Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

It is in the same way you would assume an existing admin role to perform the highly privileged actions you want to take vs attempting to bootstrap access from scratch.


Does anyone else notice how similar that is in spirit to what a malicious actor would look to do after gaining access to your network?


Or how a malicious actor inside your network would follow exactly this plan to do malicious things without your knowledge...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: