- cross-posted to:
- [email protected]
- cross-posted to:
- [email protected]
Found the error Not allowed to load local resource: file:///etc/passwd
while looking at infosec.pub’s communities page. There’s a community called “ignore me” that adds a few image tags trying to steal your passwd file.
You have to be extremely poorly configured for this to work, but the red flags you see should keep you on your toes for the red flags you don’t.
Yeah, seems highly unlikely to ever yield any results. Even if you did manage to read a file, you have to get lucky finding a password hash in a rainbow table or the password being shit enough to crack.
Also generally the actual password (or rather its hash) is stored in /etc/shadow on most systems from the past 20 odd years.
Yeah this is a TIL for me. I didn’t realize they were separated out. It makes sense, though I grant I’ve never taken a close look at these files.
And if anybody has publicly accessible ssh on their desktop machine, that allows password login, they’re kinda asking for it.
I cracked the BMC on my workstation motherboard by binwalking the publicly available firmware and finding, to my delight and dread, that the built in root user password was laughably weak. If a top5 motherboard manufacturer is still doing shit like that, users are too.
I also work in support and have seen first hand the bananas things people do, even smart people that should know better