physically find them.
As for the Cisco feature, that sounds like this, which I'm a little surprised that they offer -- for example, in the US it sounds like a potential violation of FCC and computer hacking laws. (I mean, it's OK if the "rogue" AP is yours, but if it belongs to somebody else, the ethical and legal issues may become more complicated -- especially if it really belongs to your neighbor and isn't "rogue" at all.)
That said, tools like "Kali" include similar functionality and more -- sending many deauth packets (to force reauthentication over and over) is a big part of how one cracks WiFi networks.
VulturE@reddit
They had somebody come in and set up a hotspot that had almost the same name as the guest network and stole a bunch of info, then emailed the users they stole from and blamed the doctor's office.
It was a very personal attack.
It was a justified implementation though since they owned the entire building, But also, since they insisted on using crap tier HP inkjets at some specific desks, it meant we could finally block the Wi-Fi on them that was seemingly not configurable to turn off direct connect.
dougmc@reddit
Sure -- that's why I said "the ethical and legal issues may become more complicated" rather than "it's illegal and wrong".
That said, in the US the FCC has made their position clear, and it's not clear that laws like 18 U.S.C. § 1030 permit "hacking them back", even if justified -- especially if it turns out that your target isn't what you thought it was.
It wouldn't be a bad idea to see what your legal department thinks about it.
VulturE@reddit
Yup. We had automation in place that would create a ticket that we could reply back with "enable" or "disable" to stop the rogue network. So we would call our point of contact on site, they would have gotten a copy of the rogue detection email as well, made a determination on what to do, then they'd reply back to the ticket on what to do.
The automation was something my boss stood up so that someone from the doctor's group was the one that was actually performing the command to disable the AP. Ticket tracking, email tracking, And we weren't the ones making the change technically. Sometimes MSPs can get creative if it means they can resell a solution.
butterbal1@reddit
It should show up as an unknown network in most wireless network lists.
chipredacted@reddit
MAC collision was probably a mofo that set off some investigation on the shared PC, if i had to guess
BlackV@reddit
That or hidden ssids are only kinda hidden, more like they're just not displayed and listing time (same with xxx$ SMB shares)
legendov@reddit
Nah I put the router first and the shared PC second
Someone found my router hidden under the desk
chipredacted@reddit
Brutal
bustallama@reddit
I did something similar once, Way back in my younger years, back when Wifi was just becoming a thing. I worked for an ISP that heavily monitored their Internet access. But we had a test lab with DSL connections, so I connected a Netgear AP to the circuit, hid it inside the Cubicle Walls and thought nothing about it. ( I had a small Netbook that I'd use to browse the internet ).
This went well until they we started supporting our own wifi product, and they were showing us how to connect to their Wifi routers and stated "Oh hey! It looks like there's already an SSID here!" The SSID was named something fairly obviously something I'd make. I got a call from one of the Managers "Hey, so we know you have this Wifi router here, and we're not really mad about it or anything, but WHERE THE HELL DID YOU PUT IT?! WE'VE BEEN LOOKING FOR IT FOR AN HOUR!!"
butter_lover@reddit
this is a second-hand story but it checks out. my buddy was working at a semiconductor facility with the facilities team. some guys got the idea to make a lounging and napping space in a huge air handling ventilation space. I'm not 100 percent sure how anyone found out about it because you'd have to be all bunny-suited up and be able to access safety and security protocols to reach this hidden space.
they always said that so much as wearing deodorant in the protected space could affect yeilds of the infintessimally complex silcon manufacturing tools so i can only imagine what these guys getting comfy and catching a nap in the ventalation system was doing to them.
weeemrcb@reddit
Reminds me of Employee of the month (2006)
https://www.imdb.com/title/tt0424993
Frothyleet@reddit
My initial reaction was "aww what's the harm", but yeah if they were diddlin' around on the clock, that's a little hard to defend.
But then my next reaction was, hey wait, how was this not a management failure? Either these guys were still adequately productive for their shift periods, or their supervisors weren't paying any attention. The guys who were watching youtube videos on their phones instead of in the "break room" were apparently good to go.
NteworkAdnim@reddit
This is pretty wild but kinda funny.
WonderfulWafflesLast@reddit
couldn't have even hid the SSID?
using WiFi to begin with for a non-descript situation? Not even a switch with wired cables?
wild
Library_IT_guy@reddit
I feel like with a little tweaking, they could have easily gotten away with it lol.
SemiAutoAvocado@reddit
I mean....
https://arstechnica.com/security/2024/09/sailors-hid-an-unauthorized-starlink-on-the-deck-of-a-us-warship-and-lied-about-it/
Ekyou@reddit
I worked at a public library for a while and the kids were always blowing my mind with what they could come up with. One kept somehow bypassing Deep Freeze and installing their game. Someone had managed to mod the Wii with that mod that makes Super Smash Bros Brawl play like Melee. I guess it’s not a terribly hard mod, but I was still impressed they did it under the librarian’s nose. I didn’t tell anyone about that one, they deserved to play it.
Accomplished_Ad7106@reddit
Oh yeah, the old install on a flash drive and boot from a .bat file.
I did that at the school library. We had 3-4 of us playing whack a mole with the librarian's monitoring software.
thelastbushome@reddit
My public library back in the day didn't have "user accounts", but just an overlay that prevented using the desktop until you input your card number, and provided a timer.
However, they failed to account for the IE shortcut button on the keyboard itself. Which worked, and opened on top of the library login software. I got far, far more than 1 hour a day on the library PCs.
bandana_runner@reddit
I discovered that I could boot the local public library branch's PCs with an Ubuntu disk to avoid the hassle of entering my library card number. The librarian was on top of it and she noticed that the screen wasn't displaying their normal environment. The next time I tried it, they had closed that loophole.
Dergyitheron@reddit
One of the systems written in old tech had SQL injects that only few people knew about. One guy wrote an entire library of scripts he used to interact with the database and do what he would need to do through clicking in the UI, completely bypassing it through the SQL injection.
SupremeDictatorPaul@reddit
This is horrifying…
laffnlemming@reddit
Not using the UI, right?
Dergyitheron@reddit
Yes, he just uses the backend endpoint sending the data that forge the injection in the backend.
laffnlemming@reddit
I worked on ERPs. This is the kind of thing we discourage. lol
Dergyitheron@reddit
Of course, we had to get our hands dirty and patch the 20 years old vulnerability. The point is that the user kept using it after finding it instead of reporting it because it enabled him to figure out more comfortable ways of interacting with the app.
laffnlemming@reddit
That works great until the UI hits functionality that you need.
Also, those UIs suck. I don't blame the users much.
Nosbus@reddit
I had serious case of a tech admin copying prod payroll into test, clearing all monitoring and alerting via sql script., Then browsing what ever data they wanted!
Immediate-Cod-3609@reddit (OP)
Wow.
I worked with a guy who a found salary list at the printer, and scanned it to himself, but this is way more sophisticated.
Nosbus@reddit
We only randomly found out, as we had a trail network monitoring devices in place, which he’s machine had the highest connection counts to our test sql server. We also bought the network monitoring devic
Sintek@reddit
A junior IT assistant created backup task in a windows machine that had access to source code of the companies proprietary application. The task would use small transmissions of data to our cloud provider AWS, which was allowed because we were backing up to AWS.
So he set up an S3 bucket and slowly transmitted small 64MB chucks over the course of a few months because he was in IT and knew larger transmissions would get suspicious.
These small sizes would look the same as an incremental size backup.
The source code was like 12GB he got to like 8 or 9 GB before getting caught because the company had a physical security audit done like a pen tester. He was on lunch in the cafeteria and the pen tester was just walking around and taking pictures of people laptops that were left unlocked.
When they reviewed the images of his machine unlocked and not at the table in the Cafe.. it was his own personal laptop logged into the S3 bucket and you could see the filename of some of the source code files.
It was investigated and he was fired and blackballed.
Apparently he was going to try and sell the source code to a competing company for a few hundred thousand dollars.
The company at the time was worth $400m just from that software.
zenmaster24@reddit
Would this be a pepsi situation where the buyer turns the seller into to the owner? How unscrupulous is this competitor?
Sintek@reddit
No no no.. there was no buyer.. he was stealing to try and make an offer for it to the competition. They hadn't hired him or talked to him.. he was just going to approach them and say he wants a job and a bonus for the source code he has.
The_Wkwied@reddit
We work with client laptops a lot.
In my tenure, I've seen
Not on my team, but I've seen - The company get a DMCA request for pirating movies on our VDI (fired) - Someone try to work remotely from a tropical island country (we block access from countries we don't have business with...)
Nu-Hir@reddit
Person pooping on company time, funny enough, fired.
zeus204013@reddit
But popping takink 5 min isn't big time.
I had to go to wash my hands sometimes more than once (toner) and It was Ok.
Nu-Hir@reddit
I worked for FedEx previously, and currently work IT for manufacturing. I have spent a lot of time washing my hands.
The_Wkwied@reddit
Our boss told us to poop on company time. Best boss I've ever had.
Nu-Hir@reddit
Boss gets a dollar, I get a dime, that's why I poop on company time.
hshtgshrk@reddit
saw fired so much i read it as fried and thought: who the hell fries their employee like welcome to unemployment king ig
Valdaraak@reddit
I can relate to that. I can always tell when the workaholics go on vacation and don't tell us because we inevitably get a support request asking for access while on vacation.
Shadowwynd@reddit
Years ago, the owner of the computer repair store at which I worked made a company policy that cocaine use was ok (improved number of working hours) but hard alcohol (moonshine) was bad (due to skyrocketing stupid errors made by the techs).
The_Wkwied@reddit
There was a very distinct loss of productivity when hard drugs guy got fired. Though truthfully I don't think he was fired, I think he quit to go backpacking in SEA or something. But he worked 30-40 hour shifts and really pulled his weight. And everyone else's weight. But I guess HR didn't like the fact that we had someone bouncing off the walls on illicit drugs. STG I think the CTO was fine with it though.
Ge was one cool dude.
DickStripper@reddit
Caught dude downloading Michael Jackson discography in the Oink.be era of IT. That. Was. Awesome.
zeus204013@reddit
I remember people in some office downloading mp3 in work pcs. Not wanted by IT staff because it wasn't backed up later (angry workers later).
In the 2010 era...
davidgrayPhotography@reddit
When I started this job, I was given the desktop of the previous IT guy. Poking around on the machine and I found a second hard-drive with tons of music on it and quite possibly a torrent app.
Well nearly two decades on, if I ever find the guy, I'll have to thank him for introducing me to Mylo because "Destroy Rock & Roll" is one of my favourite albums of all time..
DickStripper@reddit
I have a hoarder level collection of 25 year old MP3 files that should be distributed on a mass scale.
davidgrayPhotography@reddit
The other week I actually bought a CD (a single, actually) that's been out of print for 25 years and uploaded the contents to archive.org because literally nowhere else had it.
I just wanted it for one specific track but I figured if I've got the CD, and nobody else has it, and the band and featured artist are no longer in the music industry and probably paid them all a pittance for their work, I might as well share it online.
DIYnivor@reddit
Long ago (late '90s) I was hired as the sole IT person for a small newspaper. They fired the old IT admin after they discovered he was running his own business while he was on the clock, and using company resources to do it. Everything was wrong with this place because he hadn't been doing his job. The expensive robotic tape backup unit was sitting in the original box in the corner of the server room—no backups! There was no inventory of any of the hardware (PCs, Macs, servers, switches, routers, digital cameras). Network cables coming into the server room through the drop ceiling were tangled in a big 3 ft high hairball on the floor. No records of software licenses. You get the picture.
After getting backups working (the most important thing on the TODO list), I started by inspecting and inventorying every piece of hardware and software. I discovered that one of the reporters had installed a modem in his computer so he could work remotely. Anyone with the number could have dialed in and accessed his computer; I wouldn't be surprised if someone had, but I didn't find any evidence of it.
Mr_ToDo@reddit
"back in the day" security through obscurity by way of not knowing what number to call for the modem was not uncommon.
Even made it into pop culture. I think it was Hackers where the MC called in and had the security guard read the number on the back of the modem as part of their break in. Kind of a weird piece of history that persisted a little too long(IP's are not the same. Way to easy to brute force, especially when you don't care who's on the other side)
BrainWav@reddit
"I need the files off the BLT drive or the boss is gonna make me commit hari-kari"
That whole scene is probably the most realistic depiction of "hacking" I've ever seen in hollywood.
iliark@reddit
Wargames was good for the era. Matrix (2 I think?) showed a real world exploit that was old at the time, but also 100% plausible that it would still work.
aes_gcm@reddit
You thinking of the scene when Trinity used nmap or OpenSSH against the power station? There was an old vulnerability in the library at the time.
rusty0123@reddit
That's why I liked Mr. Robot. Every bit of code they showed was real life. Not necessarily things that would still work, but stuff that had worked before.
Djvariant@reddit
https://www.reddit.com/r/MrRobot/s/2nTUGBzNLc
rusty0123@reddit
Yeah, those badge puzzles are cool. And you know they're safe to solve. The business cards puzzles are a bit riskier.
Recent_Ad2667@reddit
Plausable? Heck, we were actively wardialing our city and almost had a comprehensive list of every available (responding) modem. We stayed away from the state and feds. Feds don't play.
fresh-dork@reddit
yup. trinity does the disposable bike jump, trashes a guard, and breaks into a power station for reasons
SimplifyAndAddCoffee@reddit
Hackers was simultaneously ridiculous movie hacker tropes and a realistic portrayal of hacker culture and techniques.
Rampage_Rick@reddit
It's funny when you contrast how accurate some aspets were (social engineering, shoulder surfing, dumpster diving, recording payphone tones) versus the stuff that was just abysmally wrong (login with "GOD" password only rather than user/password pair, holes in sheet of plexiglass as "keyboard", turning all traffic lights green as if conflict monitors don't exist)
insertadjective@reddit
I still love that movie though. Big factor in my interest in computers as a kid.
fresh-dork@reddit
i'm sure we still have that in place for some SCADA systems. no password, just a dialup number
bigfartspoptarts@reddit
I worked at a newspaper as a reporter before I started working in IT. I remember the guy who was in charge of the systems didn’t give a damn about anything but backups and software licenses. Security was the last thing in the world he gave a shit about because “we print in the paper everything on the computers anyway.”
WechTreck@reddit
WarDialing was a fancy term for robo dialing every phone number sequentially looking for a response for a non human. Typically to shovel a spam fax, occasion to find a hackable modem.
This was a legit thing last century, working night shift in a empty 300 desk open plan office. The desks were laid out sequentially and it was just one desk phone after another ringing, getting closer and closer to mine. Until eventually my phone rang and I got a earful of fax handshake. The ringing continues down the other desks until it runs out of phones. Our faxes were important enough to have own DDI's.
pdp10@reddit
More often to find a PBX with open outdial privileges, actually. Locating local faxes was accomplished by asking people to put their business cards in a fishbowl for a drawing.
Ok_Size1748@reddit
I found (several times) some users mining crypto in our hpc cluster disguising process as “Python” , “CUDA”, “gcc” or “perl”
Sigh…
2FalseSteps@reddit
I remember more than one story from years ago about users running SETI@Home on work computers, and some were actually criminally charged.
I believe they were noob sysadmins, though. I'm sure the seniors didn't see any humor in it.
Delicious-Wasabi-605@reddit
Now that's a product I haven't thought of for a long time. Guess it's off to Google to see what SETI is up to these days.
hprather1@reddit
There are still active grid computing projects you could contribute to if you're interested. I've been doing World Community Grid since 2005.
aes_gcm@reddit
Been doing Folding since 2011, these projects just keep going.
skyhawk3355@reddit
Not much since it’s been shutdown :(
peanutbudder@reddit
What had been shut down?
Kitchen-Tap-8564@reddit
What are you asking for? There is only one thing being discussed and that is SETI.
Why did you even post? It takes less time to google "SETI shutdown" that to ask a something that implies you haven't been reading the very thread you are replying too.
peanutbudder@reddit
Also, SETI@home is what shit down. The search for extra terrestrial life of (or, SETI) is ongoing from multiple organizations, including the SETI Insitutue, which is why I was asking what shut down.
Kitchen-Tap-8564@reddit
Wow, you are amazing at misinterpreting and assuming.
I wasn't mad, I was laughing at you because it seemed really dumb in a way that was funny.
And it was pretty obvious what was shut down, that's on you for not being able to read - it was plain and clear that the SETI search client thingy was shutdown.
I'm amazed that you thought it was better to ask a group of strangers a fairly dumb question instead of 1s of googling.
Not mad, laughing at the dumb. But you go ahead and keep up with that dumb, seems to be working well for you.
peanutbudder@reddit
Okay girlie pop.
Kitchen-Tap-8564@reddit
Sir, what does that even mean?
MentalSewage@reddit
What are you asking for? There is only one thing being discussed and that is Girlypop
Why did you even post? It takes less time to google "Girlypop" that to ask a something that implies you haven't been reading the very thread you are replying too.
peanutbudder@reddit
Are you okay?
jmbpiano@reddit
The SETI@home project has.
The SETI Institute and the Berkeley SETI Research Center (who launched SETI@home) are both still very much around.
Bob_12_Pack@reddit
One of our networking guys used to do that on machines in our data center. Everyone knew, nobody cared. He did it for years and was a top contributor. We're a university so I guess it could have been considered research.
2FalseSteps@reddit
I worked a contract at a research facility that had a grant to run a cluster whether it was used or not. It pretty much just had to be "available".
It wouldn't surprise me if your university did consider it research. They're getting paid whether it's running or not, so what's it going to hurt? As I recall, the client ran only when the system was idle.
SimplifyAndAddCoffee@reddit
back in the day, electricity and CPU time was cheap, and running SETI/F@H was a common way for college and other academic IT admins to dick measure their lab hardware on the leaderboards. It may have been frowned upon by the institution admins but what they didn't know couldn't hurt them. As long as all the PCs worked nobody cared.
PsyOmega@reddit
I "recruited" tons of computers at my uni for FAH. Had it on a thumb drive ready to go, it was one of those live boot
toram
solutions. I'd hit up the labs after the profs went home (we had keys issued as students), spin up as many as i could, and left. Got many nights worth of compute that way (x 30 pc's)Eggtastico@reddit
Happened at a place I worked. Seti was replaced with bitcoin. Ive always wondered the value on that wallet. Nerdguy was into that kind of crap.
hprather1@reddit
I installed a similar grid computing client on the pc we used when I was 20 working for Geek Squad. Almost got in big trouble for it. One among many of the stated and unstated rules I had to figure out as a working adult.
hells_cowbells@reddit
I've always joked that we should do crypto mining on our HPCs. They could pay for themselves! For some reason, management never seems to go for that idea.
brelkor@reddit
I worked for a company that did farm until we could launch our main product. Call it creative funding
rura_penthe924@reddit
Small neighboring school district had some teacher/coach bring in a couple bitcoin miners over the summer. Only reason they found out was cause a tech who knew what they were found them from a network cable strung to behind a desk.
dougmc@reddit
Seems like these things are usually caught from the network side, even though they're stealing power more than bandwidth.
Sounds like if somebody is serious about getting away with it they should just get a cellular access point and use that for network connectivity.
(On the flip side, maybe they do, and they don't get caught and so these aren't the cases we hear about!)
Ziegelphilie@reddit
I mean, how many of us are actively monitoring power usage? I can hook into the smart meter at home but I don't even think we have one of those installed at the office.
dougmc@reddit
But even the smart meter at home only gives totals. Somebody might notice that the consumption went up, but to tie that to something specific would require a lot more research.
A PC or two could be easy to hide, though the noise from the fans or the heat might eventually be noticed if it's in a place where such things are not expected. A whole bunch of PCs ... that's harder to hide.
Either way, it seems destined to eventually get somebody fired, and for not that much money.
ErikTheEngineer@reddit
Ah, but if you were smart and started early - even if you stopped and said "this is stupid" when you had had 100 bitcoin you could have a nice retirement nest egg. I wasn't smart, so I continue to work.
I'm a very honest person but still kind of regret not using the entire mini data center/lab filled with mostly-idle equipment I had access to to mine crypto back in the day. Oh well, at least I didn't get fired over it.
SerialMarmot@reddit
And for a decent sized school or office building, it may not even be that noticeable of a change in draw
Barbarian_818@reddit
I'm reminded of a tale from the early days of 2600 of a guy who installed a cordless phone base station into a phone booth powered from the lamp circuit.
I just can't remember if he jiggered some way to mimic coin drops (which was also a thing) or used one of the dry loops not connected to the booth phone.
