They established an on site connection first. So, unlikely...except...there probably are some people doing it already on site for whatever foreign actors are in play during the runoff...
Those machines are networked to SOMETHING. It might be a local server, but they're all feeding into central location. You get access to the machine via wifi, you use that access on the machine to access the central servers db.
I'm willing to bet you, ANYTHING, that those machines have a static SSL cert on them and the server does not check, nor does it care what it reports in and if it's dumping sql tables, that means ssh. ssh gives you full login availability to the central server via tunnel. What are the odds that permissions are half assed on the server and that machine permissions are root?
They established an on site connection first. So, unlikely...except...there probably are some people doing it already on site for whatever foreign actors are in play during the runoff...
He mentioned that you could siphon data off, manipulate it and dump back in.
Pump and Dump.
Absolutely, but it requires the WiFi connection either way, so someone would have to show up on site and drop a load.
Those machines are networked to SOMETHING. It might be a local server, but they're all feeding into central location. You get access to the machine via wifi, you use that access on the machine to access the central servers db.
I'm willing to bet you, ANYTHING, that those machines have a static SSL cert on them and the server does not check, nor does it care what it reports in and if it's dumping sql tables, that means ssh. ssh gives you full login availability to the central server via tunnel. What are the odds that permissions are half assed on the server and that machine permissions are root?
When it comes to the government, especially local government, expect worst practices when it comes to cybersecurity.