This is unfortunately insanely common in a lot of companies. I literally cannot count the number of passwords that I’ve had to update, from a combo of the company name and a four digit number, usually bigger than 2000.
lets not forget test user with password 12345678
Users: [“admin”, “1”, “name-of-company”] Password: [“admin”, “1”, “postal-code-of-company”] The options above in various combinations unlock the admin account on the production server of just about every client at my old job
Security through obscurity. They counted on nobody being able to remember how to spell Louvre.
That’s the same code I put on my luggage!
Now there’s no one standing between them and Druidia’s air shield!
I just finished testing my system’s password setup, I guess I need to add a few new tests.
And yet it had no incidence on the heist whatsoever, so why the focus on that?
No incidence, but if the rest of the security was like that…
Incompetent, or not paid enough to give a fuck? Or paid enough and just doesn’t give a fuck anyways?