GraittTech@reddit
Ex colleague of mine straight-up asks his clients if it's ok for him to use a bit of unpopulated rackspace and negligible amounts of network bandwidth to house a miner or three. Not sure if mentioned the power cost side of things. Could easily imagine some of those clients would've ok'd it anyway as it would barely have moved the needle on the overall IT spend of those companies.... but spread over time and over many clients, guy was quietly setting himself up a nice little retirement fund.
Jkabaseball@reddit
We are people more knowledgeable about networking than power.
Demeter_Crusher@reddit
PAT testing might well pick it up... or slide right over it and mark it with the official-looking stickers that all other equipment is marked with.
tech2but1@reddit
In the grand scheme of things the power usage will have been minimal. Unlikely you'd notice a couple/few extra kWh here and there on a school or large office.
Cleveland_S@reddit
Pretty much. Any fluctuations in hvac usage could hide a lot of shitty little asic miners.
BrainWav@reddit
Makes sense. It's generally easier to track down odd network usage than power. How often do you see a facility with meters more granular than per building? Plus, even if they're not found via monitoring, a stray network cable tends to stand out much more than a stray power cord.
dougmc@reddit
When we set up our new server room in the new office, I floated the idea of a meter to give electricity usage for the room, something like this (but not so "cheap", though this exact device might have been adequate) just so we'd actually have usage data for the next time we have to scope this out, but it kind of fell through the cracks.
Either way, it struck me as something we should try to track.
spobodys_necial@reddit
Had a professor install miners on a handful of media workstations (read: repurposed gaming desktops) on an unmonitored vlan. Once we found out who did it, the CIO took over from there and that was the last I heard about it. The professor was high-profile so they probably just got a polite "please don't do that again" from the dean.
BtyMark@reddit
Long ago, in a Galaxy far away….
The guy who maintained our “Golden Image” added a bitcoin miner. At a major laptop manufacturer.
BlackV@reddit
Those are not users, they are admins, unless you mean they just happened to have store the executables on file shares
ncc74656m@reddit
TBF I am sorry I never did set up a miner on a network I used to run with about 20,000 devices. Deploy to run only on idle, avoid any of the IT or VIP PCs, and some other highly sensitive ones, and boom, I could've mined for a couple years til they started scanning for that stuff, by which point I'd have been long gone.
(Not that it'd have mattered - I believed firmly that it never would've amounted to much more than an easy few grand, so I'd just have taken whatever I had and sold it the moment it hit $1,000, lol.)
IllllIIlIllIllllIIIl@reddit
I'm also in HPC. I used to do a nightly query to try and find crypto wallets so I could steal them ;P. Sadly never found any.
punklinux@reddit
We had a former CTO doing this, many years ago, back when bitcoin mining was more lucrative. It was estimated that he made hundreds of thousands in a five year span. I remember at the time, almost $2mil in bitcoin was in question; I can't imagine what that would be worth now.
RikiWardOG@reddit
reminds me of a helpdesk person at my last gig that was caught installing miners on new user laptops. fucking christ people are stupid.
FreshSky17@reddit
Not saying it's something I would do.... but IF I had old equipment and IF we weren't due for an e-waste run... I personally would not feel bad my employer is using extra electricity..
THE_GR8ST@reddit
What happenned to them, they got fired right?
Lost_Amoeba_6368@reddit
why was this one so funny to me
Jawb0nz@reddit
There was a Global IT team that worked nights to let the admins/devs sleep and it was tasked with handling the issues they would normally be woke up with repeatedly throughout the week. Over time, they became very good at what they did, and the problems became fewer. A number of them liked playing D2 multi or one of the Command & Conquer suite.
A mini-LAN was stood up in that cubicle to handle all of the game traffic and all night campaigns happened. It was glorious. The LAN nazis down the hall had no clue.
According-Vehicle999@reddit
My predecessor built and hosted a media server with company-owned equipment. He had also used his company card to do all kinds of personal computer purchasing and had a bunch of his personal packages sent to our building, including a glock (I know because he pulled it out in the car and tossed it into my lap).
He was an interesting guy though, very entertaining; there are pictures (taken by fellow teammates who were able to see everything in plain view from our building) that show how much entertaining he did with some of the ladies in our building too.. anyhow.. once he was gone, the IT managers had been trying to get into the last server left to be inspected and couldn't get into it.
I'd just come from a computer repair shop and was a temp they hired to help transition to the company that had just bought them (so presumably my 5 minutes were up any time) but I did enjoy breaking into that server on our conference call and reporting back what I found. Nothing wild, a lot of music, a bunch of local radio show episodes and a small amount of adult material.
His company easter eggs were the gift that kept on giving for a good 5 years afterward. I'm sure he'd be very satisfied with that.
Simple_Size_1265@reddit
Laptop User with AutoCAD who complained aber AutoCAD not being registered properly. Tinkered around a while, till I found out that the just bought the same Laptop that we used at the Company and then tried to get IT to register all the Software for him.
First-District9726@reddit
I think this one wins the thread, this has got to be the dumbest idea of them all.
tech2but1@reddit
TBF they did "tinker around for a while" before discovering the con so it nearly worked! Some lesser helpdesk person may have just as easily gone straight in and registered it.
Geno0wl@reddit
First step of getting a new item is slapping our inventory sticker onto it. Machines are internally named in the controller based off that asset tag. Even a newbie tech would eventually figure out that the machine wasn't properly in the inventory and then should start asking some very obvious questions.
Siphyre@reddit
Shit, they might even start making assumptions that "this one got missed" and just enroll the entire thing into the company mdm.
CommercialSpray254@reddit
imagine thinking you're slick for tricking IT into registering your device only to find out your new laptop is now considered company property
Siphyre@reddit
It would be a headache for HR when termination time comes around...
meeu@reddit
you guys keep track of inventory?
Sadix99@reddit
yes
Otherwise-Falcon-885@reddit
I don't think so: the machine is not in domain.
hackersarchangel@reddit
Small enough shop may not have a domain especially when it costs an arm, a leg, and a kidney between the license, the server, the CALs, and the programs you need.
The_Autarch@reddit
All you need is a Business Premium license.
hackersarchangel@reddit
For what exactly?
Jake_Herr77@reddit
I mean a user in the know could add 10 devices to the domain pre 10. Domain add elevated rights is not default.
Glittering_Evening78@reddit
and like I wasn't gonna wipe and format the shit outtivit 2 lol
Bladelink@reddit
That's honestly pretty clever. It would take me a long long time to get down my troubleshooting brain-list to "wait this actually isn't even a company machine". I guess I'd probably go looking for asset information or IP related info and find nothing, and that would all be sus. But even with all that id probably assume some inventory mistake had occurred rather than it being malicious.
SimplifyAndAddCoffee@reddit
Wouldn't work here... for one, if its not domain joined we'd notice right away. I can't think of the last job where this wouldn't have been the case. My current place also has the network locked down with mandatory compliance monitoring agents so any system that didn't have our security software on it, registered, and in compliance would be flagged immediately and prevented from connecting to the network.
Bladelink@reddit
You don't have any user owned devices on wifi? Odds are that something like this would maybe crop up in our ITsec's intrusion monitoring type stuff, since it'd likely be a host with abnormal traffic to a bunch of internal services and stuff. But there's no special rule at most places that says you aren't allowed to have your own devices on premises.
SimplifyAndAddCoffee@reddit
No, our wifi requires certificate validation provided by MDM. If users have their own devices they have to use public wifi or cellular. We do not have BYOD here.
kitolz@reddit
Not being prompted to enter an admin password when making g a change would have probably clued you in.
GroteGlon@reddit
Depends. 7 in the morning after staying up too long? Prob wouldn't have realized. Friday afternoon while doing overtime? Prob wouldn't have realized.
wc6g10@reddit
Or not having a CI ID assigned to it
Lotronex@reddit
It's possible their environment allowed anyone to join to the domain. You could buy the clone laptop, setup local admin accounts, then bring it in and domain join it. Have help desk install and license the programs, then take it home.
Cuive@reddit
I'm not so certain you can join a device to a domain without domain admin credentials. If there is a way you can create some kind of auto-join I'm not aware of it.
Frothyleet@reddit
If you have not set or checked the setting in your AD environment, surprise! Probably any user can join computers to your domain.
MrMaarten92@reddit
By default any user can join 10 (or was it 5) devices to a domain
Cuive@reddit
This is what I guess you're talking about. Never worked for anywhere that delegated writes to users to add their own devices to the domain. Always been a Domain Admin thing in my world.
peanutbudder@reddit
That's just a user type that isn't limited in the amount of devices they can register to the domain.
MrMaarten92@reddit
https://learn.microsoft.com/nl-nl/troubleshoot/windows-server/active-directory/default-workstation-numbers-join-domain
tdhuck@reddit
It should not take you a long time, you should have a MDM or some type of inventory system where you'd be able to see the machine you are working on is not the machine that's owned by the company.
For me, the remote program I'd use to remote into that PC would be the dead giveaway as their machine wouldn't be in that system if it were not a company PC.
First_Jam@reddit
nice plan,
simply join private notebook to domain with regular domain user
let IT install the software on the local user account
remove domain binding
profit
Significant_Swim8994@reddit
"I noticed the work laptop had not been security acid-marked or properly registered in our system, so I went ahead and fixed that. However I was unable to fix the issue, so I ended up having to scrap the computer, as not even a reinstall of Windows fixed it.
Since it was not properly registered, but you have another PC registered to you, it must have been an extra PC from your department. If you need the extra PC, please have your boss request a new one."
Then watch him panic... Of course you did nothing to the PC, as it is his private property, but when he complains; bring the matter to his boss and hand over the PC to his boss.
architectofinsanity@reddit
And they said asset tracking was a waste of time.
Icy_Panic_5860@reddit
Lmao
EnterpriseGuy52840@reddit
How long was this ago? Autodesk supports home use if you license with named user - it's just use your work Autodesk account. So if this was recent with Autodesk trying to push everyone to named user, this doesn't even appear to be a licensing violation.
https://www.autodesk.com/support/account/admin/home-use/products
Skullpuck@reddit
That's awesome. Was there any fallout for him from this?
Hangoverinparis@reddit
Shit did the guy get fired? This seems like such a risky move for free AutoCad
havens1515@reddit
That was going to be my question as well. I hope he got fired for this. This is stealing
lol_umadbro@reddit
Had a faculty member use Migration Assistant on a Mac to transfer all of the Adobe Creative Cloud and Microsoft Office suites from their work machine to their shiny new personal iMac.
They also transferred over JAMF management, so we quickly saw a new device not in compliance and not in any static inventory groups.
That was a thrilling conversation.
McAUTS@reddit
That would be neat: Intunes and RMM in my environment here and it wouldn't be working. Creative idea from the client though.
Mr_ToDo@reddit
Hell of a gamble
Weird too. Sounds like you guys used laptops anyway so if he had one to use what was the point?
Suppose they might have been either wanting to do things on the side or thinking about leaving and wanted a copy. Either way it's an expensive learning curve on the way to piracy.
Actually. You know if they were going that far depending on other software installed and asset tracking they could have just damaged the drive on the new one, said it was the old one and kept the old one for themselves and tried to have you put a new drive and reimage the new one as if it was the old. Would have been an issue if you tried to warranty it but it would have been one level sneakier.
mini_market@reddit
💯 for effort
spyingwind@reddit
Modified mouse that had a switch in the bottom. The switch was wired up to a small microprocessor that spun an unbalanced micro motor every 29 minutes for a split second.
Was found out all because a coworker had misophonia.
Mr_ToDo@reddit
I had a user who's mouse had a twitch. Drove me nuts. Mostly because our remote software at the time was set up to give up control for X seconds if the user moved the mouse(nice feature normally).
Not nearly as bad as the user who's mouse was a few degrees misaligned. Their "left" was left and a bit up.
Why are those the kinds of user who don't want equipment changes?
Iseult11@reddit
It's like when your wheel alignment in your car has been off a couple degrees for years and you don't care to get it corrected
SimplifyAndAddCoffee@reddit
Let me guess, a logitech ergo mouse... the sensor was offset on the bottom so if you moved the mouse by pivoting your wrist, it would move off-axis. Annoying as hell.
Mr_ToDo@reddit
Na just a generic mouse, same as a few others. It really was a one off weirdo
rsysadminthrowaway@reddit
A mouse with a built-in jiggler? Now that's thinking outside the box!
RoosterBrewster@reddit
More advanced than tying one to an oscillating fan.
tech2but1@reddit
No, it was inside the box!
BlackV@reddit
shakes fist
Alice-Xandra@reddit
WSL tor relay
Reinazu@reddit
We have one user who decided to start up his one mySQL server on his work machine. He also threw up a web page for his coworkers...
I met with his supervisor to explain that we have an official web server for things like this, and his actions are creating a security vulnerability. The supervisor said the whole team is using the things he made, so don't take it down...
It's really frustrating when all they had to do was come to me or anyone else in IT and say, "I need something that does X and Y," and instead, employees are allowed to do whatever they want.
waxwayne@reddit
You have to ask uncomfortable question about why users don’t want to deal with you.
Snuzzlebuns@reddit
Often the answer is that through the official process, you might get the thing you want in a few months, while you can have Steve's jerry-rigged solution this week.
waxwayne@reddit
I had a dev team tell me it would take 2 months to change the wording on an internal web app. The time it takes and the approval framework can be frustrating.
Snuzzlebuns@reddit
I bet. In our company, most departments are at such a high work load, anything of normal or lower priority just doesn't get done, ever. If you could prioritize your own tickets, everyone would just set theirs to high. But with someone else trying to objectively prioritize everything, you often get the feedback "the only way you'll ever get this is through shadow IT".
Reinazu@reddit
Normally, yes, though this case is a little different. Most users are happy to come to use if they need a new feature or tool.
This particular user, however... I'm pretty sure he has a grudge ever since we had hired a new member internally and passed him over. Since then, he's basically become a shadow IT and has been inserting himself into any situation to "prove" he should've been the one promoted. And I guess somehow his supervisor is convinced that we're "too busy" to add minor tools or features, and this user will happily "step up" to provide a solution, even though it's copy/pasted code from AI.
SimplifyAndAddCoffee@reddit
Ugh, kill it with fire!
I would never trust a user to code something with an AI assistant. I would hardly trust most seasoned IT admins I know to do it. It's more about sensibility than knowledge, really... most people just do not have the mindset to assess risks and prioritize safe and secure failure modes when creating scripts etc to use as shortcuts to do their work.
It's like trusting someone at a party with a retina-destroying laser pointer. You have to know them to know they will take safety seriously, or you're gonna be hella uncomfortable with them waving that shit around.
This is also why I won't do range days with people I don't know. To many goddamn idiots will sweep you with their barrel. It's always the same kind of people, and they are everywhere.
waxwayne@reddit
Makes sense. Sounds political.
DadLoCo@reddit
I can answer that. Predecessors were gatekeepers and jerks. I want to enable people to do what they need in a secure way but bcos of the legacy most won’t even engage with me.
davidgrayPhotography@reddit
"Because I knew IT would say no" is one I've heard recently. Dude wanted to install a billion and one programs onto his machine but because he didn't have the admin password, he couldn't, and when he tried to go around IT and complain to the big boss about IT not catering to his esoteric needs, his excuse was essentially "because IT would tell me no"
So the big boss basically said "I refer the decision of whether to allow that software back to the IT manager", and of course the manager's response was "I already told you no"
HistoricalSession947@reddit
This needs to be asked WAY more often In this sub 😃
koshka91@reddit
Bingo. People don’t want to deal with a demographic that’s known for nastiness and rudeness.
tartarsauceboi@reddit
Im going to play devils advocate here, not for the end users but for other IT techs in these situations. Let me explain:
We have a sysadmin who i sort of work under and the guy is incredibly dense. Nothing gets done because he basically thinks that anything me or the other helpdesk come up with that might be a good idea is a hackjob or might get us hacked again.
I explained we should setup a proper truenas server instead of using windows file sharing and properly set it up with a raid 1 or 2 setup so there redundancy but the transfer speeds will be better. We will have better ACL setups and control.
He saw that they sell the truenas in prebuilt NAS options and said it's proprietary and that's not a good idea. "What if it breaks?"
I explain no, it's just a free ISO you would load like windows 10 or 11 and install it. But because he got this initial feeling of "its proprietary, I don't like it" now we're not even considering it. Ffs.
So when you say, you'd wish end users would come up to you and ask, I guarantee you they have a feeling you'll react just like my sysadmin does and just deny it outright and it's not worth a damn to try.
MarquisEXB@reddit
On the other hand we get pseudo IT folks that think they know what they're doing and take matters into their own hands. They'll make their own file server, permission it as an open share, put critical corporate data on there, and then get ransomwared without having a backup. This is with our company having a robust storage department that could easily setup a secure share with backup for them. But these pseudo IT folks always think they know better.
So I'm not a huge fan of "shadow IT".
tartarsauceboi@reddit
I totally understand that. I wasnt talking about shadow IT. I do Tier 2 helpdesk. im regular IT
Reinazu@reddit
I can see that. In his past jobs, his IT department probably rejected him outright. But in this particular case, I have the opinion he has a grudge for passing him over when we were hiring internally. Since then, he seems to always be inserting himself into situations to prove he can do IT tasks. If some of his work didn't look like copy/pasted code from chatgpt or stackoverflow, and if he didn't seem to break half the things he was trying to fix, I'd at least give him a chance. I guess in that sense, I would be like your co-worker.
BlackV@reddit
No I agree with them your are wrong (without more context)
Better ACL control? Why? What about domain users? What is "better'?
Raid 1 raid 2 ?
Who is patching maintaining that?
Who controls security on that?
How are you backing that up?
Soap-ster@reddit
What does he think Windows is?
Remarkable-Host405@reddit
commonly supported, already paid for
Remarkable-Host405@reddit
i mean, there are many windows servers set up with windows file sharing. that's what we used at my company, before migrating to azure. i have no idea how the backend looks
narcissisadmin@reddit
He probably rejected it because you wanted to use RAID and not RAIDZ
zfs_@reddit
Seriously? A free to use BSD with storage utilities and a web UI is “proprietary” and bad, but Windows file sharing is chill?
What is he, stupid?
dougmc@reddit
We bought two TrueNAS boxes and they did fine for what they were bought for.
But I got tired of TrueNAS itself, so I wiped the OS and just installed FreeBSD, which worked fine as well but was more familiar when it came to administering them.
Bladelink@reddit
looks at username
sus lol
dustojnikhummer@reddit
Scale is Debian, almost nobody sane would use TrueNAS Core (let alone in corporate environment)
zfs_@reddit
My bad, slight distinction difference. Still the same concept.
What is he, stupid?
dustojnikhummer@reddit
Yes
LankToThePast@reddit
I agree with your sysadmin who didn't want to setup a truenas system. "Hacked again" means he needs to tighten up the environment, and likely can't afford putting forward the use of a new system that he doesn't fully understand. It's not for the reasons you've mentioned exactly, but I understand his point of "What if it breaks?". If he doesn't know what truenas is, or hasn't worked with it before, it's a system he would need to put time and effort into understanding. He needs to know the answers to many other questions as well.
How do I back it up? How do I secure it? How reliable is the system? How do I get notifications for issues? How do I find out about updates and new releases? How do I use it to help our current environment? How do I get support for it when something happens? How do I justify spending time building this system vs a windows system that we understand? How do I make sure I'm not the only one supporting it?
So the "what if it breaks" is totally valid, and it's his butt in a sling if it doesn't preform or has a problem, and his time to learn to set it up. I would keep using windows, and normal file shares unless given a clear and useful advantage.
tech2but1@reddit
I've got a customer like that. The amount of times we've done something the hard way because they've got the wrong end of the stick entirely is infuriating.
dustojnikhummer@reddit
Does he not know HPE and Dell sell servers with Windows Server preinstalled on the raid array?
sorean_4@reddit
I’m sorry but that not a great idea. A user coming to IS asking for a specific NAS distribution?
The IS will run what the IS understands and what they can support.
From the user perspective hey this is cool software that will be great to use and it will be faster
From IS perspective: IS staff training on setup and configuration, maintenance, performance testing, user mapping changes to the shares, data migration between platforms. backup and recovery testing, DR replication etc….
Unless you have some major pain points the ROI on the change is just not worth it.
IS should listen to staff however addressing the pain points it’s their jobs and selection of platform to address the issue.
Mr_ToDo@reddit
Well he's right and wrong
There's nothing wrong with not doing every random project. But at the same time there's a point in addressing the needs and wants of the end users.
