Hacker News new | past | comments | ask | show | jobs | submit login

"n April 2010, during a 6:30 a.m. check of his servers -- by then part of his daily routine -- Milburn stumbled on a folder buried in an obscure Microsoft directory, one that’s normally unused. What he found inside startled him. The file contained the encrypted versions of all eight passwords in his system -- the keys to the entire network. The hackers could use the passwords to control just about anything he could, from web servers to e-mail."

Ah. He just decrypted the encrypted versions of his passwords by looking at them. I see.

And he "stumbled upon" a directory during his routine 6:30am check. Really? He's manually inspecting servers every morning at 6:30am?

This entire story is several levels of /headdesk.




If your servers were under constant attack, yes checking your servers every morning first thing could well be your routine.

You also assume he immediately recognised them. It could well have been someone one who later told him what he'd found.

Sloppy of the attackers to leave it in plain sight.


>...decrypted the encrypted versions of his passwords by looking at them. I see.

I think this means the hashed passwords. Microsoft have had several vulnerabilities in this area. Just entering a password to browse a server caused Windows (prior to Vista) to store the LM hash. An LM hash can be reversed in a matter of seconds.


Maybe he wants to beat the morning rush on his daily drive to the data-center~?


Well, maybe he's just using Xenix...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: