• 0 Posts
  • 44 Comments
Joined 9 months ago
cake
Cake day: February 7th, 2025

help-circle

  • Oh I do let him wait a while. Partially because I’m really not short on things to do. Partially because he’s happy enough when I get his request done in two days and I really don’t want to start setting higher expectations.

    Unless everything is on fire and he’s about to present his shit to the division head and only now realised he missed something, which might reflect poorly on my tool and is critical enough to prompt immediate action, his messages can stew a bit.



  • One client has a whole solution from me and occasionally keeps asking for this or that thing and I have to tell him what part of the app already does that because he can’t keep track of all the things he’s asked for already.

    If I had the time, I’d use the benefit of hindsight to restructure the whole thing and hope it’d help his pea brain along, but as it is, I spent too long just adding features wherever he asked me to, without taking the time to question whether that makes sense.










  • Me when I get a request for PII pertaining to a suspected corruption case: Have one of our corporate lawyers give me a written and explicit statement of what data I’m supposed to send to whom or get bent. I’m not touching that with a ten foot pole and gloves unless I have a legally solid affirmation that what I’m doing won’t come back to bite me, and that our workers’ council knows about it and will back me up.

    I’m reluctant to even confirm that I can get that information in the first place. I mean, I’m the one with full access to the audit tool, so I probably do, but I’d have to access that data in the first place to check. I don’t think that anyone would notice or care so long as I don’t share that information, but as you said: dangerously radioactive; don’t touch if I can help it.




  • Their explanation for having no backups was that 858 TB of data was “due to its large capacity”. They stored eight years of data without backups. Even with systems where they had backups, it sounds like there’s no redundancy – nobody can work because the single building where all the servers are located is currently out of order.

    Sounds like the acute symptoms of chronic penny-pinching when it comes to IT infrastructure. I hope they take some good lessons from it at least. Just a shame that it’s such a devastating way to learn.



  • Does the database use the same authentication and permissions as the API? If the API authenticates against the DB with a technical user, it may be still be an exploitable vulnerability for people who can’t access the DB directly but can access the API. I don’t know what database it is, what other databases run on the same server and what privileges might be achievable or escalatable, but generally “there are worse weaknesses” isn’t a solid security policy.

    You could give me a VPN access and I’ll take a look around :p

    (Please don’t, actually – in case it needs to be said, running pentests on prod is a dangerously bad idea already even before we get to the whole “trusting a stranger on the Internet just because they sound sorta knowledgeable” issue)