Hacked again sounds, um, fun. I'd say for a NAS, or anything really, if he isn't willing to put in the time to actually learn an environment then it really might be more secure to not have it(for the wrong reasons sure, but still). I do know I've put objectively worse performance solutions in place simply because I or someone else can't maintain(or possible put in the time required to maintain) the better ones
Although "raid 2"? Like Z2?(maybe 10?) because as far as I know in the standard raid levels 2 is not really used anymore. Lot's of different configuration options in Truenas for speed depending on how it's being used, but the more tuning you want to do the more you need to know about how it works(And my ability there is not so great myself)
AgentD20@reddit
Damn, that guy sucks.
tartarsauceboi@reddit
I understand his cause for concern and precausions.....but like just setup a basic isolated network to test it in if youre so scared. its FREE. you dont like it, scrap it. but atleast give it a shot.
iCashMon3y@reddit
So many red flags. Why are end users allowed admin access to their computers? Was that page reachable via the internet? How does your security possibly allow that?
Reinazu@reddit
The biggest concern, no its not reachable from the internet. I made sure to block all traffic to his mac in the firewall from external networks, and the guest/IoT/VoiP vlans.
But for users having admin access, that's how the devices were set up for the majority of user devices before I joined... Small company and the leaders up high don't care too much about how things are set up, as long as they don't hinder workflow, which blocking employees from installing new software apparently does. Hell, my biggest complaint about that is that we have people editing photos and videos directly on the ftp server through an smb connection, and refused to make local copies to work on because "It's takes too long copy these 4K image files back and forth".
So yea, security is pretty lacking, and any changes need to be passed by someone higher level, and most of the time, the answer is "It's works how it is now, why change?" Literally all I can do is wait until something happens, and have a "I told you this could happen" moment. Hell, just getting the firewall replaced with something that wasn't accessible and managed by the third-party original installer felt like moving a mountain.
iCashMon3y@reddit
I would highly recommend sending an email highlighting the security flaws in detail to your boss and any higher ups that make decisions. Local admin access makes it very easy for threat actors to traverse your internal network if you get breached. It also opens the opportunity for someone to install a backdoor. I would also recommend making as many changes as the company will allow to tighten security. Also make sure that you document everything you have done, and document every time that you let someone in power know that you are vulnerable.
Basically cover your ass, I know you don't want to be in a "told you so" situation, but you would much rather be able to outline all the steps you took and all the times you were told no.
Firthy2002@reddit
This is why SMEs are very tempting targets.
fahque@reddit
Why would you assume that?
Gadgetman_1@reddit
There's at least one 'web server on an USB stick' out there that doesn't require Admin rights.
This is why we use Applocker and disable running anything from any folder except C:\windws and C:\Program files and their subdirectories.
flammenschwein@reddit
Sounds great, I just need to document the system. Send me what you're doing for backups for this critical resource, how you're managing redundancy, documentation in case the owner hits the lottery and leaves, the Git repo where the code is stored, and what the upgrade path is when the OS is out of support. Here's the results of the most recent Tenable scan, the vulnerabilities need remediated ASAP. Oh yeah, and we'll make sure to add the user's workstation to all of the server policies including restricted access to the internet. We'll also make sure you're included in the next audit. Kthanksbye!
Agoras_song@reddit
If people come across waving their dicks like that, the users will think IT is actively hating them. Managers will have the backs of people who want to get their work done.
flammenschwein@reddit
What part of that is unreasonable? And especially, which part of that isn't something that IT isn't required to do for their own systems?
My post is more to illustrate all of the hidden labor that goes into running a successful IT shop. IMO if there's shadow IT going on, it's a failure on IT's part to meet the needs of their customers/users. Idk what happened in this particular case, but if it were in my environment I'd have praised the user for their creativity then worked with them to move it to better-supported resources.
ITaggie@reddit
You're not wrong, but responding to them with a Wally Reflector would be needlessly hostile.
Agoras_song@reddit
The thing is, it's not unreasonable. But you have to realize that at the end of the day, we are customer service. We need to act like it. We don't have to be slaves but we need to be respectful to the fact that someone is trying to get a job done.
We shouldn't be like that guy in Surrounded By Idiots who keeps talking about compliance but people see him as an obstruction to the business.
fresh-dork@reddit
i'd probably migrate that shit to a supported environment; seems like it's a bona fide use case, just a shitty setup
Reinazu@reddit
The sad part is that they mostly use it just to print off some 4x6 labels for inventory. The rest is basically running a report on a third party site, downloading a csv then uploading it to his site to import to his mysql, and then it spits out another csv with things organized a different way. The problem is that most of its functions, our internal web server already does but with direct sql database access, so the data is always up to date, or is something minor that could probably be integrated within a couple days if they'd just speak up...
fresh-dork@reddit
right? now that you know about it, getting the thing in a rational form that works properly and doesn't require tending from their squad or the security holes they probably have can turn into a good will thing.
1stPeter3-15@reddit
"But why would I jump through all of your hoops when I can just set something up quickly myself?" - End User
The age old IT problem. We're held accountable for doing it right when they can simply do it quick.
bamboo-lemur@reddit
People do this because IT is slow to get things done and won't allow them to do things the way that they want. So they end up with a hack job like this.
djmonsta@reddit
A remote user renamed his personal laptop to be the same as his corporate laptop to try and log into company resources undetected. Yeah didn't work.
withdraw-landmass@reddit
I can totally relate to "rouge VM". Orgs that install Crowdstrike on developer Macs are just silly. Partner did a bench of their MDM'd M4 Pro vs a personal M1 Pro evaluating the same Nix derivation. The M4 took 3 times as long just based on how much it bottlenecked IO. It got worse when actually compiling.
bao12345@reddit
Your options are network access or an AV. You might think that you’re great at avoiding malware, but anyone is susceptible. Maybe it isn’t you that gets compromised, but another host on the same LAN…then you become a juicy target for lateral movement, because they could sit on your machine unnoticed because you lack an AV. Your host will become the distribution point for malware throughout the organization.
Don’t care how technically proficient you are, suggesting that installing anti-malware is a bad thing is pretty silly. That demonstrates a lack of awareness. Perhaps your IT security team needs to train you better, or you can train your selfish on the tactics and techniques used by threat actors.
MorallyDeplorable@reddit
You sure drank McAfee's kool-aid, didn't you?
bao12345@reddit
If you handle sensitive information, it should be protected. If you get compromised, it should be detected. Once you are compromised, data exfiltration and lateral movement should be difficult, and we should have tools and features capable of further limiting the damage and removing the threat. We should have logs for post-mortem analysis and policies & procedures for learning from the incident.
Many of these objectives aren't achievable without deploying modern security solutions. If you have a viable alternative, I'm all ears.
If wanting to prevent the company I work for from shutting down for a week because of ransomware is drinking "McAfee's kool-aid", then I'm cool with that. I'd much prefer that than be the guy who lets everyone do whatever they want, and when a compromise happens I'm the "leopards ate my face" guy.
MorallyDeplorable@reddit
These are not things an intelligent person would say regardless of how you dress up your posts. What you are saying is nonsense. There's nothing to respond to because there's nothing there of substance. It's word vomit imagined by a CEO, not actual concerns based in reality.
Your entire threat model is bullshit that was imagined to scam people into buying overpriced performance-hampering garbage. You don't even seem to know how malware spreads between hosts in a network. You're missing the basic fundamentals while trying to make giant sweeping claims. It's rather pathetic.
I know you're just going to respond to this telling me how great you are and how many gibsons you've hacked, so I'm just going to preface that with this: Any monkey with $5 can give out job titles.
bao12345@reddit
Okay, counter my claims. That’s how debate works. Instead of attacking the words, how about debating the substance? Otherwise, you’ve contributed nothing to this conversation other than vitriol.
MorallyDeplorable@reddit
What is there to counter? You have said absolutely nothing in support of live heuristics, lmao. You just rambled about auditing and paper trails and nonsense about fantastical cross-host attack vectors. None of what you said even attempts to back up what you originally claimed.
bao12345@reddit
Okay, it sounds like you're just angry and want to vent. You should try this instead of social media: https://www.supportiv.com/tools/need-to-vent-anonymously
You can also leverage tools like rewordify to reinterpret some of what I've said so you can better understand it. https://rewordify.com/
If you'd like to learn more about cybersecurity best practices, here are some resources for you:
CISA - https://www.cisa.gov/topics/cybersecurity-best-practices
CIS Critical Security Controls - https://www.cisecurity.org/controls
NIST CSF - https://www.nist.gov/cyberframework
MITRE ATT&CK - https://www.mitre.org/focus-areas/cybersecurity/mitre-attack
When you'd like to contribute meaningfully with an argument against EDR, that argues against the best practices laid out in the frameworks mentioned, then I'd be happy to engage further. Until then, I suggest you take your ad hominem attacks elsewhere.
MorallyDeplorable@reddit
Lol, so anyone who points out how much of a clown you are is just angry?
MorallyDeplorable@reddit
You're not an intelligent person regardless of how you dress up your posts. What you are saying is nonsense.
Your entire threat model is bullshit that was imagined to scam people into buying overpriced performance-hampering nonsense. You don't even seem to know how malware spreads between hosts in a network. You're missing the basic fundamentals while trying to make giant sweeping claims. It's rather pathetic.
withdraw-landmass@reddit
I don't buy into the lie that security is a product (except to say "we did the industry standard shit" when you get owned as insurance) and that this software is anything but a remediation tool.
That aside, common endpoint security vendors are the worst, because they have zero incentive to provide a good experience. You don't have to convince end users to keep your software installed. The collective time and watts wasted by major AV vendors is something I don't even want to imagine, because it'd just make me angry.
Now don't get me wrong, I don't think I or anyone is invincible, but if I get hit it'll probably be a supply chain attack of some kind that messes up my .profile or something along that way. On a large enough scale, compromise is a fact of life. I see a lot more value in getting your configuration right, rolling out zero trust and just-in-time access to systems and making this process easy to follow so everyone has the right incentives to not have to work around a shitty tool that insists on scanning the same goddamn files (on a copy on write filesystem) every time I try to access it.
I liked Kollide a lot. Shame it only works on Okta and is now restricted to be a value-add to 1Password Enterprise. I'd very much recommend their manifesto: https://honest.security/
I held the title of Cloud Security Engineer for a while. I better train myself.
bao12345@reddit
I’m an IT Security Director. Came to the leadership track from engineering.
Heuristic detection looks at the behaviors and actions of files on your machine - what is the thing doing, not just whether a file matches a signature. That’s why your AV is scanning your every action…because files change, and when that happens, malicious activity can be embedded in it, or the action itself can be part of a broader group of actions being performed by a malicious actor.
For a more comprehensive understanding of what anti-malware applications are really doing, I’d suggest researching how an EDR works. Perhaps with greater understanding, you can appreciate that EDRs can detect and respond to zero-day attacks like what you describe.
Something like 9 out of 10 breaches occur because of users’ lack of awareness or understanding. While the majority are social engineering attacks (ex. Phishing), many are just lackadaisical approaches to basic security. Many supply chain attacks, for instance, could be prevented with File Integrity Monitoring or Privileged Identity Management, or a good EDR.
That said, ZTNA is good. EDRs contribute to ZTNA by assessing every file save for malicious activity. It’s in the name: I have zero trust that you are not acting maliciously, so I’ll assess every action you take. No good ZTNA implementation lacks Defense-in-Depth.
You’re also right - compromises are commonplace now. It isn’t really about stopping it before it happens, but about detecting it as quickly as possible and impact reduction. EDRs improve Mean Time To Detect (MTTD) and Respond (MTTR). By not having one, an Advanced Persistent Threat (APT) can park themselves on an unprotected host and lie in wait in your environment, quietly distributing ransomware to your whole fleet and exfiltrating sensitive data. This is why there should not be any exceptions to deploying an EDR unless the host is extremely walled off from network access.
To suggest we shouldn’t use EDR solutions because they can’t prevent malware is like suggesting we shouldn’t wear seatbelts because we can’t prevent car accidents. I hope you improve your understanding of modern IT security practices and develop a greater understanding and appreciation of what your security team is doing for you.
withdraw-landmass@reddit
I didn't really come here to play infosec vocabulary golf with someone talking down to me after completely moving the goalpost from "EDR sucks and is untenable for developers" and "security is not a product/purchase" to giving me the standard vendor "you just don't understand how *good* our heuristics are", sorry.
bao12345@reddit
You indicated it was "silly" to install an EDR solution on a developer's Mac.
Your argument is that your productivity is more important than the security and reputation of the business as a whole.
I've tried to tactfully convince you that, not only are you wrong, but you are the kind of operational risk leaders like myself use as an example of what not to do.
withdraw-landmass@reddit
Buying someone a top of the line M4 Pro and then cutting the legs off that ultra fast storage with a piece of software that has no incentive to care about performance is not silly to you?
You read some kind of absolutism into what I said, but I never said you should not find some sort of compromise.
And you have zero context for this specific situation either. That company tolerated completely unmanaged devices and their security culture sucked. They most definitely considered slapping Crowdstrike with zero performance tweaking on new laptops to be a security purchase.
bao12345@reddit
You’re right that I have zero context about this situation. I’m engaging with the statement you made at the beginning about how installing CrowdStrike on a developer’s Mac is “silly”. It isn’t silly, it’s best practice.
Now, optimizing the endpoint: absolutely a necessity for every endpoint tool. But that initial “silly” statement is so ignorant and arrogant, I could only assume that you have no real experience, and were making a blanket statement. Perhaps highlighting the context, such as “an unoptimized EDR” instead of the blanket statement you made against any EDR, could’ve spared us both.
RE: an M4. People drive Ferraris but still obey the speed limit. Your device doesn’t matter much to me, it still needs to be secured. Can it likely perform better? Sure. Security needs to optimize the endpoint…not remove it entirely.
withdraw-landmass@reddit
Maybe you are above treating security products as stopgaps and insurance with no regards for user experience (congrats, your org cares), but no company I ever worked for was. It certainly isn't the norm.
But fine, let's revise to "Installing EDR on developer laptops is silly, unless the org uses the included profiling and performance optimization tools and ensures the developer isn't doing their job with a large handicap just because they asked for a work device instead of shutting the fuck up and continuing tolerated use of their personal machine like all their colleagues. but of course the org never does any of this because their incentives are as mismatched as the incentives of the vendor and all they're interested in is being able to say 'we did all we could' to a regulator, because most people in IT security outside specific industries are tired compliance and regulation checklist clerks.".
Yes, I'm pretty disillusioned with that industry, and yes that's the reason I replaced "Security" with "Platform" in my title (plus I was supposed to be on a offensive security team that got scrapped, long story).
bao12345@reddit
RE: Kolide
You can do effectively the same thing as Kolide with Intune and any IAM product. Most modern MDM's offer similar functionality (usually at a price), but I agree - Kolide's perspective on this is novel and clean. It does not replace or mitigate the need for an EDR, though. In fact, one of the controls you can enforce via Kolide is the requirement to have an EDR solution implemented and kept up to date.
RE: Honest Security
I've heard of this before, and agree with the approach. I think this is directed at a lot of the "old guard" security professionals who like to keep their tools, features, and functionality close to the vest. I've worked for and with folks like this before - it ends up pissing everyone off, and makes everyone's jobs less enjoyable and more difficult. Those are the guys whose default answer is "no". They cause more problems than they solve. It sounds like this is the typical IT Security professional you've dealt with.
I'm more aligned with the group of security professionals who *love* to show people what we do. My answer is typically "Here's how I think we can do that securely - will this work?" which aligns with the Honest tenets. That said, there are still times where a hard "No" is unfortunately the only answer to protect the business or the end user from themselves.
Just know that there's a new era of security professionals that are spreading that have this perspective, and we're now in leadership roles to affect this change. Maybe someday, you could jump to SecDevOps and help people like me achieve that optimal equilibrium of operational stability, security, and performance.
You might not think that I align with the Honest Security tenets based on this encounter, but know that understanding and trust goes two ways. If you think my tools and industry is no more than an insurance policy, then I have no reason to trust you either. If you want to remove EDR from your endpoint because it negatively affects your productivity, I perceive this as an uninformed decision or an irrational one, so I'll try to educate you. We established that removing the endpoint completely or complete disregard for your productivity are NOT the answer. Fortunately, at this point in our chat here, we came to an understanding that there *is* something that can be done: Optimizing the endpoint behaviors. We *can* work together.
You might have a better experience with your Security teams if you approach them as if they were as technically proficient as yourself. Treat them as peers who you can work with to solve a problem, and you might improve your own experiences. It's not a blame game: it's a problem to be solved. Isn't that why many of us love IT in the first place? We love solving problems? Build off that shared motivation and maybe next time we discuss something on here it will be a more positive experience.
withdraw-landmass@reddit
Fortunately, I do not deal with that team anymore. I now deal with a completely understaffed team of two, one non-technical CISO who has very weird priorities (pings about Apple RSRs releasing when we have about 2 Macs in the company), with me in a "default fallback" infra team, where we drive some security topics, but with this few people, it's very much a game of picking your battles. Oh, and the device management is done by an oldschool IT team, so it's rather permissive and restrictive at the same time in the wrong ratio, so I'll admit I took the "I run NixOS, I am ungovernable, your binaries - if you had any - don't run here" route. Probably makes me incidentally immune to a lot of supply chain attacks too. But I also don't have critical permissions and despite our IP block being old enough to be dated 1970-01-01, we don't actually have most normal users on any kind of VPN.
As for "insurance policy", I think that'll always be part of the pitch and a driver for how security vendors prioritize (or deprioritize) features. We all have to justify our existence to someone, even if we care about more than hitting goals on paper. That offensive security team at a different place got pitched after a close call and immediately killed when someone found out how much you'd have to pay someone who could lead that team...
I'm pretty sure the reason the BeyondCorp papers never explicitly mentions EDR or any kind of endpoint security beyond "monitoring health" is because this area has a lot of pitfalls.
Mr_ToDo@reddit
Sorry for my ignorance, I'm not a developer. Is it common for the building to be done on the local machine? It feels like the kind of thing where unless it's a small part of the company where it doesn't pay, that having a small compile farm gets more bang for the buck.
I'm guessing that dev's are especially hard to do security for since I'm betting that they have more rights and access then other users for daily tasks. Or not I'm not sure, again, not a dev. Maybe it depends on what they're building?
I suppose most of that could feel safer if you remove internet access from whatever machine they have elevated privileges on(Dev VM's, or remote machines?)
But ya, I could see how many security products would really bog down on loads that they would put out. Maybe they could be tuned around their workflow, I'm not sure. It'd open more holes but workers got to work too.
MorallyDeplorable@reddit
IME most devs think it's faster/more convenient to get debuggers and stuff working if you're local.
They can be right if the environment is a mess.
HistoricalSession947@reddit
Out of interest how did you test that? I have a similar need for testing it with our av
withdraw-landmass@reddit
any well-rounded benchmark will do, honestly. nix is just something my partner was using.
rsysadminthrowaway@reddit
The developer Macs aren't truly considered secure unless the developers have resorted to doing their work on their personal Macs out of frustration. /s
withdraw-landmass@reddit
That's the big concern. This was just a bench of compiling a public home-manager config. But I know less technical people that have bought MacBooks because the one time they used Windows - on their work machine - it made enough of a lasting impression that they wanted nothing to do with it.
But that's also sometimes a more general problem with sysadmins, you always need to balance the interests of compliance and easy management with user experience, or your users will find their own escape hatches and tools. I've known a few cases where entire SaaS products where bought on company credit cards without official approval to replace tools that were thought good enough by procurement people, but almost none of the users (cheap Miro clones are pretty common there).
GodisanAstronaut@reddit
Company I used to work for rolled out laptops that were installed with Intune and Autopilot. One user who was a little more tech-savvy than the average user knew how to open the command prompt during the Windows installation process and give him local administrative rights over his device. Something that was NOT allowed in the company's policy.
Needless to say he got a stern talking to / severe warning by the CIO.
SimplifyAndAddCoffee@reddit
Was he at least savvy enough to create a separate local admin account to elevate to, or did he just put his domain account in the local administrators group?
I wouldn't even be mad if he did it "the right way", might have established a rapport... it would have put him higher on my professional respect totem than my current boss who just insists on keeping his user account as a local admin... even though he has authority for local admin access, he should know better than to have it on his main logged in account.
matroosoft@reddit
We have yet to start with Intune/Autopilot so no experience with it so far. But with it, wouldn't you stil do the initial install steps yourself before handing it out to the end user?
frzen@reddit
The dream is that you can just let the user go through the setup without IT needing to touch the device
keksieee@reddit
This is why one of the (post) install steps would be sweeping the local admins group :)
engageant@reddit
Better yet, manage it with Group Policy.
keksieee@reddit
No AD, no GP.
