I hope that dumb cunt is as dumb as I think and left the flash drive with the encryption key in the computer and sticky notes with her passwords on her monitor.
Remember how Hunter's laptop password was hunter2?
Yep. If you get above 115 youre in a small group. Like less than %7. Get above 132 and youre in a%2 population. Id say that many on here are at or above %2 population range too. The rest need to fake it till they make it! Im 143 but it never did me any good,too defiant to comply. Id rather eat dirt than a dick!
He email was open and she did have sticky notes/stickers on her machine/monitor. So it's a safe ass bet the encryption USB and password to log in are there.
The biggest concern is if those PC's are thin clients.
PAW is a blueprint to prevent active directory domain compromise by mimikatz. A local admin or cached credential would work as well but I am 100% sure the system is Bitlocker protected.
Those hard drives are useless without the keys to unlock them.... unless we happen to get someone from Microsoft here willing to use the Bitlocker source code to create a hack for us... and even then that assumes that the encryption isn't one of those RSA algorithms that's basically a one way hash....
They lost any chance of getting any of her data when they shut the computer down. Its now just encrypted junk on a dive and only worth keeping in a measum in hopes that one day computer allows it to be decrypted in a couple months instead of a couple million years.
NIST STIG * configuration requirements practically demand it.
Pretty sure that unless they changed the passwords before killing the machine, they're well and truly fucked.
They might luck out and the IT guy only relied on Bitlocker (which isn't that hard to bypass), but I wouldn;t bet too much on that.
Yes, STIG is typically DoD, but IIRC it's still the hallmark for how all sensitive government computers/servers/etc are to be configured and maintained.
Yea it's DISA STIG but this is still pretty much right.
Oh and they probably use some kind of VDI (Virtual Desktop Infrastructure) that requires minimum client hardware - basically just a monitor and a box for peripheral plugs and USB media. The actual guts is floating on a hard drive array somewhere in a secure fed datacenter.
a lot of valuable information might be held in volatile memory, which would most likely be lost on any shutdown, but there is still a lot of places information could be salvaged off hidden hard drive sectors, memory swap, page files, etc. so not a totally lost cause
God I really hope they got outta there with the hard drives
They would be encrypted! Well, maybe. Who knows.
I hope that dumb cunt is as dumb as I think and left the flash drive with the encryption key in the computer and sticky notes with her passwords on her monitor.
Remember how Hunter's laptop password was hunter2?
Unless that was the joke.
Hunter2 as a password has been a meme for years.. lol
I know.
But I wouldn't put it past that crackhead.
http://bash.org/?244321
All I see is *******
95% of people really are that dumb.
Yep. If you get above 115 youre in a small group. Like less than %7. Get above 132 and youre in a%2 population. Id say that many on here are at or above %2 population range too. The rest need to fake it till they make it! Im 143 but it never did me any good,too defiant to comply. Id rather eat dirt than a dick!
He email was open and she did have sticky notes/stickers on her machine/monitor. So it's a safe ass bet the encryption USB and password to log in are there.
The biggest concern is if those PC's are thin clients.
What was Podesta’s? Something equally as stupid.
[email protected], I think
can u guess wht ianwatkins password was?
VERACRYPT ALL DA THINGZ
emails maybe
because emails have gotten us big wins in the past, right?
They HAVE TO BE ALL encrypted with Microsoft Bitlocker. Have to be Seriously, if not, their IT people are fucked up.
More than likely they use those machines as a 'PAW' (Privileged Access Workstation) to get into the actual system. In other words, a dumb terminal.
I bet her passwords were stickied to the underside of her keyboard though.
PAW is a blueprint to prevent active directory domain compromise by mimikatz. A local admin or cached credential would work as well but I am 100% sure the system is Bitlocker protected.
Those hard drives are useless without the keys to unlock them.... unless we happen to get someone from Microsoft here willing to use the Bitlocker source code to create a hack for us... and even then that assumes that the encryption isn't one of those RSA algorithms that's basically a one way hash....
They didn’t log off someone should have just uploaded everything to the cloud
Password: Seagram's7
Hillary gave gin a bad name, which is a shame because gin is fantastic.
They lost any chance of getting any of her data when they shut the computer down. Its now just encrypted junk on a dive and only worth keeping in a measum in hopes that one day computer allows it to be decrypted in a couple months instead of a couple million years.
Are you sure about this?
NIST STIG * configuration requirements practically demand it.
Pretty sure that unless they changed the passwords before killing the machine, they're well and truly fucked.
They might luck out and the IT guy only relied on Bitlocker (which isn't that hard to bypass), but I wouldn;t bet too much on that.
Yea it's DISA STIG but this is still pretty much right.
Oh and they probably use some kind of VDI (Virtual Desktop Infrastructure) that requires minimum client hardware - basically just a monitor and a box for peripheral plugs and USB media. The actual guts is floating on a hard drive array somewhere in a secure fed datacenter.
a lot of valuable information might be held in volatile memory, which would most likely be lost on any shutdown, but there is still a lot of places information could be salvaged off hidden hard drive sectors, memory swap, page files, etc. so not a totally lost cause
nah, u wont find anything on there, stonetear already bleachbit it