Пожалуйста, обратите внимание, что пользователь заблокирован
Hello all,
last year I was working as a pentester for a company located in middle east. By bruteforce I discovered a printer machine and when I went to look around I found out it was the old computer used by the secretary of the CEO and I happily exfiltrated all the data to a USB drive. and on the 5th floor printer I found network maps for the entire company. My point is always look at a machines files before moving on to the next machines in the network.
Thanks,
WG01
last year I was working as a pentester for a company located in middle east. By bruteforce I discovered a printer machine and when I went to look around I found out it was the old computer used by the secretary of the CEO and I happily exfiltrated all the data to a USB drive. and on the 5th floor printer I found network maps for the entire company. My point is always look at a machines files before moving on to the next machines in the network.
Thanks,
WG01