Rawme9@reddit
There's an Intune equivalent to GPOs called Settings Catalog that you can use
keksieee@reddit
Which is, indeed, (hopefully) in their deployment…
narcissisadmin@reddit
We manage LA and RDP groups on workstations with GPO.
BlackV@reddit
That's what laps , config policies and remediation scripts are for I guess
First-District9726@reddit
10/10 for creativity!
ITrCool@reddit
caught someone trying to de-join their work machine from the domain so they could rebuild it in their own image. The idiot called the help desk, trying to trick them into “entering the admin password” but wouldn’t tell them why, just that he had a task he REALLY needed to get done and didn’t have time to answer questions. He had tried the pressure/bully technique. The HD gal didn’t fall for it and took screenshots, sent the ticket up the chain, and I took it to our CIO. The guy was warned and later dismissed for other reasons.
another guy was trying to get around company MDM by formatting his computer and installing Linux but still having access to all company resources. Yeah no. Role Mapping policies, RADIUS, and Conditional Access said otherwise. The guy stupidly out in a help desk ticket claiming his computer was blocked from the Internet and needed the network checked as it was an “outage”. Support tech came and checked, saw Ubuntu on his workstation and reported it. He was reminded Linux was not allowed/supported in the environment and told to get Windows set back up at the Support desk. He tried to fight and claim “right to customize” and “hostile work environment” if he was going to be restricted to Windows, which he hated. He lost the argument and resigned a day later.
That guy was a pill and actually pretty childish. “I can’t have what I want so I’ll try to sneak it in. Still can’t have it? I’ll try to argue on pseudo-legal grounds that I made up. Still can’t win, then FINE!! I quit!!”
SimplifyAndAddCoffee@reddit
Classic. We had one like that once, except had reformatted to Windows. Complained that they couldn't access the network. Some quick digging and would you look at that its not domain joined anymore how could that happen... I basically confiscated the PC on the spot and wiped and re-imaged it, rejoined to the domain etc... locked the startup sequence in the BIOS with a password. gave them a talking to about it. Didn't hear back from them again after that, but they did quit some time later.
MonstersGrin@reddit
Right to customize? It's company system. He barely has the rights to use it 🤣!
Creshal@reddit
He has the right to customize his resignation letter.
MonstersGrin@reddit
Nope. That's a template too 🤣.
Whole_Ladder_9583@reddit
My company computer isn't connected to any domain or mgmt system, So I can install Linux if I decide that it will be better for me. But I'm a worker, not slave.
The_Autarch@reddit
So your company just doesn’t give a single fuck about security?
Whole_Ladder_9583@reddit
Sure they care - we have trainings and very strict policy about data protection.
fubes2000@reddit
At a previous job I go word that we hired a "rockstar" developer, and that as a condition of employment he had to have the newest Mac [we were a Windows shop], a mechanical keyboard [this trend had barely even started], and an "aerodynamic mousepad". [I still don't know what the fuck this was supposed to be] The company sourced all of this bullshit, less the mousepad, plus an extra fancy desk chair.
He didn't even show up for his first day.
ITrCool@reddit
Guessing he thought he was up there with gaming developers and thusly deserved to be treated like a king. Hope he didn’t last long.
fubes2000@reddit
Nope. Total ghost. Supposedly got a better offer, and everyone in IT had a good laugh at management's expense.
ITrCool@reddit
Man, he took them for a ride. lol
RoosterBrewster@reddit
"I cant use whatever OS I want? I thought this was a free country!!".
ITaggie@reddit
Oh the people who act like they own all the org's resources because they were given access to them are the worst.
Geno0wl@reddit
Did he plug his own HDD into the machine and install Linux to that?
ITrCool@reddit
Nope. Literally tried to set it up on the computer itself on the internal SSD. The guy was a childish dolt.
FreshSky17@reddit
I mean shit just use a bootable distro with persistance
WildChampionship985@reddit
Whose side are you on? lol
FreshSky17@reddit
The side that says if you're going to do something stupid at least be smart about it 😂
tech2but1@reddit
Had someone fishing for policies in an interview, clearly going to be "that person" if they were hired. Jumped the gun a bit there I reckon pal, probably not getting on the shortlist!
i_removed_my_traces@reddit
He went on to become a sovereign citizen.
koshka91@reddit
Comment made my day
Nicolay77@reddit
It's the same at my workplace. Windows honestly sucks to work on.
In the end we are using Linux inside Hyper-V, and I would resign if this is not allowed.
i_removed_my_traces@reddit
He went on to become a sovereign citizen.
butrosbutrosfunky@reddit
Worked in IT for a university, and some grad student used his HPCC (high performance computing cluster) account that he had ostensibly for biomedical modelling research to mine a bunch of crypto shitcoins. People obviously noticed, compute time on that kind of expensive shit is in high demand and jealously guarded by other researchers in competition and his massive demands on it led pretty quickly to an informal audit of his KVM instance. He had the audacity to act outraged when caught and subsequently de-hired.
ADMINISTATOR_CYRUS@reddit
I'm not the sysadmin here, but someone I know who was a student did some funny shit. Their school set up students with a Surface. From what I know:
When the student got the Surface Pro, it came with Windows
During the Windows setup it's possible to get into elevated command prompt if you're offline
It was already set to autoconnect to the school's wifi network
as long as you wait until you get home to even turn on the machine for the first time you could access elevated command prompt and add yourself as administrator
The student did a bunch of stuff but in the end tried directly deleting the files for their school's monitoring software, but that just really fucked it up so any time the device connects to a wifi network it gets a bsod. Eventually they had no choice but to hand it in to IT.
Kiernian@reddit
That's surface support.
You know how some contracted support eschews SLA's in favor of "best effort" support in some circumstances?
Surface support is like that only it's "least effort".
They just rubber-stamp almost everything "busted" and if it's not under warranty, you're buying another.
ratherBwarm@reddit
Long time ago when storage space was still limited and cost a bundle, as an IT manager I put together a backup program for my division ‘s PC’s. We’d lost irreplaceable data on several l as laptops by then, so they were under a strict schedule.
My server storage was limited, so I’d review the schedule and size of the zip’s backups each week.
One of our higher ups was using 3x more space than anyone else. Turned out he was downloading movies to watch on his frequent flights, and never deleting them. The next biggest user was hosting his wife’s jewelry business off the PC, with Quickbooks accounting, her taxes, and a thousand pic’s of the jewelry.
McClouds@reddit
I worked for Geek Squad about 12 or so years ago, and there was this Tech Support plan that would service up to 3 personal computers for in store software support under the cost of the contract.
Had a client bring in computers, hit the 3 limit, then said he got rid of the old computer and this was a new one. He did that 3 times, so got 6 computers fixed for the price of 3.
He was charged for another plan when he tried to bring in a 7th computer, which he paid for, and then brought in an 8th and 9th computer.
In the market I'm in, there's two stores. He'd load balance between the stores in hopes that he wouldn't be recognized, but he had a very recognizable voice and some very specific physical features. When he got banned from purchasing Tech Support, he started to use his family to purchase the plans.
I left shortly afterwards, but I remember one of the last interactions I had was his mother bringing in a PC that was registered under a plan for someone else. We called that client who said that they were being charged $150 for the repair. I can't recall what the tech support plan cost, but it was about the same. So the dude made over triple his investment outsourcing his "IT" stuff with Best Buy. I was surprised this was the only time this happened in our market, but it was pretty obvious that these weren't his personal PCs. I wonder how many more flew under the radar.
BartonSVK@reddit
Haha that was brilliant, I would have never thought about something like that...
PBF_IT_Monkey@reddit
Except with all that time and energy he spent trying to run his little game on BB, he could've just learned to be a better tech and fixed them himself
moderately-extremist@reddit
He may have been able to fix computers, but I'm wondering if he only brought them in when it was a hardware failure.
SimplifyAndAddCoffee@reddit
Probably this. I bet he was the owner of an independent repair shop. I worked in the independent consumer PC repair business as a tech back in the early to mid 2000s. I actually got rejected from Geek Squad when I applied for being "over-qualified"... but I digress. I had some shady ass employers. It was SOP at some shops to charge customers a huge amount up front for trivial work, and then outsource it if it turned out to need more time/resources than the boss was willing to spend on it. One of our biggest advertised services was data recovery. We would plug in the drive to another system, and if we couldn't immediately copy stuff off of it and hand it back to them (for $199) we would send it to OnTrack, and quote the customer a 50% markup from the service OnTrack quoted us. Some of my bosses were known to do things like take out extended warranties on hardware components at Micro Center, then use them to replace customers' failing parts, then put the bad one back in the box and return it to the store. They got caught and banned a few times and would send other employees to do it for them. They just didn't care since there were never any real consequences for that kind of petty retail embezzlement. I'm sure if there had been such a deal available for service from one of the big competitors, those bosses would have jumped at the opportunity to abuse it like that, sending in machines with expensive hardware failures to get free or discounted replacements.
Small business is just full of grifters like that looking for any opportunity to cheat the system for profit.
Kind of like big businesses, except instead of just paying their lawyers and judges to find loopholes or make it legal, they have to try not to get caught. Tax fraud especially. I don't think I've ever once worked for a company of less than 10 people that didn't cook the books or take cash under the table to avoid paying taxes. And they definitely were among the ones that took special bailout money for every economic crisis from 2008 to covid. Probably double or triple dipped in it too.
Retro_Relics@reddit
My thinking is more that it's when it was the annoying shit like 70000 toolbars, but you can't possibly nuke and reformat because they have files that they need scattered all throughout the hard drive, and software they lost the install discs for...so you have to manually uninstall every piece of crapware they managed to install.
heyyouguys67@reddit
Agreed. Dell Pro Support. Done.
Retro_Relics@reddit
Depending on issue, I could see outsourcing removing 17 of bonsai buddy's friends, toolbars that take up half the screen, and 17 things that "look cool" on the desktop but "you can't just erase everything, I got my dead grannies last pictures on there.... somewhere" just because that is time consuming drudgery that your time is far better spent doing anything else
peanutbudder@reddit
Make money and not work or make money and work? Which one would you choose? Lmao
VulturE@reddit
In the earlyish days of geek squad near me, I used to purchase the old school "black tie" 3yr full replacement without questions warranty on expensive-ish headsets.
Come in at 2years and 11 months, get a new headset for free, purchase a new black tie warranty for it. I think the warranty cost on a sub 150$ headset was 15$?
So I went through three 125$ headsets in 9ish years for $170.
I finally found one that I really liked in the 3rd one, bought five of them on eBay (because Plantronics discontinued it quickly) and almost 20 years later I'm on my last headset.
I was just a cheap kid back then, but also I had an extremely large head that very few headsets would fit on comfortably. So now I've gotta throw down big money for a headset that will fit my head as perfectly as the Plantronics one.
weeemrcb@reddit
I moved away from over-ear headphones to these a while back.
Something similar in your country might be worth a look?
https://ultimateear.com/product-category/music/custom-in-ear-monitors/
VulturE@reddit
If I was doing something similar to music production, then yes I'd agree with you. Unfortunately with kids and needing to frequently crack one ear out of some headphones partially, in-ear wouldn't be ideal for me. But also I can't cheat on my MDR-v6's lol - they've lasted for 45 years between my dad and me.
The specific Plantronics (the audio 370) was an over-the-ear design but had the auto-adjusting strap at the top. You still see that strap today on some headphones, but it's a bit more rare of a styling on headsets unless we're going into 500$+. I used to be able to play games + work for 12hrs without taking them off, super comfortable. Was the audio high end? No. It was emulated surround sound and it did a decent job for the games I played at the time. The comfort was the biggest thing for me. SteelSeries trash at best buy pushed against the sides of my head too tightly, and the 150$+ sony's they had back then were only monitors, no microphone.
weeemrcb@reddit
tbh I only use them for gaming.
Used to wear sony NC headphones. Loved them, but after a couple hours I'd begin to get an ache on my crown, so looked for alternatives.
Already had the moulds for motorcycle + sleep earplugs and decided to give these a go. They're great and no batteries to forget to recharge :D
They're easy to move a smidge just to hear what's happening around you then nudge them back in place for immersion again.
-31db doesn't block everything, but they're way more immersive than my airpod pro2's. Not quite as much NC as the Sony's tho (WH-1000XM3), but pretty close. doesn't have the hiss that NC headphones emit, but also don't have the in-ear "pressure" feeling that you sometimes get with NC headphones
Sadly one of my ear are too narrow, so I'm stuck with the single driver ones. Work perfectly for gaming tho. Always starts with me thinking they're too quiet, then after 10 minutes I'm thinking they're loud. Funny how our hearing adapts :D
UsedTableSalt@reddit
Does geek squad also repair the hardware?
McClouds@reddit
Depends. Our location did, as long as they provided the part. We'd do the diag, let them know what was failing, and if they provided the part and software, the rest was done under the contract. We'd do anything other than open-loop water cooling.
This was also a decade ago, so I don't know if they still do.
deltashmelta@reddit
Geeksquad: We charge $150 to wipe and reinstall the OS and/or run webroot.
x2P@reddit
I used to work there during the same era. I always hate up selling products in general, but Tech Support was legitimately an insane deal. 3 computers, unlimited in store and remote support.
McClouds@reddit
Yeah, it was easily the best service to recommend, especially since our market was a university city, so a lot of kids with laptops guaranteed them service when they went back home. I was also a fan of the discounted in-home rates, as being a DA made it to where my day was mostly new PC setups and not diag/repair.
ramsile@reddit
Is this a numbers game for BestBuy? Sell 1000 tech support contracts with the hopes that only a small percentage actually use it?
McClouds@reddit
It was, just like every other type of insurance plan out there. Most folks would buy it with their new laptop/desktop, then bring in their old PC for repair. It brought them back into the store, twice, when they wouldn't have been, which is more opportunity to buy something else.
They did away with the plan I'm guessing because I don't see it advertised anymore. But it really was a great service for folks. Even came with anti-virus with the plan, which in the days before MS Defender really helped the click-happy end users.
Its_My_Purpose@reddit
Now I want to work there. Back then.
First-Literature8880@reddit
For this dude, it’s a business.as a middleman, buy low, sell high.
Lotronex@reddit
Honestly, most IT at the Geek Squad level is so cheap / easy to do, it probably wouldn't be worth it. I worked at AT&T around the same time for their "Connectech" program, where you got unlimited phone/remote support for $15/mo. Even they would outsource the help. If the customer had a virus we would just work to get remote access to the PC, then send the session off to someone in India. I think a customer could easily pull this scam off for certain issues. For anything else, just tell them you'd have wipe and reload.
McClouds@reddit
Really depends on the environment. I haven't worked for them in over a decade, but when I was there we did all the fixes in store. Even when they started to push using the remote services, that was really for the OOBE setups, and not for anything relating to updates or virus. AJU couldn't install a power supply no matter how much corporate wanted us to use them.
I'm sure it's different now, but when I was there it was real techs doing real work. Wipe and reload wasn't ever really an option. I remember spending countless hours on the GS Forums, or having a problem so difficult we'd have members of "Secret Weapon" remote in to help.
I'd say in the environment of business continuity, we have lost troubleshooting. I work with Jr Sys Admins who FREAK OUT when they hear they have to make a registry adjustment. But when I was at GS, it was just another day.
Idk, there's a soft spot in my heart, because as much as Best Buy destroyed the brand, there were a lot of agents out there who really cared, and really did a good job.
Lotronex@reddit
Yeah, I still have a soft spot for that type of work. I remember there was one particularly bad virus going around, we would have to walk customer through booting into safemode with command prompt, making changes in the registry, then booting into safe mode with networking, so we could then remote in and clean up. It's amazing how successful we were with it, even if the customer was 60-70 years old. As long as you could stay calm and patient with them they felt safe enough.
My next job at an MSP, they had no idea how I was able to stay so calm while on the phone with "trouble" customers. Like these people are a walk in the park compared to what I had to do.
McClouds@reddit
You can definitely learn soft skills doing retail tech support, and those translate nice into the more professional worlds. The best customer facing professionals I work with now are the ones that know how to find answers and talk to people. I'd work with them 100x over the ones who know all the answers but panic at the question.
Lotronex@reddit
Absolutely. I spent almost 5 years doing support over the phone, and the soft skills are the most valuable thing I learned.
underwear11@reddit
I worked at Staples and we had people constantly trying to scam the company. We had a guy come in with one of those Dell Dimension desktops, the super popular ones, for some work. Got it done, and he picked it up, normal everything. Guy comes back the next day livid, asking for the manager, etc. Claims he got cockroaches in his PC from our store. Sure enough a roach crawled out of the case. As if roaches would have infested a PC case during the day but no other PC ever had this issue. Took that thing out of the store real fast and verified service tag didn't match, them told him to get it and never come back.
ph33rlus@reddit
He’s that savvy but couldn’t learn to fix them himself. Could have saved a fortune on contracts
ncc74656m@reddit
Always scam the Geek Squad tho. The Blue Devil has it coming.
q0vneob@reddit
Was it some small business?
I really wonder what kind of person is running 6+ computers but still lacks the knowledge to maintain them? Esp at whatever basic level geek squad is offering.
McClouds@reddit
Your comment kind of struck a nerve. It definitely wasn't basic level.
The dude did have a "business" but if that was just word of mouth/best computer guy in the church caucus, or if he was an LLC, it wasn't a concern of ours. Just the fact that he had a steady stream of PCs with different makes/models/SNs from different hardware generations was enough to start throwing red flags.
SimplifyAndAddCoffee@reddit
I had a user once who printed a barcode with their password on it and stuck it under the keyboard so she could scan it with the barcode reader to log in.
zenmaster24@reddit
Low key genius - if it looks like the keyboard product sku barcode hiding in plain sight, even better! 🤣
SimplifyAndAddCoffee@reddit
It was pretty obvious. They even laminated it. It was taped down to the counter underneath the keyboard. It was fairly common for people to put frequently used strings near the shared terminal where they could scan them in, and any other employee curious enough might just scan it to see what it was and if it could be used in their own workflow.
I don't disagree it was clever. But it was a job where people had different logins for a reason. They could have easily been fired if someone else had logged in to their account and used it to embezzle money.
Security by obscurity, isn't.
helooksfederal@reddit
i've had MD's buy laptops and use them for work without the IT Dept ever seeing them, happened twice this month already.
Patmyballs69@reddit
Came in and tried sticking his bt router in on a random wallport in the office because it wasn’t working at home…
Brwdr@reddit
Early 2010 I used to burn in new VM clusters using SETI@home and had switched to Folding@home to burn in clusters years prior. Enterprising young IT admin took that job over from me shortly after I hired him. Took at look at the latest cluster the Febuary and found the servers all running a bit higher than I expected so I investigated because I told him to run them but not max them out. He was running a Bitcoin miner, albiet inefficiently. I didn't really care, just curiousity and surprise.
He mined several coins, sold them, bought himself a chicken sandwich for lunch for the reward. We and the company have all moved on but last time I talked to him the sale of the coins still haunts him.
Fitz_2112b@reddit
20 or so years ago we had some idiot developer storing his own, self-made, porn on one of our file servers. Not really sure what his endgame was
xylarr@reddit
Self made - at least there's no copyright infringement.
hshtgshrk@reddit
well- perchance, what if
Nu-Hir@reddit
Online storage is expensive!
Fitz_2112b@reddit
Online storage didnt even really exist yet at the time!
T0ng5@reddit
It did for him 🤣
da_apz@reddit
User whose job description didn't require a beefy computer requested one. It was denied. Apparently this was some soft of a new hire hotshot, who then went above my head and sold his need to the people above me, which forced the IT's hand. The user was given a beefy laptop.
Next weekend the monitoring agent spotted various unsanctioned processes, including what was identified as a then new 3D first person shooter. The company had a "no outside programs" policy, but at this point everything was still relatively lax, so this may have been ignored hadn't the user gotten shit from above to the whole IT staff.
The findings were reported next Monday. I don't know what happened, but those processes were never seen again.
davidgrayPhotography@reddit
A similar thing happened with one of our IT guys. He ended up getting an Alienware gaming laptop because "he was working on multiple spreadsheets at once", like, sure champion. Dunno how he managed to convince our boss to get it, but he did.
When it came time to return the device (it was leased for some stupid fucking reason) we couldn't find it until it mysteriously showed up in the storage room after questions started getting asked,
I had to fight to get a decent desktop that'd do video converting at a rate faster than 1 frame per week, but he, being middle management, was approved for an Alienware machine
da_apz@reddit
This guy in my case was a sales guy and apparently he came with recommendations from his previous job so everyone in the management was bending over backwards for him. I just found his reasoning for the CAD workstation class laptop amusing, as he explained he needed to view complex CAD models in his daily job. As the person who had installed majority of the computers in the whole place, I was very acutely aware just what they needed and the models they had to view ran at 30+fps just fine even with the Intel's integrated GPU. But nevermind the voice of reason, when someone wants a pissing contest about who has the sales department's hottest (literally) computer.
