- Mar 13, 2006
- 196
- 0
- 0
Ran into a network admin that replaced me at a prior job - one of those half quit / half fired kind of things where my boss was such an uber_choad_huffer_from_hell I grudgingly took the severance and walked out the door. Yeah...we've all been there.
Anways, this arrogant F-tard that thinks he's Mr Kung Fu admin along with thinking I'm his friend or something. Remember the fat UNIX guy in Jurassic Park? Subtract 40lbs, add paper MCSE and a Rush Limbaugh fan club card, and you're close.
So the dude was bragging about how secure his network was and other meaningless tripe. Basically he kisses up to my ex Boss and tells him what he wants to hear while relying on newsgroups for 99% of his troubleshooting. Not to mention the twank initially blamed for me for a lot things that weren't my fault, and mgmt knows it.
So, Spike here got bored, and after bit of prodding around, found a back-up DSL line with RDP still port directed to a utility server. A few tries and I got in with a consulting companies 3 letter login and password that virtually the whole universe knows. From there I RDP'd into their AD controller using a local utility account with admin rights I know Einstein was too dumb (or lazy) to change. From there I used an established trick I won't divuldge to get a nice, fresh copy of the SAM, and FTP'd it to my box. I'm going at it with LC4 right now. When I left I made sure the firewall log (stored on the AD controller) was cleaned to remove traces of my clandestine entry.
So, I need advice on what to do now. My options are:
(1) Do nothing. Even though the FBI can be called for such a break-in, I didn't wreak anything nor divuldge company secrets. I'm not vindictive anyways, and some parents can't be faulted for not practicing birth control.
(2) Send him several anonymous boxes boxes of donuts with the Domain Admin password written on the underside in huge magic marker, so they only find it when they throw them out and hence have no frikken clue who wrote it. Chaos and lots of angry meetings and finger pointing result.
(3) Send him a Fairygram, which is some hairy dude dressed in a tutu and substitute packs of condoms for donuts.
(4) Go into the E-mail databases of his and the other people I didn't like for a couple of days, and keep marking all their mail as unread so they wait for their entire database to download everytime they login to Outlook. Do this to the trash folder for a week to people who refuse to empty it, and they rarely figure out what all those Outlook.Exe crashes are from. Gee, must be Spyware
(5) Option 1, cept drink more beer.
I'm inclined for option 5.
Anways, this arrogant F-tard that thinks he's Mr Kung Fu admin along with thinking I'm his friend or something. Remember the fat UNIX guy in Jurassic Park? Subtract 40lbs, add paper MCSE and a Rush Limbaugh fan club card, and you're close.
So the dude was bragging about how secure his network was and other meaningless tripe. Basically he kisses up to my ex Boss and tells him what he wants to hear while relying on newsgroups for 99% of his troubleshooting. Not to mention the twank initially blamed for me for a lot things that weren't my fault, and mgmt knows it.
So, Spike here got bored, and after bit of prodding around, found a back-up DSL line with RDP still port directed to a utility server. A few tries and I got in with a consulting companies 3 letter login and password that virtually the whole universe knows. From there I RDP'd into their AD controller using a local utility account with admin rights I know Einstein was too dumb (or lazy) to change. From there I used an established trick I won't divuldge to get a nice, fresh copy of the SAM, and FTP'd it to my box. I'm going at it with LC4 right now. When I left I made sure the firewall log (stored on the AD controller) was cleaned to remove traces of my clandestine entry.
So, I need advice on what to do now. My options are:
(1) Do nothing. Even though the FBI can be called for such a break-in, I didn't wreak anything nor divuldge company secrets. I'm not vindictive anyways, and some parents can't be faulted for not practicing birth control.
(2) Send him several anonymous boxes boxes of donuts with the Domain Admin password written on the underside in huge magic marker, so they only find it when they throw them out and hence have no frikken clue who wrote it. Chaos and lots of angry meetings and finger pointing result.
(3) Send him a Fairygram, which is some hairy dude dressed in a tutu and substitute packs of condoms for donuts.
(4) Go into the E-mail databases of his and the other people I didn't like for a couple of days, and keep marking all their mail as unread so they wait for their entire database to download everytime they login to Outlook. Do this to the trash folder for a week to people who refuse to empty it, and they rarely figure out what all those Outlook.Exe crashes are from. Gee, must be Spyware
(5) Option 1, cept drink more beer.
I'm inclined for option 5.