Introduction
Introduction Statistics Contact Development Disclaimer Help
why-was-i-breached - annna - Annna the nice friendly bot.
git clone git://bitreich.org/annna/ git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws6…
Log
Files
Refs
Tags
README
---
why-was-i-breached (2562B)
---
1 #!/bin/sh
2 #
3 # From: https://whythefuckwasibreached.com/
4 #
5
6 actors="Russians
7 NSA
8 FBI
9 North Koreans
10 Chinese
11 Anonymous collective
12 teenage hacking prodigies
13 Iranians
14 KGB
15 industrial spies
16 competition
17 Europeans
18 Americans
19 cyber terrorists
20 advanced persistent threats
21 state actors
22 rogue AIs
23 APTs
24 Fancy Bears
25 foreign assets
26 master hackers
27 technology whiz kids
28 script kiddies
29 hacking activists
30 hacking people
31 security community
32 internet crowd"
33
34 methods="0-day exploits
35 unprecedented XSS vulnerabilities
36 infiltrators
37 overwhelming force
38 botnets
39 ransomware
40 DDoS attacks
41 IoT malware
42 advanced techniques
43 hacking drones
44 cyborg bees
45 digital nukes
46 the open door in our basement
47 that one vulnerability we were going to patch next Tuesday
48 that other vulnerability we were going to patch next tuesday
49 something something vulnerability
50 vectors we really couldn't have prevented
51 vulnerabilities in a 3rd party solution
52 weaknesses in our vendors
53 nefarious techniques
54 an issue in Wordpress 1.0
55 Heartbleed
56 a vulnerability in Windows XP SP1
57 pen and paper based social engineering
58 an open window in the server room
59 30 - 50 feral hogs"
60
61 targets="gain access to some data
62 cause a minor disturbance
63 potentially access some customer data
64 cause an undetermined amount of damage
65 partially disrupt our services
66 breach our high security servers
67 glimpse into our database
68 transfer 7 petabytes of data
69 extract some private keys
70 do something, but we aren't quite sure what it is
71 make a mess
72 make us look bad
73 force us to release this report
74 hack the coffee maker
75 install a C99"
76
77 mitigations="made everyone promise to be super super careful
78 gotten ISO certified
79 gotten PCI certified
80 worked with industry leading specialists
81 upskilled our cafeteria staff
82 hired external consultants
83 worked with law enforcement
84 bought an IDS
85 twiddled with our firewall
86 been pretty good about security
87 hired some people with 'CISSP' after their names
88 watched a YouTube video on cyber security
89 told them to not do it again
90 said that we are very sorry
91 copy-pasted a security policy we found on Google
92 hired a Russian dude
93 watched the movie Hackers 8 times back to back
94 sent one of our guys to Defcon
95 put a rotating lock GIF on our website"
96
97 selactor="$(printf "%s\n" "${actors}" | shuf -n 1)"
98 selmethod="$(printf "%s\n" "${methods}" | shuf -n 1)"
99 seltarget="$(printf "%s\n" "${targets}" | shuf -n 1)"
100 selmitigation="$(printf "%s\n" "${mitigations}" | shuf -n 1)"
101
102 printf "The fucking %s used %s to %s. But we have since %s, so it will n…
103 "${selactor}" "${selmethod}" "${seltarget}" "${selmitigation}"
104
You are viewing proxied material from bitreich.org. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.