HistoricalSession947@reddit
Someone was strongarmed into dropping the PROCESSES of not installing games instead of dropping the ROGUE EMPLOYEE!??!?
da_apz@reddit
No, the user was not seen running unexpected processes again.
HistoricalSession947@reddit
Ah, thank heavens!
Zenith2012@reddit
Many years ago I worked in a school, one of the kids created a new website (to bypass the blacklist filtering on the internet, I'm talking early 2000's). He added a bunch of tools to the website that he had downloaded at home that would allow him to try and hack the network, then downloaded them in school.
Our AV caught them as soon as he downloaded the files, the head of ICT removed him from lesson and he was no longer allowed to use any PC during his time in school (their goes his exams). His excuse was "I wasn't going to use any of it, i just found the tools, created the site, uploaded the tools, then downloaded them in school but wasn't going to use them, honest".
Meh #kids
Isorg@reddit
On a Christmas Eve years ago, while working for an MSP, we got called in for a new client. Their IT admin had gone rogue/AWOL, wasn’t answering phone calls, and was causing issues. They wanted him gone, but he wasn’t giving up passwords.
Their servers were located in a datacenter about a three-hour drive away. We sent a tech to the datacenter to break into the servers, regain control, and kick the rogue admin out. When we got to the DC and gained access to the "racks," we told the client about the two racks. They were confused—they only had one.
Well... we were looking at two racks. One had what we determined to be the company’s gear/servers. The other rack, located right next to it and connected to their gear/internet, was some kind of long-distance calling card service with serious hardware in it.
Us: “What do you want us to do?”
Client: "Shut it down!" No problem—click!
During all this, the tech onsite needed more assistance because things had snowballed into a major issue. I geared up and began the three-hour drive to the DC. During the drive, I joined a three-way phone call with the tech, our manager, and the client’s sales rep to plan our next moves.
The rogue admin then started calling, but the owners had locked him out of the DC. By then, we’d regained domain admin, locked things down, and secured the situation. While I was driving and listening to my manager and the sales rep discuss next steps, the onsite tech took a break and stepped outside.
Coming back into the DC, I overheard him having a conversation with a third-party person who couldn’t get past the mantraps of the DC’s security doors (he’d "forgotten his badge") and offered my tech money to let him in. My tech said, "No, I can’t do that."
My manager and the sales rep were too busy talking to each other, but I caught the conversation in the background. I interrupted to ask the onsite tech, "Who were you talking to?" Turns out, it was the rogue admin! We figured he’d started driving to the DC the moment we cut the power and internet access.
Long story short, the rogue admin had been reselling rack space/internet to a calling card company specializing in long-distance calls to Mexico. The whole thing was shady—money laundering/cartel-level shady.
From what I understand, the calling card people lost a lot of money with their systems being down. My client didn’t care—they didn’t have a contract with them! Two days later, I was back at the DC, supervising the calling card company as they removed their gear.
All of this happened on Christmas Eve, and the sweet, sweet holiday/emergency rate paid for my new motorcycle!
Not_your_guy_buddy42@reddit
I'm getting faint die hard vibes
redthrull@reddit
Wasn't going to comment but your post reminded me of something. Not really malicious, just...clever.
Ticket came in for wifi help from one of our remote users. He's not totally down but has slow/intermittent access. Seems to be some mismatch with his laptop wifi and router settings. At first he wouldn't give us access to his home router, AND this needed additional clearance anyway as we're dealing with personal equipment. User is part of Finance/Accounting team so manager approved. After more troubleshooting, we figured out we weren't dealing with just some dinky home router. It was business grade and he had someone else set it up for him. Turns out he's broadcasting and running an alternate wifi to their own building's wifi. LOL Nothing shady, but he allows other people to connect to his setup for a monthly fee. That was why we couldn't just reconfig and reboot the router. haha Good times!
sethcorn@reddit
Wow! That's wild!
frank3000@reddit
Great story. What bike did you get?
Isorg@reddit
I picked up a 2007 Yama Fz1. Then took that thing all over the country over the next 8 years.
nighthawke75@reddit
Yeah, Feliz Navidad, you bastards.
punklinux@reddit
Former job, we had a CTO who used all the systems, and was running hundreds of systems in a "hidden" region (really, a region nobody was checking) just mining bitcoin. It was estimated he cost the company hundreds of thousands of dollars for about $2.1million in bitcoin. I can't imagine what it would be now. We found out about six months after he was forcibly retired, and I don't recall what ended up happening between all parties involved.
A lot of abuse I have seen are small ec2s run by dev departments as more personal "shadow IT." I remember one group set up an OpenVPN that allowed them access to the whole substack, about 400 systems, buckets, and lambda, and was never audited as a VPN. They didn't like the in-house VPN solution because "it was slow." To their end, yes, they'd have to dial into a VPN appliance we had in-house, and then go to a jump server, and then to their systems, which was a 100mb connection at most, disallowed SFTP/SCP and had other handicaps that their needs weren't being addressed. Their OpenVPN allowed them to directly to the systems from anything that opened the OpenVPN client. But they weren't following any security policies, like password complexity, rotation, and our SSO authentication. So a fired employee could still access everything in that substack for all eternity since the OpenVPN, once someone was added, was never audited. We found over 140 people, even former temps, interns, contractors, who still could theoretically log in and do whatever. To give you an idea of how fucked up the company communication of this was, the management demanded that "the admin of this server be fired at once." So they "fired" James Yonan (he is the original author and chief architect of the OpenVPN project, and never was an employee of ours). Our team, who had never heard of James Yonan and didn't see him in Active Directory, said "it's been taken care of." Then HR said they "spoke with him and revoked his badge," which I also knew was a lie, because our team also managed the badge access, too. James Yonan became our company's "Lieutenant Kijé" whenever anything was to blame. No wonder that company is now out of business.
A very common thing I have seen are "shadow admin accounts," which can be masked as "service accounts," in AD. A client I worked with who fired their IT admin knew it was going to be a very, very delicate situation. he was some old guy who was made redundant from the buyout, but they knew he was secretive and vindictive. So we had to have a very, very, very careful secret audit followed by months of meetings of "D-day," the day when "D" was going to be separated. On the day he was let go, it actually went fairly smoothly. The physical access barriers he set up (the admin servers, with locked faceplates, where in a locked rack, in his locked office) were broken into, and we already had some backups in place and all his scripts audited.
We thought.
Later that evening, he **dialed in** through a modem connected to a Cisco router in a telco closet, got authenticated to a domain server, and ran a script under a service account. His aim was, we think, to wipe out all access to all the data (but not the data itself). Because we did backups, and turned off the only vulnerable domain server (Windows 2000) that would accept that account, damage was minimal and easily undone. Domain logging captured everything he tried, and we were able to not only prevent him doing that again, but we had evidence of sabotage that was undeniably him. I believe he was arrested, but he was an older guy, so I am not sure if he went to jail or not, since I was not part of that cutover after it was done. It was thanks to me and a Windows Admin that it didn't end up being a disaster. But dialing in through a serial connection on a forgotten Cisco router was pretty creative.
nostril_spiders@reddit
I had that on tape, growing up. It was a B-side on Peter And The Wolf. Heavily abridged versions for kids, narrated by Johnny Morris.
Thanks for the memory!
punkwalrus@reddit
In the late 90s, I was part of a sting operation where someone was using some of our servers as an illegal mail relay out of the Netherlands. We traced it back to the University of Vermont (I think, at least some university), and through working with them, we discovered a former student admin had been using UVT systems to run his own personal web hosting business. There were hundreds of customers paying him to use university resources. Turned out he got his degree at UVT, and for whatever reason, he never lost his admin access after he graduated. Not only did the university shut his access off, but sued him for costing them hundreds of thousands of dollars, and our company sued him for using our servers as an anonymous mail relay for his customers. He also got sued by some of his former customers for not giving refunds for suddenly going out of business.
I don't think he went to jail, but he was fucked, financially. This guy went from living well on his web hosting business to losing everything in lawsuits. At one time, he hosted his own party camp at Burning Man, too.
pwnrenz@reddit
Bypassing the web filtering going to escortfish.ch? Forgot the ending of the domain name, which was from the European country area. It redirected to an American escort site.
The user also saved naughty photos of some escorts he reached out to on his c drive of company owned computer, but minimized photo size.
He also sat at a cubicle with 3 other people at each corner, but his corner had a wall behind him.
I'll never look the same way where there's no one behind someone at cubicle again.
Another one physical access is a door requiring badge swipe, putting a thin piece of metal top of the magnet, proping door open.
Iceyfire32@reddit
Remindme! 3 hours
MidnightAdmin@reddit
Yo, I saw that your request to be reminded of this thread had not been fullfilled, so here you go!
Enjoy!
freshjewbagel@reddit
NLRB has entered the chat
travelingjay@reddit
Rogue. Rouge - red.
Im15andthisisdeep@reddit
Copy that Rouge Leader
TinyNiceWolf@reddit
C3PO: "How rouge!"
SirLoremIpsum@reddit
You know it was SUPPOSED to be Rouge Squadron cause they succeeded Red Squadron....
Robeleader@reddit
Standing by.
teorouge@reddit
I get "teorogue" quite often, guess it's hard. 😅
Illustrious_Try478@reddit
There is this stuff called "Jeweler's rouge" which is green.
travelingjay@reddit
TIL. Thanks!
CrayonSuperhero@reddit
keetyuk@reddit
Weirdest one ever, back in the day, when laptops were the exception and not the norm, a user had been assigned a laptop for one reason or another.
drkstar1982@reddit
Several devs wanted upgraded Mac’s so they disabled certain keys in terminal. Unfortunately for them they forgot to delete the terminal history. Two got fired as that was the last straw with them And three others got written up.
Kaon_Particle@reddit
How did they expect to explain how all 5 laptops ended up with the same problem at the same time??? Maaan those guys are dumb.
Snuzzlebuns@reddit
I guess they didn't come in together and said "all of our d keys stopped working".
In our company, we deal with broken keyboards all the time, it's not unusual.
drkstar1982@reddit
They came in one at a time over a 2-week period. We had just gotten brand new Macs in, and one person who required the new Mac got one. the others got pissed they didn't have it and found ways to try and force a early upgrade.
i_removed_my_traces@reddit
Disable keys in terminal, for new macs? Did they think they would get new machines before a full wipe of the machine?
Bladelink@reddit
Just an FYI that some of your comments in here double posted. Not trying to be a butt or anything, but figured I'd let you know in case an app was being weird or something.
i_removed_my_traces@reddit
Thanks, i'm offshore with a bad connection, posting failed but apparently went through
koshka91@reddit
That’s the most delicious story?
Agent_Jay@reddit
Bloody hell. Last straw? What were the others? Just being shitty at their jobs?
drkstar1982@reddit
They used to use their work Macs as personal DJ equipment, and. where I used to work was very stringent on what could be installed on Macs. The fastest way to get fired at my previous job was to anger the director of security.
SoylentVerdigris@reddit
Shit like that is why users don't get to be admin on their macs at my job. It's an enormous hassle for both me and the users, but the alternative is shit like this, apparently.
drkstar1982@reddit
We gave all devs admin rights cause well, they kinda needed them.
TheAnniCake@reddit
My company uses privileges for temporary admin rights for these cases. It’s made by SAP and also open source.
SoylentVerdigris@reddit
Ours don't seem to need to. At least not often enough that we can't do one-time self elevation through Jamf.
dustojnikhummer@reddit
Disabled keys? Did they think you wouldn't image the machine first? It would be my "last resort" on Windows, because "driver fuckery"
drkstar1982@reddit
Like I said our helpdesk answer to everything was just give them a new one.
i_removed_my_traces@reddit
Disable keys in terminal, for new macs? Did they think they would get new machines before a full wipe of the machine?
drkstar1982@reddit
They were older Intel machines, and our helpdesk would normally just give them something new because it was faster than a wipe. As the Mac admin, I was the last line of support. And helpdesk asked me why the key would work in recovery mode and not in the OS.
I asked the user to log in and looked at the terminal history in front of them, reversed the issue, and said, Hey, just fyi, I fixed the issue and will be down to talk with you manager shortly. And let me tell you that was a fun conversation.
Espeakin@reddit
Nothing too crazy my way. We get torrenting. We get porn. We get torrenting porn.
A lot of users hate the 15 minute sleep policy, so they try to bypass that with caffeine, clickers, etc.
All of our science faculty want local admin, because they have it from like 2000-2010 and did whatever they wanted lol
lebean@reddit
... which is just crazy, because if your PC idles for a full 15 minutes, you are not at your desk or are not doing work on the PC. Even if you were "reading/studying something", within 15 minutes you'd absolutely have to scroll a document or site. Why do people hate having to unlock their PC when they return to their desk?
Shadowwynd@reddit
Whenever our systems log out, we have to go through the whole 2FA process again - MS sends us a prompt on our company cell, Facial Recognition (from mobile phone) needs to be done twice to log back in.
10% chance that the key takes so long to arrive in Authenticator that the key has expired and has to be resent.
10% chance that the system drops the main WiFi and switched to the guest WiFi which can’t be used for authentication, requiring a manual change of WiFi (or manually telling it “don’t use this one”).
10% chance the Surface laptops running dual external screens through the dock don’t come out of lock properly, resulting in one or both external displays being dead until a system reboot.
I didn’t go anywhere. I was talking with a coworker for a few minutes in the door of my office. I was on a phone call at my desk. I was filling out dead tree paperwork at my desk…. And all of a sudden I have an external delay of at least one minute, possibly 5-20 minutes - and this happens multiple timescales a day.
Valadrimin@reddit
MFA back into the PC? After a logout?! Dude… what a massive waste of time!
lebean@reddit
Not even after a logout, they're saying they have to MFA to unlock the screen of an already logged in session... what?
Shadowwynd@reddit
Yes, correct. Session is logged in, apps are open, stuff in progress is in progress…. We have 2FA set for every time - login or unlock.
dustojnikhummer@reddit
Lock is fine but why sleep??
"Okay, I will let this run while we go for lunch" only to find sleep breaks that...
lebean@reddit
Ah no, we don't sleep them after 15 minutes, it's only a locked screen.
Espeakin@reddit
Sorry, by sleep I meant lock. Poor word choice.
wwbubba0069@reddit
When we forced timeouts and lock screen passwords you would have thought I kicked their sainted mothers. One manager threw such a fit to the pres of the company I had to install a fingerprint reader because he couldn't be bothered to type a password after his pc set idle for 15 minutes. Every time the reader fails I have to reset his password because he doesn't know it.
Valadrimin@reddit
Our organisation is due to change to WHfB soon and honest to god I can’t wait because typing a fucking password with restrictions is a pain in the hole! PIN, password less and biometrics are the way. Gets tedious.
Plus stops people writing it on a fucking post it note!!! lol
Espeakin@reddit
Mostly just an inconvenience/ignorance thing. No one thinks someone’s going to go through their shit lol
dustojnikhummer@reddit
Even on AC? But why?
link2712@reddit
Had some coworkers who stole expensive GPUs out of the research computers in the office. Half a year later an engineer recognized that all the calculations ran on the on-chip-GPU. Unfortunately the coworkers never got caught, die to no access restrictions too the computers.
EmptyM_@reddit
One of my first jobs at a small Voice IVR company, the senior dev left to travel the world. When he got back he started using a backdoor he’d setup to make international calls at no expense to himself.
He’d trigger the api to call his mobile then he’d just punch in the number to dial out and the system would bridge the calls.
Hard to notice during the day when several hundred calls would active. But at night when no other calls were going through the system it stood out like dogs balls.
Informed my boss, who took it to court to recover costs, was almost $5k in calls over two months.
kirizzel@reddit
Not really a misuse, but this saved me tons of time: While in college, I was at a bank, which had a core banking system running as terminal application on debian (I think). It was kind of sandboxed, so you could only run that application and nothing else. The application had a built-in vi editor where you could write limited SQL statements and look at the data or write the results to a shared drive. Turns out people were spending huge amounts of time there writing statements, and exporting data (mostly regular stuff for reports), also because closing the editor deleted everything you had typed because it created a new temporary file every time you opened the editor. Huge waste of time.
But, you could use
:shell
and:!
in the vi editor. So I was able to get shell access and setup crontab to do the regular exports. I was even able to connect to the underlying Informix database which the application used and build a data warehouse to further automate my job. (username and pw to access application was same as db credentials). I even coded and ran a web application on that server which had dashboards and all that stuff in it, and this was used by the whole company including C-Level. They liked that so much, that they kicked out the BI consulting company, which was charging huge amounts of money to build some simple dashboards in that application.When I left I explained everything I had done to my successor, but I think he also left a few months after me, and after that this whole system wasn't touched for a few years, but ran like a charm as I've had heard later. By now that bank is out of business (not related to my actions)
Probably the highlight of my career.
Batweb235@reddit
I worked at a school that was part of a collection of 30 in the group. When a pupil graduated we removed our AD groups from the account and transferred them to a “Leavers OU” managed by our central office (this was so the pupil could maintain their email but have no access). Little did we know central office was overwhelmed with 6k leavers every year and wasn’t doing anything to secure these accounts or restrict them. One pupil at our school had stayed back a year and no one had notified us, when they logged in they no access to school resources but due to their lack of AD groups they had just the basic internet filtering (no porn) and full social media access. Instead of notifying anyone they had no resources this account was shared with half the school, it wasn’t caught till some routine log checking of our proxy revealed it was using a third of our traffic and seemed to be logged into 100 machines.
Turbojelly@reddit
Work in Schools. Kids, well, some kids are inventive. Due to a much of new cracks that have come out in the last couple of years, we've had to block all USB ports due to kids using them to play games and bypass firewalls.
My favourite was the kid who wrote a friendly little program. More of a questionnaire, just a "my first program" thing. Ubfortunately, something caused it to duplicate itself when being backed up. Managing to fill and crash the backup servers of the site. I congratulated him on his code and gave him a link to Khan Academy.
sgt_Berbatov@reddit
People were using the "Clock" app from the Microsoft App store and setting the timer on it, which stopped the screen locking.
pizzacake15@reddit
An executive and a secretary installing crypto miners.
The executive was repeatedly reprimanded cause he didn't stop. He was eventually let go for reasons unrelated to it.
I didn't know what happened to the secretary as i left the company before infosec could triage it.
Last_Hunt3r@reddit
An employee managed to run unauthorized software (brave browser) in the session based RDS environment. Because someone told her Edge will steal all her data. We are a Teams/SharePoint company.
DadLoCo@reddit
Some brainiac back in the day whitelisted an executable without including any metadata. It even a required path. That Exe could be run from anywhere.
Users figured out pretty quick that they only had to rename their desired installer to that Exe and it would run.
I’m the party pooper who shut that down after joining the company.
Popal24@reddit
A user tried to have direct database access to an inside app I developed. He wanted to bulk load+edit data by himself. After I repeatedly refused, he tried to bypass me an ask the DBA directly.
The DBA warned me and I managed to add instead of triggers to the tables he wanted to write into. So the app would stil work but his attempts would fail. He gave up soon after.
Different-Housing544@reddit
Did you guys know excel has a web browser built into it?
Cute_pulubi@reddit
Implemented long pw and users figured out how to configure picture pw or some sorts 😂😂😂
Extreme-Height-9839@reddit
I was more of the problem child. I was sysadmin/IT manager for a small (\~100 person) company. We got bought/sold a few times rather quickly before a decent sized but poorly run company from Milwaukee bought us and then started integrating our IT systems with theirs. I was offered a position as a developer and took that, but we had to work on the network which was a total PITA. We were a bit unique from other developers in the company because we were writing software that integrated with security hardware (physical door security) and so we'd have literally 100s of different hardware devices on the network, which was against their policy. We ended up setting up our own router/firewall as a client to the corporate LAN/WAN and all of our machines, hardware devices, and stuff sat behind that firewall so IT could rarely see our PCs unless we went to a meeting and connected to WiFi. We even setup a couple NAS's behind the firewall so we had our own file storage and didn't need theirs. Eventually they gave in and basically said what we did was okay (because the alternative was they would have to allow the 100s of other devices directly on their LAN/WAN and they didn't want to have to do network compliance checks on all of those devices.
