Ranter
Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API
From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Comments
-
@Linuxxx @PerfectAsshole you two for sure should have seen something if it was e.g. a black hat talk, I couldn't find anything similar to this yet
-
I haven't seen anything on it but just like you did by looking up the company to check their stack anybody else can also. So while stickers on laptops can be telling there's usually more reliable means for information gathering including looking for job offers(past and present) from the company
-
This doesn't work in environments where multiple companies are set up - you wouldn't know which sticker describes which company's stack. Unless you go read tags individually of course
-
@JoshBent Haven't found/seen anything about this yet but @PerfectAsshole is right :)
-
@PerfectAsshole @linuxxx fair point, wanted to mention the situation where there's no stack publicly available on their website, but then there's pretty much always still job offers. Oh well was a fun idea though haha
@ananaszjoe that's indeed true too, though it's more rare to find multiple companies in just one building around here I believe, so it could be still a way to get that.
I've noticed looking at the card exit of a building that most people a) just carry their laptop without putting it in the backpack because the carpark is a jump away anyway, b) that stickers on said laptops can leak your infrastructure
No idea what made me interested in that, but if you take the average of people's laptop stickers (sadly not everybody had their laptop or maybe even a laptop at all, so I've got just 20) - you could probably tell what tools and what services the company is running.
Could be a funny coincidence and I was able to verify later by googling their company, but it's an interesting non trackable way to know what services and tools need to be exploited/emulated to possibly gain access to some high security network.
I feel like somebody had to have a talk/presentation about this, so I wonder, had anybody else seen something like that? or how far could this actually go?
random