(no title)
illithid0 | 20 days ago
In the three or four year I worked with them, they would only let me do penetration testing of their user network, and never the segments where the developers were, and never the product itself. In speaking with their security team (one guy - shocker) during compliance initiatives, it was very clear to me that the product itself was not to be touched per the explicit direction of senior leadership.
All I can say is that if the parts of their environment they did let us touch are any indication of the state of the rest of their assets, that device was compromised a long time ago.
red-iron-pine|20 days ago
SSL crackers to MITM all ISP user traffic
Ms-J|20 days ago
unethical_ban|20 days ago