DayFinancial8206@reddit
A few years ago, a group of tier 1 helpdesk passed around a cracked game that had malware in it and they all installed it on their work laptops. Most do not work at the company anymore. Two of them are now managers.
Immediate-Cod-3609@reddit (OP)
Hopefully it was a decent game
DayFinancial8206@reddit
Alas, it was a flagship ubisoft IP that recently made headlines. Not even one of the good ones (in my opinion)
localtuned@reddit
Someone at Hopkins had an irc server with tons of "stuff" to download.
macgruff@reddit
During the early 2000’s when BitTorrent was a big thing, the FBI came a knocking to our Fortune 1000 door. Seems someone had opened a port to the open internet off a test/build machine for medical devices. Sony or some such called the FBI telling them their pirated movies were being sold from a machine on our factory floor. LOL. The balls.
Anywho… I finally got the budget and mandate I had been espousing for years (to take away local admin rights, lock down traffic correctly, only IT provisioned and maintained systems).
azuratha@reddit
I have some stories but one of the people involved is still in jail because of me. They get out this year and I am worried they'll come after me as it was pretty obvious I was the one who provided the IT evidence that got them convicted (sole admin situation). I resigned after it happened but they know who I am. Not much I can do unfortunately.
BarServer@reddit
I don't understand this comment. So you risk exposing yourself by making this comment and then don't even provide the story? I don't get what you are trying to achieve.
azuratha@reddit
I haven't exposed anything in what I have said. If I gave specifics then I would be exposing myself, but I haven't.
I wouldn't want to risk writing specifics because then my reddit account wouldn't be anonymous.
You are right that there is not a lot of point in my story without specifics, I wrote that while I was on my phone and didn't have time to write anything further. I don't think it's worth the risk to try and write it up without giving myself away, as a reply on a 13 hr old post that probably nobody will ever see.
First-Literature8880@reddit
For this dude, it’s a business.as a middleman, buy low, sell high.
__teebee__@reddit
Way back in the early-mid 00s I was a young sysadmin. My spirit wasn't broken yet. They were magic times. I was doing departmental IT (shadow it) I was taking care of a couple of our shiny new VMware ESX 2.1 servers on Dell 2650s. Each server had about 80vms on it but only 4 VMs would ever be on at once. I only had 2 cores to play with. One day I stroll in and everyone in my department is pissed at me something was going on with VMware. I log in and my 2 cores are flat out 100%. VM On host 1 seti1 and on server 2 seti2. Hmmm those aren't mine. Only other person that had admin was my back up Jim.
Me: Jim, Wtf is seti1/2?
Jim: oh seti2 at home it's a massive parallel project yada yada yada.
Me: why is it in my VMware rig?
Jim: it only uses free cycles
Me: how does it know that across VMs?
Jim: uhhhhb
Me: How long has it been running?
Jim: About 18 hours
Me: ok you've DoS'd our team for the last 18 hours.
I had to write up an RCA and laid blame where it belonged he got a firm talking to and stayed out of my way from then on.
I had companies that had their ftps targeted as warez drops in the early 00s. Had users trying to take over a Netapp for a big mp3 collection.
ChampionThunderGoose@reddit
I worked at a retail chain. People would
Launch ERP System --> Hit F1 to launch Help --> Hit Ctrl+N to get a new browser window that was outside of the web filter and logging.
We also let staff have a private vending machine on the shop floor to earn some extra cash. They would buy a drinks machine, break one or two of the buttons and hide thier Beers/Burbon and Cola's' behind them. No alcohol was permitted on site, but we were not able to search a privately owned machine
fubes2000@reddit
Couple jobs ago we had a satellite office in Vancouver so that we could attract "higher-tier talent", and one of these "high-tier" individuals decided that they needed an automated build system, but didn't even attempt to run it by IT. What he did was move an iMac from a recently-departed user's desk into a storage room and installed Gitlab Runner on it.
Desktop IT grilled him several times about the missing hardware, but he played dumb quite authentically. Eventually I got roped into a ticket where another user in that office said "every time we run a build our internet cuts out" which led to "what do you mean 'run a build'?" which led to me finding IT's missing iMac on the network running shade-tree services which was indeed saturating the internet connection with bullshit it wasn't intended to handle.
The company decided that "well they already changed their processes..." and hung the fuckin albatross around my neck to scratch-provision a build system that worked with this fuckwit's cobbled-together workflow. He earned my eternal ire, and I'd like to think that even though he was not immediately fired for this [which he absolutely should have been] that I greatly contributed to his eventual firing for incompetence by constantly pointing out how much the guy fucking sucked at everything.
TheGlennDavid@reddit
Not an answer to your question but I refuse to be upset over mouse jigglers (not that anybody asked me). If a supervisor can't find any meaningful way to assess the work output of an employee besides "is their PC idle?" then they are bad at their own job.
I get it -- from a "hr box check perspective" it has the same objective flavoring as "is the person in the office or not" but....ugh.
koshka91@reddit
Not only that. There are hardware mouse jugglers. That’s basically a mouse emulator
skydiveguy@reddit
You’re a moron. This has nothing to do about making sure an employee is “working”. It’s about making sure that the computer locks if the screen is inactive for a certain period of time to prevent unauthorized use.
TheGlennDavid@reddit
Ahhh that makes sense. I remember hearing about the return of jigglers during COVID remote work when places were deploying wacky tools to measure time-on-task.
Using them to avoid security based screen locks is certainly bad.
Nydus87@reddit
We had a guy working in Information Security that had access to our corporate verizon account. He'd go down to the Verizon store, setup a new line of service to get a free IPad or iPhone or whatever, then cancel the line, have the device cost billed to the corporate account, and then he'd give the devices to his friends or sell them online. We busted him, reported him to management, and he was still working there in a leadership and security role when I left a few years later.
VIDGuide@reddit
Oh this reminds me of one guy we had. And to say this is the least shady thing he did is an understatement. But those were more in the “outright illegal” category.
Anyway, he would talk staff member into a deal of “porting their personal number onto a company plan”, which would then be salary sacrificed to cover the cost. This bit was above board, though a headache when staff ultimately churned, but they got a slightly better plan, and everyone won, right?
Except what others didn’t know, he’d port their numbers in and get a new phone issued on the new contract. Employee only got billed the line cost, the hardware plan the company just pooled with all the other ones. The actual brand new physical phones? Off to eBay it turned out!
DrDontBanMeAgainPlz@reddit
That’ll teach you
Nydus87@reddit
I definitely learned a valuable lesson. I need to get me some friends in high places.
PsyOmega@reddit
Or gift them tons of free ipads.
tech2but1@reddit
Or have something on them...
TotallyNotIT@reddit
In security, his friends were probably purchased with the blackest of mail.
Odd-Distribution3177@reddit
Old IT support guy was hosting a warez site using out 128kbps isdn internet link patched through via a serial slip connection to an old pc under his desk. Like the length he went to to hide the pic was unreal
fubes2000@reddit
When I worked for an MSP one of our night guys was using the 2Gbit [quite a lot in 2009] internet connection to torrent large amounts of anime.
I caught him when he left the office with a portable hard drive and got into my car and drove home to my house.
;)
wwbubba0069@reddit
there was so much stuff when I took over the IT here (XP era). Was like the wild west, there was no domain, no web filtering, everyone was local admin.
One dude was doing taxes as a side business, one lady was running copies for her bible study group on the mailroom copier, like a ream of paper at a time. 1 in accounting and 1 in shipping teamed up and were shipping stuff on the company UPS account. So many were using their office desktop as photo backup of vacation photos, one guy was keeping nudes of the women he dated so he wife wouldn't see them on the home PC.
The day I put the web filter in place I was the most hated person for while.
ahh... memories...
davidgrayPhotography@reddit
I know a business where the CFO was doing taxes as a side business during work hours.. and some of his clients were employees. That same place had several people doing side businesses during work hours, but as long as it didn't interfere with the work being done or wasn't using company resources (e.g. no mailing stuff using the company's resources, printing stuff occasionally is okay but not like a whole ream of paper) then they looked the other way.
moderately-extremist@reddit
I feel like every place I've worked there some middle management or assistant getting busted for using the company shipping account for personal items.
vemundveien@reddit
I once ran a php chatbot for an MMO I was playing on my webhost because they gave me SSH access. They unfortunately busted me after a few weeks, but that at least gave me some reassurance that they had decent monitoring.
In the environment that I manage my main issue has been rouge APs because there is a guy who both knows exactly enough to be dangerous and is under very strong pressure from his CEO to keep costs down.
SM_DEV@reddit
Is there something magical of the AP is rouge? Does it have enhanced performance with pr0n?
vemundveien@reddit
It seduces unauthorized people to connect to it.
SM_DEV@reddit
The PoE..
BlackV@reddit
No , I think your are thinking of a succubus :)
Traditional_Ad_3154@reddit
I confess to decades ago as a dev sending a 320 MB Magic Carpet CD image via email to all of our 1200 shops spread throughout Europe (at that time).
All shops were busy downloading for days (ISDN 128kBit lines at that time), until the email server kept crashing due to "out of disk space" situations arising from GroupWise obviously creating copies of the attachments for every recipient (plus).
Hey, it was a mishap.
At least one shop installed the game, and loved it.
Admin did not like it. Especially because GroupWise was hard to convince to stop sending the outbound stuff. I think after multiple deletion and repair and reboot attempts, they simply added more diskspace to the server and waited until it was all done, then introduced a size limit for email attachments. Which was a wise decision.
pdp10@reddit
Groupwise had an awful SMTP gateway. A division had a Groupwise 6.5 that was having outbound mail problems, and it turned out it treated 400-series temporary errors as permanent errors. That was a problem in the age of graylisting.
dartdoug@reddit
We were contacted by the owner of a small (fewer than 50 employees) distribution company to figure out why they had multiple racks filled with servers and to determine why they had multiple T1 lines (this was before cable and fiber broadband was a thing) even though they really did nothing on the internet except some daily EDI transmissions.
The owner waited until his lone IT guy was on vacation to have us come on site. The owner had admin passwords (which was a pleasant surprise). We snooped around freely for a couple of days.
Turns out IT guy was running a sizable web hosting business. On equipment purchased by the distribution company and using access lines paid for by the distribution company.
IT guy was fired upon his return from vacation. Sadly, the company was in such dire financial straits at that point that it closed up entirely less than a year later.
PsyOmega@reddit
a wifi router inside the cubicle (like, inside the cubicle wall itself. tricky but if you've ever taken one apart you'll know what i mean.). patched in to the lan port 3 or 4 cubes down and carefully routed the cable under the cubicle walls so it was completely invisible.
SSID was similar to the downstairs neighbor business who's AP was directly below so the signal levels were similar and not suspicious.
zenmaster24@reddit
What was the point of it? Was wifi not allowed in your office?
jeffrey_f@reddit
Contractor set up a wireless router to our network to bypass the allowed computers on the network. He got his computer allowed to the network, then changed the MAC on the router, which allowed the router to connect.....then connected ALL of his and his assistants devices to the router, bypassing our security.......
I saw the router hidden on the desk and notified the network admin who walked over to the desk with a box on a cart and picked up every device and dumped it into the box and walked away with it.
The IT manager confiscated the router but gave back the computers, cancelled their contract for breach and fined them for breach as stated in the contract./
Using this incident, IT was able to upgrade their network security as they asked several times........this time the company could have been in violation of PCI and many other things
i_removed_my_traces@reddit
SOCKS tunneling with putty to avoid those pesky proxy-servers back in the day. Did this for school and a few workplaces, until I was the one trying to block it.
davidgrayPhotography@reddit
Funnily enough, I had to use SOCKS tunnelling with a Raspberry Pi to get through to the captive portal, as I was doing a headless install and kept getting denied internet access.
Bob_12_Pack@reddit
Back in the late 90s/early 2000s I knew a guy that worked at a company that installed POS machines, their customers included retail chains, grocery stores, etc. Every single PC came with a packaged copy of Windows so they had store rooms full of these boxed and sealed copies of Windows. He had a side hustle of selling them on eBay. Never got caught, still works at the same company.
koshka91@reddit
I wonder if the licenses were included
trippyspiritmoon@reddit
We had a client who was ending their contract with us, and it wasn’t exactly a clean cut of ties; it got financially and contractually rocky, and even personal at some points.
Long story short, we are on the phone with them (mostly just this one lady from upper admin) helping troubleshoot, what normally would be, just your average network issue. But sucks for everyone because patch panel cabling is involved
(i say we because it was helpdesk tech with phone on speaker as management is listening in/monitoring. Just to give some context)
Client is pissed because “we made an update that slowed the network” but we are near confident someone plugged a voip phone in twice (dont ask about STP… another story)
I guess this lady on the phone was involved in the “political” drama going on and treated this as like some war; we were the enemeis whom cannot be trusted. Well i guess in her valiant efforts to make us look weak, and most importantly, incompetent, she threw in a little sabotage and started cutting the 3ft patch cables with a pair of scissors.
No telling how far she got before someone saw what she was doing and started yelling and stopping her.
The phone suddenly went mute. My bosses look at each other… grinning. This particular issue was being closely monitored by the c suites of this (big) business. This was definitely used as some leverage point, but I wish i knew the specifics
Nonetheless, they were our biggest client and we lost them.
Plutus77@reddit
I was a tech department student intern in high school and had certain elevated permissions but still didn’t have firewall bypass access like the teachers had.
I did have access to AD to a certain extent though. I couldn’t add myself to the firewall group directly but did find that the teacher group was added as a whole to the firewall group and that I could add myself to the teacher group.
Got called into the principles office with the IT director. They were mad till I told them they just laughed and said to stop.
Prestigious-Ad8209@reddit
Worked for a Internet provider/data center that was made up of (not making this up) 52 small mom&pop neighborhood internet providers.
Lots of different processes and employees all over the country. This was back in the dial up/DSL days. The remote guys were all given a T1 line to enable them to work remotely at a reasonable speed.
Many, if not most of the guys bought switches/routers and sold excess bandwidth to neighbors.
At some point, when we had progressed past DSL/ADSL, it was decided to get rid of the T1 lines and put the remote workers on their local providers, except for a few really remote workers.
Well, some of these guys controlled the billing, which is how we kept track of our assets, so they deleted the rows for the employee T1 lines.
They were still paid for, but no longer traceable.
A few years later the company decided they had lost control of accounts/billings/customers. They seemed to have more circuits/nodes than customers.
They brought in a company that said they could do it in about 3 months and $250,000 by following every node in our network. All in the background.
Or they could do it over a week for $30,000. They would pull the cable from the switch. They had a guy with radio in the DC and another guy in CS with a radio. They would pull a cable, a customer would call in, they would plug it back in and when the customer said “It works!” they made sure all the customer information was correct.
Noob_Skywalker@reddit
Worked at a place with a 45 day password change policy, which is flat out stupid.
Dev set his computer date to ten years in the future, changed his password, corrected the date, and every forty five days whatever process would query for passwords needing a change would run, see his PW as not being 45 days old, and he was in the clear. It was genius.
And no, I didn’t rat him out. At a company function down the road he and I were chatting and I told him I found out what he did, he smiled and thanked me for my discretion.
rumski@reddit
That’s how I got away with free FortiAnalyzer and ..FortiManager, whatever it was, appliances. They had VM appliances on 15 day trials and that timer started on deployment. I shut my host down, set the time forward to 2035, deployed the VMs, shut the host down and corrected the time. My “15 day trial” became “20 year trial” and the trial was full featured. I had FortiGate firewalls so it just all worked.
Immediate-Cod-3609@reddit (OP)
One has a moral responsibility to disobey unjust laws.
ycnz@reddit
A couple of people in the call centre were playing up, their manager asked me to spin up some reports. Each of them were spending > 5 hours a day of internal calls. To each other.
Twikkilol@reddit
I used to work on ships in my old company. been on many vessels upgrading and maintaining the IT onboard.
Oh.. my.. good have I seen many creative ways of "getting around" the system.
Most offensive one I saw was probably someone had straight up unplugged our Firewall from the VSAT satellite, and plugged in some TP link shit.. When I got onboard I cut the cord and trashed it so bad it could not be recovered.
I've also tried many attempts of plugging back in cables that was disconnected.. Ended up just cutting the shit so short they could not be recovered too..
Fuck me man. I'm never working on ships again.
Muad_Dib_of_Arrakis@reddit
Anything wild that's specific to ships?
blue_canyon21@reddit
About a month after starting at a place, I uncovered that the IT Director had been running his side business, a rather successful local eatery, on "decommissioned" servers, switches, and a Sonicwall in a supposedly not used anymore server closet for about 5 years.
I only found it because my predecessor didn't clean out his desk and I found a crap-ton of keys in the back of one of the drawers. One slow afternoon, I grabbed the keys and started trying them out on random doors.
All of the equipment was labeled as if it was in his own closet and the uplink for the Sonicwall went to a hidden Cisco switch that also had the uplink to the corporate Sonicwall.
I asked him about it and he threatened to fire me. So, I took the info to the CEO. He resigned a few weeks later.
*I took it to the CEO because the CIO had retired a few days before.
Dizzy_Bridge_794@reddit
I took over an IT department. On the old guys last day and my first day he told me he was running an IT support company out the back door and asked if I wanted in. Discovered he was supported a couple of dozen companies with the same hardware etc. that we purchased. Every time soothing needed fixing he’d bill it thru our company. I turned him in to our boss. They never did a thing. He cost the company a few hundred grand.
nillawafer@reddit
We had a guy who lived next door to one of our buildings. He was on the custodial team. He bought a commercial router and plugged it into an open Internet-only port in a corner room. Then, he hid the router under a desk.
He was using the router to provide WiFi for his home.
The guy got busted because one of our techs went in to do some maintenance in that room and found it. It spawned an entire investigation.
skydiveguy@reddit
I blame you for not using port security and disabling ports in the management interface that are not in use. Our infrastructure alerts us to rogue APs and blocks them immediately
nillawafer@reddit
This was at least like 15 years ago at a small operation. Clearly, this would not be allowed today.
Basic_Chemistry_900@reddit
User: Took on a new client at my MSP who had no central structure or IT security controls. We found a Bitcoin mining rig in an unused back corner office once we ran a network scanning tool and saw it in the report.
Admin: I was friends with one of my other admins on Venmo and saw someone paid him for "iPhone X". Then another. Then another. I thought that was weird and counted the number of spare iPhones we had in the server room. I counted a few weeks later and turns out we were missing 2 since last count. I told him we seemed to be missing a few spare iPhones and he almost shit his pants. I regrettably didn't report him but he stopped taking them after that.
blue_canyon21@reddit
Had a similar case where a coworker was taking spare hard drives and selling them as "Old drives from Plex server."
Every few days, he would reset some random users account password and use that account to submit a ticket claiming something like, "Clicking noise coming from computer." He would then immediately claim the ticket and start "working on it" by grabbing a spare drive while saying something like "gosh, drives are dropping like flies lately."
He would go to the user and say something like, "Hey, there was an issue with your account, and I had to reset your password. You can go to the account portal and change it back to whatever you had."
He was caught when the Director noticed that we were ordering a lot of drives and tasked a sysadmin to investigate. Coworker didn't know that serial numbers were logged. It wasn't long until it was noticed that all the machines that should have had new drives didn't, and the common thing was that he was the one that claimed tickets for replacing them.
SlimDayspring@reddit
Worked at a tech camp for a few summers. One of the staff took computers that were not being used and tried to farm bitcoin. This was like 15 years ago.
JohnGillnitz@reddit
Way back when a user setup a Counter Strike server and justified it as "a tool to monitor network latency and uptime." Okay. It was me.
koshka91@reddit
U ever heard of the pure pwnage series?
Full-Plenty661@reddit
ROUGE VM!!!
PsyOmega@reddit
Actually rouge pc
gangaskan@reddit
We had a guy who wired in a hub at a fire station , watching scat and animal porn at night.
Got ratted on cause he pissed the wrong guy off.
Also had a guy with 3tb of cp. Granted all of it was not at work, guy did the world a favor and hit the delete button.
MJRPC500@reddit
Many years ago I helped build a large format projection system, using 6 Barco projectors, in a 2vx3h array, rear-projecting onto a screen about 20' tall by 48' wide. The projectors were all edge blended using Watchout and the picture was huge, bright and beautiful. I came in one night and one of my technicians had loaded Wolfenstein on the master PC so he could play on the "big screen." I kinda admired the ingenuity, but told him he'd need to buy new lamps for the projectors if I caught him playing again... those lamps were about $400 each as I recall.
Dry_Marzipan1870@reddit
20 years or so ago i worked at a call center, doing surveys about grocery stores. The surveys took like 15 mins, it was tough to get people to do that for no fucking money. Hated that job.
