why-was-i-breached - annna - Annna the nice friendly bot. | |
git clone git://bitreich.org/annna/ git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws6… | |
Log | |
Files | |
Refs | |
Tags | |
README | |
--- | |
why-was-i-breached (2562B) | |
--- | |
1 #!/bin/sh | |
2 # | |
3 # From: https://whythefuckwasibreached.com/ | |
4 # | |
5 | |
6 actors="Russians | |
7 NSA | |
8 FBI | |
9 North Koreans | |
10 Chinese | |
11 Anonymous collective | |
12 teenage hacking prodigies | |
13 Iranians | |
14 KGB | |
15 industrial spies | |
16 competition | |
17 Europeans | |
18 Americans | |
19 cyber terrorists | |
20 advanced persistent threats | |
21 state actors | |
22 rogue AIs | |
23 APTs | |
24 Fancy Bears | |
25 foreign assets | |
26 master hackers | |
27 technology whiz kids | |
28 script kiddies | |
29 hacking activists | |
30 hacking people | |
31 security community | |
32 internet crowd" | |
33 | |
34 methods="0-day exploits | |
35 unprecedented XSS vulnerabilities | |
36 infiltrators | |
37 overwhelming force | |
38 botnets | |
39 ransomware | |
40 DDoS attacks | |
41 IoT malware | |
42 advanced techniques | |
43 hacking drones | |
44 cyborg bees | |
45 digital nukes | |
46 the open door in our basement | |
47 that one vulnerability we were going to patch next Tuesday | |
48 that other vulnerability we were going to patch next tuesday | |
49 something something vulnerability | |
50 vectors we really couldn't have prevented | |
51 vulnerabilities in a 3rd party solution | |
52 weaknesses in our vendors | |
53 nefarious techniques | |
54 an issue in Wordpress 1.0 | |
55 Heartbleed | |
56 a vulnerability in Windows XP SP1 | |
57 pen and paper based social engineering | |
58 an open window in the server room | |
59 30 - 50 feral hogs" | |
60 | |
61 targets="gain access to some data | |
62 cause a minor disturbance | |
63 potentially access some customer data | |
64 cause an undetermined amount of damage | |
65 partially disrupt our services | |
66 breach our high security servers | |
67 glimpse into our database | |
68 transfer 7 petabytes of data | |
69 extract some private keys | |
70 do something, but we aren't quite sure what it is | |
71 make a mess | |
72 make us look bad | |
73 force us to release this report | |
74 hack the coffee maker | |
75 install a C99" | |
76 | |
77 mitigations="made everyone promise to be super super careful | |
78 gotten ISO certified | |
79 gotten PCI certified | |
80 worked with industry leading specialists | |
81 upskilled our cafeteria staff | |
82 hired external consultants | |
83 worked with law enforcement | |
84 bought an IDS | |
85 twiddled with our firewall | |
86 been pretty good about security | |
87 hired some people with 'CISSP' after their names | |
88 watched a YouTube video on cyber security | |
89 told them to not do it again | |
90 said that we are very sorry | |
91 copy-pasted a security policy we found on Google | |
92 hired a Russian dude | |
93 watched the movie Hackers 8 times back to back | |
94 sent one of our guys to Defcon | |
95 put a rotating lock GIF on our website" | |
96 | |
97 selactor="$(printf "%s\n" "${actors}" | shuf -n 1)" | |
98 selmethod="$(printf "%s\n" "${methods}" | shuf -n 1)" | |
99 seltarget="$(printf "%s\n" "${targets}" | shuf -n 1)" | |
100 selmitigation="$(printf "%s\n" "${mitigations}" | shuf -n 1)" | |
101 | |
102 printf "The fucking %s used %s to %s. But we have since %s, so it will n… | |
103 "${selactor}" "${selmethod}" "${seltarget}" "${selmitigation}" | |
104 |