Anyways most computers were the kind with no Windows, just a black screen with orange text, basically an MS-DOS looking thing. But a few computers were windows. I got assigned there one day, i installed AOL Instant Messenger and was playing BBS games. I also found out from another person how to be able to see the supervisor window that showed completed calls, idle time etc for everyone. Supervisor came up behind me, i alt tabbed, she said what was that, i said what was what? Went to lunch, came back and they told me to go home. I was fired on the answering machine haha. Fuck that job.
Slyfoxuk@reddit
As a previous child, we had access to a shared drive and could place files anywhere within the directory tree, in our juvenility we filled the shared drive up ._.
subsonicbassist@reddit
Worked at a staffing company, someone who wanted a job spoofed the PHP on their profile on our website to obnxiously spam us asking for a job... the did not get any jobs with us, but I did chuckle haha.
aliensporebomb@reddit
I've got some great stories but the most blatant and ridiculous one was a guy who showed up very early in the morning to "conduct AA meetings" in the office's conference rooms with the permission of the office. Except, he spent most of that time in to jimmy the lock to our network closet and created his own network by plugging a switch into one of our switches and then snaked a bunch of cables from the switch to various items of his that he wanted to have that were "independent" from our network (but really weren't). Let's just say it didn't take long to detect this rogue addition to our network and pretty soon it (and he) were summarily dismissed from our building later that morning. Yeah that was bad.
whosnetisitanyway@reddit
A senior VP at a financial firm was storing her home-made pron on the work file server when we were trying to free up space (quite a few years ago when storage was kinda expensive).
She was asked *twice* to remove any large non-work related files from the share. She was then fired 6 months later after she stored some more of her 'personal files' on the shared drive. And this was also after it was mentioned to her that the IT team can view her files after the original incident...
brnstormer@reddit
Caught a user searching all files for pass and password.....another running nmap scans, unfortunately no action against either even though it was reported
reigorius@reddit
Next time I'll use ass and assw*
Mr_ToDo@reddit
How'd you catch the file search?
brnstormer@reddit
Used to check his command history periodically
anymooseposter@reddit
That was me going through keychain because I can’t remember my passwords for shit.
brnstormer@reddit
Lmao....this one was repeatedly asking for admin privs though
drozenski@reddit
Got two.
First. Working my first job in a call center in IT. I was tasked to find out why a CSR's sales, call though and other stats basically fell off a cliff. He said calls were just not coming to his phone even though all the CSR's were in a round robin call Q.
Ended up finding out that the CSR found that if they pressed 0 to get to our internal call list then hung up it would kick his phone back to the bottom of the call Q. He would just wait till his phone was approaching the top. Press 0 and boom another free 10-15 min break. Over and over. Got away with it for a week before he was discovered. Not sure what his long term plan was since the system collected metrics on everything.
Second. Same call center. I trained a new class 15-20 of CSR's every 2 weeks. Call center turnover is crazy high. The first thing we told all of them is IT basically knows every call they make, every program you open, every website you visit. We specifically had to bring up pornography and not to go to any sites that displayed it. We had filtering in place but in the early 2000's it was still the wild wild west.
A CSR on his first day in the first hour he was employed sat down, went straight to a porn site. We got an alert and wanted to make sure it wasn't a false alert since no one could be that stupid. We went down to investigate in person and the CSR was already being escorted out by security. Not only did he open a porn site the first hour he was employed. He sat down directly in front of the call center directors office with a huge window he used to over look everything and saw it all.
bandana_runner@reddit
"...open a porn site...directly in front of the call center directors office with a huge window he used to over look everything and saw it all...
I worked for a now closed hospital in western Ohio, USA. One of my fellow entrance greeters/wheelchair attendants sat at the desk in the Emergency Department waiting room, which was les than 6 feet in front of the mirrored windows of ED's Campus Police sub-office and was looking at gay porn. He was termed real quick!.
rosscoehs@reddit
Flake_3418@reddit
Recently someone in the company reported a samsung galaxy s24 was stolen. It was setup as shared device in intune. The last known location was the home adress of the reporter lol.
Quagmoto@reddit
I’d see how it was joined to the domain, Intune and by who. All the cybersecurity software is added zscaler and EDR, it’ll start flagging things. Also naming conventions of the workstation in our ITAM will flag things too.
Quietwulf@reddit
When I was in university, we had an arms race going with the local sysadmins. We liked to install games onto the machines in computer labs so we could host LAN parties, but they kept trying to lock us out.
First they tried to prevent us getting local admin, but at the time MS Office required local admin to run. You could just go into Word, use Open File and select cmd.exe. That’d grant you a command prompt with local admin.
So they tried to block access to the Windows directory to prevent browsing to the file. We used a macro in Word again to just open the file.
This went back and forth for most of my degree.
Good times really. Kept us all sharp 🤣
KadahCoba@reddit
Mine have been pretty minor.
Had one guy pirating movies. We didn't have much bandwidth at the time so it was a problem. Tried to be nice by giving them the very obvious hint that we knew what they were doing and to cut it out by deleting the whole thing, even left a note to such in the place they had the torrent client hidden. Day later they were doing it again, so I blocked all traffic to or from their workstation to the WAN. About a week later he started torrenting on a different computer but by that morning I already knew he was getting fired that afternoon for other things.
Had another guy had been using his work email to hide his paid porn site subscriptions for years. Was going to have the not so subtle talk about how gmail works with him later that week but he had put in his notice for entirely unrelated reasons. Pretty sure he didn't migrate his email on those accounts before getting locked out.
NirvanaFan01234@reddit
Not super sneaky or anything, but I used to work for a software development company years ago. One of our interns (who had admin access on some development servers) installed some software that was used for analyzing radio signals. I think it was SETI@home or something like that. He installed it on dozens of servers before anyone noticed. It's one of the only times I've ever heard of an intern being fired. The vast majority of the ones I've worked with are too scared to mess anything up to do anything remotely bad.
Top_Boysenberry_7784@reddit
Not a user but I worked for a business for a very short period of time and the owner brought in a laptop that was encrypted, and he wanted access to the data. I can't remember the exact story he told but he also said once I got access to not look at any files on the machine. This was 2011 so it wasn't exactly normal to see a laptop with encryption.
Once I was able to confirm that the laptop was the property of a government entity, I set it down and left. This was one of my first actual IT jobs and can't believe I just walked out. If it happened today I would have set there until the police arrived to make sure he was arrested. That guy never paid me $2000+ that I was owed. He continually stiffs people, business, municipalities with scam businesses that last months and then it's onto the next scheme. He has never been charged with anything meaningful.
RexRonny@reddit
I work in a ship owner company with IT. Data on a ship is precious and expensive. We divide the data into two segregated segments office and crew (private use). But with quotas attached they burn through their weekly limit rapidly; here’s how creative they were:
one guy opened up the wifi card in the work pc on the office pc for a personal hotspot, another guy pulled a cable from the sat modem, used the spare port directly to he’s cabin but easy to tell who did this, another copied the MAC address onto a laptop, some guy added router behind the wifi spot in the wall, ghost crew and so on
roger_ramjett@reddit
I maintained a rack of web servers with about 800 clients.
One website was way beyond the acceptable storage limit. So I started digging into the folders on the site.
I discovered a large folder of porn buried way deep in the file structure.
I messaged the website contact about it and in the end I was the one to delete all the contents of that folder.
tesseract4@reddit
I used to support small businesses with their on-prem servers running our retail software. So many times did I have to tell the wife of a mom and pop store that their server crashed because their husband (or one time, grandson) filled up the hard drive with porn. Those were always fun calls.
NotThePersona@reddit
One of our sites users has to check in with their manager when they arrive for the start of their shift via email. Email was also not accessible outside of the building.
They setup a delayed send email to send when their shift started.
It was a huge deal at the time because one of the managers noticed that there arrived after they got the email to say they were there, and our client wanted to know how they accessed the email from offsite.
The main clue that I ended up sitting was that their last 3 check-in emails were all within 1 second of their start time. That was just way too accurate to not be a scheduled trigger. No idea what happened to the user, but was glad to figure it out before we got dragged over the coals for it.
thisguy_right_here@reddit
There was a a guy I worked with that had a paid megaupload account and would download content on the high speed connection at work and copy to his external drive.
He was downloading more in a week than the rest of the company (1000 staff multiple offices).
Got a paid weeks holiday and interent policy had to be updated, because technically it wasn't against the rules.
He got fired within 12 months of coming back for similar stuff.
I heard from internal IT department one of the files downloaded was "granny bangers 8" or something along those lines.
matroosoft@reddit
School had storage for each user except they removed all executable files after you logged off to prevent games being played.
So had a cmd script that when executed, renamed a file to have .exe as extension then started it. Then waited for the process to be closed afterwards and renamed it back. Fun times.
SubSonicTheHedgehog@reddit
I quoted somewhere that an admin installed seti@home on a ton of servers back in the day.
LRS_David@reddit
Way back when had someone install Napster so they could more easily share files than the official way. I explained to the small company owners what this meant. That was when all user accounts were made into Standard and not Admin.
Traditional_Ad_3154@reddit
Dude replaced Novell Netware's login.exe with his own which sent the userid and password to his console before replying "password error, please re-try", and spawning the real login.exe.
Same dude used a similar "technique" to track who is on-site and who isn't, so he knew when he could continue to play Duke Nukem whenever none of his enemies (or bosses) where on.
He after years and years of "success" blew up simply because the LAN was overwhelmed whenever he was playing with his team, and the LAN admin noticed, and tracked down the source. On that occasion, they found the login.exe stuff.
That was before internet, before remote work, of course.
BlackV@reddit
I did something similar with the lab machines at uni
Left the files running from my home drive.......
Hey mum, I'm Ah not going into uni for a month, er... Doing some extra study at home
woodburyman@reddit
Back in high school (Early-Mid 2000's) we did something like this, but didn't get caught. Classes after us got busted.
We ran a full on TV station (Local Education Access Channel) from our A/V room. A few nerdy kids like me had keys, and we'd use it as a break room instead of the cafe for lunch, or study halls. Naturally we wanted internet. They wouldn't let us have it because we'd be "unsupervised" in there.
When they redid wiring in 2001-2002, they had to run some fiber and coax for the TV station, and they blindly accepted our request of a few Cat5e cables too. When we were plugging them in the normally locked termination room with their core switches we terminated the Cat5e ourselves and plugged it in. We his the other end of the cord in a ventilation duct, and would pull it out, use it, and tuck it back up as needed to not get caught.
I graduated and the year after I graduated, my clueless now-Ex that was a year behind me, got a old hub (10/100 hub, not switch) and plugged the wire into that, and put a PC in there and left it plugged in and left a Ethernet cable dangling in the breeze to connect to laptops as needed.
Some bright person plugged the loose end of the ethernet back into the hub one Friday morning. Creating a loop.
Apparently the company that managed the schools network was idiotic. No storm detection, no STP, nothing. All cheap unmanaged switches. It brought the entire school down in a network storm. Apparently as our school housed the school regions HQ, the only DC's for the school and servers were housed there, leaving the entire school region DOWN. They spent 3 days straight with two technicians coming from out of state paying overtime somehow to trace and fix the problem, to the tune of $20,000 in 2007 dollars. They found the offending port, traded the cable back to the A/V room, and every student (including my stupid ex) lost access, and teacher in charge of the A/V program unfortunately reprimanded as well. (He was a very trusting person) and forced to retire more or less. I feel bad about it, however we left it there with strong warnings to our lower-classmen to hide it and use it responsibly. They did not.
strikesbac@reddit
Old company I worked for after I left had a new manager come in. He was caught using the DR environment to host websites for local businesses, and eventually mined Crypto on it.
Enough_Ad1308@reddit
Had a new IT person call in sick for 3 days and when they came back, they had wiped the machine and installed their own software (pirated??) but thoughtfully re-installed end point management software which recorded that most of their software was not correctly licensed??? AutoCAD was one of them… coincidence?
hamburgler26@reddit
Sega Genesis emulator running inside of Excel.
FuckYouNotHappening@reddit
I used to use TOR to browse DNMs at my jobs circa 2013 - 2016. 2016 seems to be around the time our Network Admins started locking things down.
bquinn85@reddit
Found all kinds of programs installed on users machines that absolutely shouldn't have been installed there in the first place. I also couldn't tell them to uninstall them since even though I'm in the IT department, I cannot speak for the IT department in any capacity.
inquirewue@reddit
We found one of our top sales guys using a mouse jiggler. He is super busy all the time and usually comes in the office which is rare for a hot shot sales guy. He is a top earner and spearheads a lot of new business. He refused to explain why he used one. Still doesn't sit right with me but hey, he doesn't use it any more and it hasn't changed anything.
BlackV@reddit
Just moved on to a new one
HistoricalSession947@reddit
There's a ton of micro politics and games at workplaces with "status" on Instant messaging software. You may not need to be worried about it (and good for you!) but plenty of people do and are involved with it.
ByGollie@reddit
He didn't know how to increase the screenlock duration maybe?
Valdaraak@reddit
I'd imagine it's more to get around company enforced screenlock durations.
mercurygreen@reddit
Bitcoin miner running on our school lab computers.
Vast_Resolve_8354@reddit
Driver took the SIM card out of his tablet (locked down via MDM) and put it in his personal device so he could watch Netflix on his tachometer break
BlackV@reddit
1 advantage of an esim I guess
Win_Sys@reddit
Had a client who's sysadmin used an automation tool that would deploy a cryptominer (i think it was Monero) after hours when no one was there. It was using like 200+ PC's to mine from 8pm-4am. He actually did a pretty good job hiding it, it would copy the miner to the machine, start the miner and then at 4am would stop the miner and delete all traces of it off the machine. They had antivirus software on there but what he did was download the miner's source, modified it a little bit and compiled it so it would pass the AV's known miners signature scan. After a few months they were getting suspicious of the increased power usage at the building and then either the version of the miner he created got submitted to the AV company or they came out with a better way to identify miners. So one day at 8pm the AV alerts went off like crazy and those alerts got sent to the IT director. He had us investigate what happened and it didn't take long to trace it back to him. He tried to claim he got hacked but he bragged to a few people about how much Monero he had.
ColHannibal@reddit
In college they had the dorms on a wicked throttle and blocked torrenting. So I figured out how to SSH tunnel past all the blocks , and log into the network with my user credentials. So I could essentially proxy to the unthrottled network and had 2gig internet speed to torrent.
I told a few people how to do it and told them to be careful and meter their usage. They did not and got their user credentials suspended lol, I stopped doing that and would just torrent the new movies and shows when I went home on my parents network.
ExceptionEX@reddit
I once had a user that flirted with me, dated me, then married me all for free IT services. The lengths that some people with go through...
Delicious-Wasabi-605@reddit
Myself, 😁 My wife and daughters have several of those little solar trinkets like plants and animals that move when the sun is shining in the window. I took an old music stand and taped my mouse to it and put it an inch from the rocking flower and it showed the mouse moving on the screen. I left it there for about 15 minutes and the mouse had randomly moved around the screen. It was more to satisfy my curiosity if it works than actually being sneaky but I did do it on company time.
fahque@reddit
They installed motion sensor lights in all of our offices. I had a cabinet next to the sensor and I was askew so it didn't see me and would shut off. I created a fishing line type thing that fit behind the sensor faceplate and hung a ball of paper over the sensor. The air current from the ac would constantly move the little ball keeping my light on.
cousinralph@reddit
Worked for a MSP, we were called out by senior leadership to run a full risk and overall IT assessment. Found an exceptionally well-run network and no real suggestions to improve. Found out six months later it was because the IT Director had setup a hidden CP server on his network and leadership was hoping we'd find it during our discovery process. He had apparently hidden it inside a wall under his desk. The feds ended up doing our job (they traced activity to the company's IP) and he's in jail for a long time.
WildChampionship985@reddit
When I was a Private stationed in Korea one of our duties was watching cameras from a building right in front of the only gate to our base. The cameras watched the gate, that you could see from the camera room, that was manned 24/7 by a mix of Korean and US personnel. I was playing around with the system and managed to get to DOS. Lots of old tech still running things in Korea, especially in the early 2000s. I promptly loaded my favorite DOS game for whiling away the hours, Warlords. Good thing North Korea never attacked, I wouldn't have caught it on camera.
virtualuman@reddit
Torrenting.
Candid_Ad5642@reddit
Going back a decade or two, and a handful of roles for this one
I was working in the IT department for a county (kommune). The county didn't bother rolling out WiFi, since everyone was using regular pc's, and smartphones weren't all that yet
At one of the schools the music teacher decided he needed WiFi in the music room, went out a got a bog standard home router, standard configure with NAT and DHCP
And if he'd only connected the ethernet cable to the WAN port, I doubt anyone would ever have known
He didn't
So he introduced a rogue DHCP server into a network that really should have been segregated, and that delivered IP's on the regular home use 192.168.0.0/24 subnet
The county had some 3000 users, and we stared getting calls from users with weird network issues within the hour
Eggtastico@reddit
I was going to post something similar. Someone wanted more ethernet ports & had put in an order for a hub (old building, so not many ethernet ports & hubs were quite common). Being impatient they brought in a broadband router, plugged it in & took out 200 users.
lormayna@reddit
I was not the sysadmin, but just a student. In the early 00s, my university assigned a static IP to the campus users and the passwords to access the captive portal were easily predicible. I remember people bringing desktop PCs from home and hiding inside cabinets hosting warez services.
rcook55@reddit
How about IT misusing IT systems...
First 'real' IT job, we were a Compaq shop, convinced my boss to switch to Dell but he didn't trust Dell so he told me that I needed to setup the Dells and stress test them. I configured Seti@Home and ran that on them for however long he wanted. At one point I was in the top 100 accounts.
Hindsight being what it is, this was right when bitcoin was first coming online. I was in a distributed computing forum and there were rumblings about a project that you could 'mine' coins. At the time it was very fringe and not that well understood. I had a fleet of 30+ computers back when you could legit mine BC on CPUs. I don't ever want to know what I could have mined but I also know I would have done something stupid and bought a fucking pizza with them...
namocaw@reddit
Rogue switches
Rogue WAPs
Putting BYOD devuces on corp WIFI or lan despite signed writtwn policies prohibiting it.
Installing antivirus that fights corp antivirus.
Uninstalling our rwmote acecess software
Actively storing porn on local devices
Hiring IT vendors and signing IT cintracts or using cloud services without consulting rhe IT dept when we typically alreayd hqve other competing services.
Keeping and actively using laptops at gome and sayjng they are lost. (Really? It is live on your home IP right now. Looks like your kids are usng it)
Storing files in prohibited cloud services.
Sending HUNDREDS of outbound emails from domain accounts instead of constant contact and Killing our reputatuin taking outbound email down for the whole org fir a bit.
Theres more, but i have to get back to finding and thwarting them now...
HeyHelpDeskGuy@reddit
I had a VP once "wrangle" policy writing away from me, and he make the language in the cybersecurity policy not apply to him specifically. He constantly fought with IT about installing XDR, CAP, MFA,etc and would always point back to the policy that he wrote.
Backieotamy@reddit
Around 2005ish, we found a dude hosting a Counter-Strike server under his desk behind his pull out filing cabinet.
TacodWheel@reddit
Worked level one for a healthcare org. They didn't allow access to personal email, so I would just remote desktop into my home machine for all personal stuff. Did this for 2-3 years. They blocked the service I was using at one point, so I just changed services and it worked again. lol.
tarlane1@reddit
I've got a Win 365 cloud pc in my personal domain that I make use of as a start point when I'm not at home. Browsing reddit on it now from work. Its pretty unlikely access to Microsoft is going to be blocked somewhere.
Remarkable-Host405@reddit
same with chrome remote desktop. i used to text all the time in school from google voice.
binaryhextechdude@reddit
Did this when I worked at the MSP. Fun times
MunchyMcCrunchy@reddit
The guys working in the AC shop at the Harley Davidson plant were not allowed to smoke in the building.
They still did and just stuffed the cigarette butts into an open drive bay cover on their PC.
When we went to troubleshoot the machine and cracked the case, probably 100 butts came spilling out.
RetPallylol@reddit
A regular user somehow got admin credentials, accessed a Cisco switch, and placed his device into a different VLAN. This VLAN did not have restrictions to which sites you could access. I was more impressed than mad really. He later moved into the IT team.
Kiernian@reddit
WINNER!
LOL.
This one is awesome.
DiabolicalLife@reddit
Late 90s, my first job was working for the school district (while still a student there). We had Duke Nukem 3D installed on a bunch of our computers and would have early day LAN parties.
At some point we discovered that it worked on computers across the entire district network and many other people joined in.
Backbones between the schools were only ISDN and we absolutely flooded the network to a halt.
That came to an end.
doctorevil30564@reddit
Way back in the early 2000s when I worked as a computer repair tech who also built new systems for the company to sell. I had a customer who had just bought a really nice AMD Athlon XP Socket A system (wasn't the fastest CPU but it wasn't the lowest spec one either). We offered a warranty on our built computers because we used new components with warranty on them from the company we bought our parts from. To that end I was required to use the foil warranty void if tampered with stickers to seal the case but so long as you didn't do anything stupid we would still honor the warranty.
The PC we sold her was supposed to be for their home business.
A week goes by, the customer comes back with their kid, the kid has broken the deal on the machine and installed a huge double 5.25" drive into the two open 5.25" drive bay slots in the case, and installed a SCSI controller into the single ISA bus slot on the bottom of the motherboard.
She is complaining that the machine keeps randomly freezing up or rebooting.
I ask why did they need that piece of equipment installed into the machine and was told it has some of our business software on it.
I dig out the tester to see how much of the PSU wattage is being used by the added equipment. It's just enough that under an extended burst of read / write activity the machine's PSU is being overloaded. The case and ATX PSU we used was more than adequate for the configuration we sold it to them for the PC with plenty of overhead.
Our recommendation to them was to figure out what software they needed off the drive and copy over to the new drive in the machine, or that we could sell them another drive and copy everything over to that drive from the old one or that we could special order them a new ATX PSU with enough extra available wattage to power that drive and the rest of the system with no issues.
They advise they will move the DOS program over then remove the drive.
A month goes by, the next time the customer's kid comes into the shop with the machine and wants to come back to the workbench area to talk to me about "something" for the PC. Once he gets past our front office and our office admin, he sits the computer onto the workbench and tells me it's not working can you take a quick look at it.
I take the side panel off and look at it and see it's got a different looking heat sink (the one it came with had a sticker on the center of the fan), and when I inspected further after testing it to see if it would post, I discovered that the kid has removed the AMD cpu and tried to cram a Pentium 3 socket 370 cpu into the socket A socket.
There is a lot of damage to the plastic section where you inserted the pins for the cpu into before closing the lever to lock the cpu in place.
I immediately go grab the owner of the company I worked for and showed him the damage before I said anything to the kid. The owner agrees with me that any warranty we had for this machine is now voided.
I managed to clean up the socket enough to re-install the AMD athlon cpu and the customer was called and told what had happened to the computer where "someone" had attempted to switch out the CPU and that as such any warranty we had for the computer was voided but that as a courtesy we had managed to fix the machine by cleaning up the damaged socket and reinstalling the original cpu and heatsink (which the kid had brought with him in a box).
The kicker, the machine still had that old scsi hard drive installed in it. The Kid had been told by someone that a Pentium III was a better cpu than the AMD chip and he took it upon himself to get his mom to buy the cpu as he thought that swapping it out would fix the problems with the computer. Before they left with the repaired computer the last thing we told them and it was also written on the work order that they had to sign was that in addition to the described damage that we repaired, they still needed to remove that drive if they wanted to ensure the stability of that computer for correct operation.
never saw them again.
BadSausageFactory@reddit
We had this one user that would ask questions like they were trying to start conversation but it always felt like they were really gathering information for their own purposes, I wonder what they were doing with the information.
dr_warp@reddit
Did you catch that game last night? It was ludicrous, wasn't it? So I was wondering, if I needed to add a website to the authNegotiateAllowList, can you maybe let me remote into the server to do that?
narcissisadmin@reddit
LMAO
SpiritualHiker@reddit
Snake
cad908@reddit
maybe trying to start their own MSP?
DrDontBanMeAgainPlz@reddit
Maybe was AI?
koshka91@reddit
Phone repair techs would sell the screens with the cracked glass (but good screens) to repair shops in exchange of broken screens. So instead of returning good screens to the company, they would give them all cracked ones. Companies eventually figured out and put a stop to it
Lava604@reddit
Disconnect and reconnect to VPN to get access to websites they should not have had access to. Using google translate with hyperlinks to bypass proxy restrictions.
VIPERTEC9@reddit
Tried using triage sandbox in secondary it worked for a while but then I got caught.
omn1p073n7@reddit
We had an admin download PDQ deploy and deploy an out of band "emergency" fix to some devices he oversaw. He botched it. We have an SCCM/Endpoint Engineering team just for said occasions and we got it mopped up immediately after we were made aware. We even have a process for Emergencies in our CAB so there was literally no reason to go out of lane.
techguyjason@reddit
We found a few antminers in a closet, the guy left the default pass on them, and we locked him out and the devices out of our network. (We dont have any sort of nac).
Ruevein@reddit
Had a user that only used macbooks and absolutely hated using any and all Microsoft products. In the very short amount of time they where at the company they did all their work on their mac, then emailed it to their work email to then send out. this included them setting up a share file to pull files out of our cloud storage so they could work on them on their macbook.
they where outed when they had issues opening security camera footage they needed to look at that was only available as a clients proprietary program that is windows only, and they asked me how to make it compatible with apple.
AustinGroovy@reddit
A while ago, but we had a training room with 30 seats, and 30 PCs. Someone installed SETI on all of them, feeding his account, trying to find E.T.
The room was not often used, but a couple months later Someone discovered them all running 100% cpu.
Alternative_Cap_8542@reddit
Bypassing firewalls by installing proxies
WhatsUpSteve@reddit
These 2 scenarios were from the mid 2000's before fancy monitoring were a thing.
koliat@reddit
One of sites at previous jobs was somewhere quite deep in Africa. We placed a standard “office stamp” there, dc and fileserver for guys to host their data. Turned out guys have had terrible internet and well, they turned the fileserver into local cache of porn named files. We for sure had a good laugh at IT and kindly told them to clean up as the free space was shrinking
Palsta@reddit
My virtual machines are cerise rather than rouge.
monkeh2023@reddit
We supplied one of our users with a high end laptop. He wanted to play games and didn't want to spend money on buying his own PC or console so he decided it would be a brilliant idea to plug in an external SSD and install his own personal copy of Windows.
Unfortunately for him hiss copy of Windows did a big update and bricked the installation of Windows on the internal drive.
MasterShredder@reddit
tell me more about the vm wearing makeup pls
Hangoverinparis@reddit
Does it count if i'm the one who misused the IT systems
S7ageNinja@reddit
One of my coworkers imaged a company PC, but didn't join it to the domain, and used it to farm crypto on the internal network.
i-heart-linux@reddit
Mainly crypto mining setups
Stonewalled9999@reddit
HR gave the $3000 laptop to her kids to game on and was shocked to fine Pr0n on her laptop.
grax23@reddit
I visited a branch office because they are having problems connecting to the WIFI and their username/password did not work. First thing i notice when i fire up my laptop is there is a SSID that was removed years ago and the official wireless network was nowhere to be seen.
I rummaged around and found a WRT54G (yes im not shitting you) under a table where is was plugged into a port that was meant for a printer that did not do 802.1x properly so it was disabled for that port.
The real AP i found in a closet on top of the router and switch so it looked ok apart form not being powered up
Oh and to make it real funny the password for the SSID that broadcasted was written on a note and pinned to the lunch room notice board
This AP was used by a external company that they had apparently made an agreement with ... straight into the corp network.
We never found the culprit but of cause removed the hardware and locked down the port .. they had to not have that printer anymore but thats on them
dr_warp@reddit
the freaking owner/COO of the company I used to work for insisted on letting us install caffeine to keep his computer from doing to sleep. Or other random mouse jigglers. He also instead on having VNC or whatever the similar program was at the time installed with a list of EVERY computer so he could remote into them after hours "if he needed to check on things".... So... Computer with phi with access to other computers with phi and software installed up prevent the computer from being secure.... Right buddy. I'm so glad I'm not there anymore.
bernhardertl@reddit
Not mine but a friends.
His place of work was a bigger area with multiple factory buildings and a barrier with keycard access to get on the campus.
Several employees from facility used to start early and to start their day with a big breakfast on company time.
Only problem was they never knew when their managers came in exactly to, of course, switch from breakfast to working mode.
Since it was facilities the were in charge of the electrical systems e.g. barrier and card reader.
Some nifty guy there programmed an api to read which card was placed on the reader from the access system. The wired in a RasPi gen 1 and a signal light in their breakfast room.
Initially everyone kept wondering what the light was for but nobody really cared about it.
This went on for several months until the company suddenly decided to replace the complete facilities team.
Ansky11@reddit
Son of IT manager allowed to run commercial hosting services on the side using company equipment.
When I pointed it out, "it's just temporary, no worries."
When I asked if I could host a small NAS for my own backups, "that's against company policy."
Later I even got fired to allow the son to take the father's position, as he was less competent than me.
radraze2kx@reddit
I once got rickrolled via the Screenconnect chat function by a student at a school for the severely autistic. Not even mad about it. Probably the best message I ever received.
fuzzusmaximus@reddit
At my old job we (local IT) had to use mouse jigglers on presentation machines because IT security wouldn't allow a screen lockout exception for them.
I know there was at least one IS professor who plugged a WiFi router into his office port because we didn't have it (this was before 2006), that brought about port security.
Then there was the math professor running a bit coin miner on his micro Optiplex.
Oh, almost forgot the DMCA notice we got that was traced back to an IT director's home PC using our dial up access for internet and file sharing by his kid.
DonkeyHodie@reddit
A secretary was caught running her husband's photography business from her work computer. She was doing all the books, invoicing, responding to customer inquires, and even sending out finished photos from her work computer. When they caught her, they had security walk her out, all while she was threatening to sue us because we wouldn't give her access to all of the photography business's files. She was laughed out of the building. But we did have to pull the disk and in-house counsel held on to it until they were sure she wasn't actually going to sue.
The really stupid thing is that if she had brought a personal laptop to do all of that, she probably wouldn't have even been fired, just written up for wasting time, since our BYOD policy at that time was somewhere between very lax and non-existing. But on a work computer? Completely different story.
ToBePacific@reddit
We had a malicious actor create a M365 account which they they used to host a few dozen terabytes of pirated movies and tv shows.
alan2308@reddit
I'd have to say the lengths users went to in order to hide the mouse jigger app on their workstations after the org started cracking down on it. But I guess that's what happens when managment measures productivity by the percentage of the day your status is active in Teams.
kop324324rdsuf9023u@reddit
I pirate all my movies and TV on the company internet because its faster than what I have at home.
xKINGYx@reddit
When I was at secondary school, I used to hang out with the sysadmin along with some other students during lunch breaks in his office as I’ve always had an interest in this sector. (10 years later I’m a programmer and homelabber so you could say it set me up for the future.) He taught me how to build a PC and I, along with the other interested kids, built a number of the PCs in use around the school.
He was the sort of chap you could mess with and he’d find it funny - as long as it was essentially harmless, there wouldn’t be repercussions.
I discovered a network share that was mounted automatically at boot by the PCs in school whereby they would execute a few scripts there to configure printers and such. Inside, I put a small VB script to loop opening and closing the disk drive over and over, then waited for the next day when the computers would all start.
Carnage ensues and I go more or less immediately to the sysadmin to let him know what I did so he can deal with it and he just bursts out laughing and is like ‘well I guess that’s on me, that share should have been mounted read only!’
Went on to find a few other security holes for him such as being able to access the BIOS on laptops etc…
Cracking guy. Would genuinely love to go for a beer with him.
avmakt@reddit
My first IT job back in the 90s was at a college, and one day a ticket came in from a lab saying an RJ45 socket wasn't working.
Checked the switch and it showed the port both working and, more mysteriously, connected, even if the socket was empty.
Removed the plate and found that someone had hijacked the network port and tapped into the power line, routing both below the floor boards to an old Mac motherboard with an HD. Running linux IIRC, but I may be wrong on that. Anyway, it was all very nicely and cleanly done, a lot better than some of my then colleagues would be able to. Can't remember what it was running though, probably just set up remote access to be able to pirate stuff.
Forensics on the HD showed it had been an office computer at a doctor's office, and it turned out the docs son was a student with access to said lab. What passed for legal at the time bucked as soon as the student (through his parent) denied everything and threatened to lawyer up, so he only lost his equipment.
I quit and moved not long after but heard he actually asked for the stuff back after graduating, in person no less.
bluegrassgazer@reddit
I worked for a marketing research company in the early 90s that had a fancy new piece of hardware called an auto dialer. You load it full of phone numbers, and you have a group of marketing research analysts who talk to consumers. It dials the phone numbers and sends calls that have connected to an analyst phone.
The executives of this company loved to golf but had a difficult time getting tee times, which back then were only acquired by calling the golf course clubhouse. You can probably guess the rest.
TheAnniCake@reddit
Maybe not as exciting as others but a head from another department that tried to frighten me (the apprentice aka. the person with the least authority) into giving him a new notebook so he could WFH instead of going the usual route with HR
Verydx@reddit
Lol I was remoting into a users computer for some support and I found a mouse jiggler software on the desktop, mind you this was also during COVID times in 2021 when work from home was 24/7, and so I reported it to my manager who then informed his buddy the CFO because she was in the finance team, long story short they “investigated” and suspended her pending results but writing was on the wall already and she ultimately resigned. I still feel bad to this day kinda for being the cause of her resignation but my manager told me not to worry and that the CFO said that they were kind of having some issues with her already so yeah. I mean at least hide the software and not leave it on the desktop 😂
grumpyfan@reddit
I worked at a company several years ago where someone in leadership was running some kind of crypto mining. I was brand new to the company (2nd day) as a contractor so I didn't have any access or information on it, but they wound up shutting down the entire network for two days and did a full sweep of all systems. They never came our and said who the culprit was, but they did send out a very strongly worded warning about installing unauthorized software. I asked about the incident a month into my time there and they questioned why I was asking and what I needed to know about it. I responded that I thought more transparency was needed for us in the security audit team to know more details, to which they referred me to my manager. I dropped it at this point and stopped asking, but later put things together.
laffnlemming@reddit
Was it your manager?
ohyeahwell@reddit
It was phone
grumpyfan@reddit
No, but I think it was above them, possibly a VP. They kept it quiet, officially, but there were plenty of rumors.
ThatBlinkingRedLight@reddit
when I first started with this company years ago, the previous admin had setup gaming servers to run on the production environment. He was hosting off the companies T3 lines
sitesurfer253@reddit
Users?! I had to slap a freaking helpdesk tech's hand for using a mouse jiggler. Had some cat and mouse, blocking processes, seeing a different one pop up, etc. Kid spent more time trying to convince people he was working than he did actually working.
crazycatguy___@reddit
Heard a tale from my mentor about how young CyberSec students (in high school) tried to, and managed to for about some time, access incredibly sensitive materials belonging to my campus. Only until one of them flubbed up and bragged about it on social media did they get caught. Afterward, the campus got a full redux of the network, and redid it all from scratch. It cost us $88,000 for a new firewall. My mentor said the department heads were scrambling and furious all at the same time.
chance_of_grain@reddit
Probably the worst we’ve had that I can recall is just rogue routers/other network devices but they are pretty easy to locate and shutdown.
OmenVi@reddit
IT Staff : Hey, we got alerts about some rogue network equipment.
User: Yeah, the wifi at this office sucks, and I found all this free stuff at the end of someone's driveway, so I picked it up and brought it in, hoping it would be faster.
da_apz@reddit
I worked for an MSP and we set up centrally managed WiFi APs in a customer's very large facility. It was not monitored. When we finally got a call about the system, the problem was that at random some machines don't have working Internet. I went to investigate and true enough, some machines didn't have Internet, but they also had 192.168.1.0 network, which was not what was supposed to be.
One of the APs had been zapped by a lightning and when that part of the facility didn't have WiFi, the customer's helpful late teenager son had "fixed it". By yanking out the managed AP and just plugging a basic WiFi-router's LAN-side where the AP used to be, then configuring it for the correct SSID and key.
CheeseOnFries@reddit
I’ll share one I did personally. A client blocked our org in an ancient app from writing custom reports (SQL queries) but we were not blocked from adding files to the network share that the app read from. I couldn’t change the files once they were there but I could make custom reports files and copy them to the shared drive to run.
stonecoldcoldstone@reddit
you need to fix my camera I can't have meetings - ok let me have a look at your settings in teams - no not that kind of meeting it's in zoom... when I'm gaming with my friends - ...ok I will politely ignore that you're using a work device for that so I don't have to justify why I haven't stopped you from doing so
Enxer@reddit
Using motion attached to our tenant, a contractor was creating meetings between his many accounts: 1x Gmail, 3x business accounts (we believe other current employments) to his one work account and random 3rd parties (one at a time). After the meetings he would delete them.
Turns out he has multiple jobs and is sub contracting his mediocre work to the third party racking up hundreds of hours a month.
We busted him because he was sharing out links to client work to which his boss saw this unknown person connect to the work making changes.
I think legal sent fyi letters to the 3 other ceos of the company emails he had meetings linked to his mailbox.
TinderSubThrowAway@reddit
I had a user ask if we could speed up the guest network a little because his playstation portal was super slow.
serverhorror@reddit
What do you mean "misuse"?
If a person starts using a system in previously undiscovered ways that's ... good?
Why would I want to invent a problem where people were able to solve completely on their own?
TinderSubThrowAway@reddit
I think it’s people doing things to do unauthorized things through unique ways.
BloodFeastMan@reddit
Exactly, if someone finds a clever way to accomplish a goal, I wanna be introduced.
hells_cowbells@reddit
This one wasn't sneaky as much as it was just stupid. One day I got an alert from our IDS about a system trying to hit an IP in Russia. I investigated, and found out it belonged to a guy who had somehow convinced management that he just had to have admin rights to do his job.
I went to his office to investigate, and explain what I saw. He said something like "oh yeah, that's probably my PopcornTime app I installed" I wasn't familiar with the app, so he gladly explained that it used BitTorrent to stream media. And he saw nothing wrong with this.
Sadly, he didn't get fired, but I did convince them to pull his admin rights and reimage the laptop.
marinecammand@reddit
Akstually 🤓, I would like to have the admin username and password to install an application that would make my life easy
SM_DEV@reddit
I e heard of red teams, but never rouge(red) VM’s… are they covert implementations by rogue foreign communist governments?
Japjer@reddit
I haven't seen any rouge VMs, but I'm not familiar with color-coding them.
not_logan@reddit
I used to know a person who used client machines, and he managed to mine bitcoins. He used MS GPO to deploy the miner automatically the moment the machine joined the domain, so literally every machine in a company was infected with the miner. Greed was the issue: miners started to interfere with normal user work causing freezes, overheating, and hardware damage. The person was fired on the spot the moment it was found by external audit. Nothing really smart or sneaky, but the scale and recklessness of this still amusing me
Anonymo123@reddit
Pretty normal stuff like mining crypto or hosting pirated movies to watch. Back in the day people loved storing mp3s on the network, that stopped with streaming audio options.
winky9827@reddit
I've heard of Azure VMs, but rouge is a new one.
SausageSmuggler21@reddit
My first job was 3rd shift helpdesk back when home internet speeds were 14.4k. The other guy was using the company's three -500k lines to download music. He would fill up some DVDs with music and sell the DVDs to his friends.
s_schadenfreude@reddit
Gotta watch out for those red VMs!
tommykw@reddit
I used to store game exes in MS Word.
Since it was also Window's 2000 at the time, login and pull the ethernet cable on profile load to get admin rights.
Built many many CGI:PROXY website's to circumnavigate web filters, also had automated the process.
I will offer my sincerest apologies to my school admin for them 5 years of him chasing me around.
Sorry, P.A.
BuffaloOnAMotorcycle@reddit
Had a user bring in their own laptop to circumvent a group policy we have that locks the computer after a certain amount of time. He would use a personal hotspot for Internet and just plug his laptop into a TV to display his presentations. I guess he wasn't technically misusing OUR system just going around it..
InsaneHomer@reddit
Not so sneaky as dumb. Tried to emailed himself a 'work.zip' file. But it wasn't work was it? Screenshots and downloads from his WhatsApp:- nudes, dick pic etc al.
Special_Luck7537@reddit
I kept seeing outbound traffic and a large influx of email from/to an Amazon type site on a regular basis, and investigated.
A new hire had setup her own store, and was designing her site and taking care of orders while working as a marketing analyst, using our shipping to mail out products, sent under the guise of Marketing Manager ...
She bounced quickly .
roger_ramjett@reddit
Back in the day we had someone using our main mail server as a relay for spam.
chimisforbreakfast@reddit
Nice try, boss.
blairtm1977@reddit
This!!!!!!!!!! ☝️☝️☝️☝️