Lock and Code

Donut breach: Lessons from pen-tester Mike Miller


Listen Later

When Mike Miller was hired by a client to run a penetration test on one of their offices, he knew exactly where to start: Krispy Kreme. Equipped with five dozen donuts (the boxes stacked just high enough to partially obscure his face, Miller said), Miller walked briskly into a side-door of his client's offices, tailing another employee and asking them to hold the door open. Once inside, he cheerfully asked where the break room was located, dropped off the donuts, and made small talk.

Then he went to work.

By hard-wiring his laptop into the company's Internet, Miller's machine received an IP address and, immediately after, he got online. Once connected, Miller ran a few scanners that helped him take a rough inventory of the company's online devices. He could see the systems, ports, and services running on the network, and gained visibility into the servers, the work stations, even the printers. Miller also ran a vulnerability scanner to see what vulnerabilities the network contained, and, after a little probing, he learned of an easy way to access the physical printers, even peering into print histories. 

Miller's work as a penetration tester means he is routinely hired by clients to do this exact type of work—to test the security of their own systems, from their physical offices to their online networks. And while his covert work doesn't always go like this, he said that it isn't uncommon for companies to allow basic flaws. Even when he shared his story on LinkedIn, several people doubted his story. 

"It’s crazy because so many people say ‘Well, there’s no way you could’ve just plugged in.’ Well, you’re right, I should not have been able to do that,” Miller said.

Today, on Lock and Code with host David Ruiz, we speak with Miller about common problems he's seen in his work as a pen-tester, how companies can empower their employees to provide better security, and what the relationship is between physical security and cybersecurity. 

Show notes and credits:

Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com)

Licensed under Creative Commons: By Attribution 4.0 License
http://creativecommons.org/licenses/by/4.0/
Outro Music: “Good God” by Wowa (unminus.com)

...more
View all episodesView all episodes
Download on the App Store

Lock and CodeBy Malwarebytes

  • 4.7
  • 4.7
  • 4.7
  • 4.7
  • 4.7

4.7

42 ratings


More shows like Lock and Code

View all
Freakonomics Radio by Freakonomics Radio + Stitcher

Freakonomics Radio

32,011 Listeners

WSJ Opinion: Potomac Watch by Paul Gigot, The Wall Street Journal

WSJ Opinion: Potomac Watch

2,836 Listeners

Security Now (Audio) by TWiT

Security Now (Audio)

2,010 Listeners

Talking Real Money - Investing Talk by Don McDonald

Talking Real Money - Investing Talk

758 Listeners

CyberWire Daily by N2K Networks

CyberWire Daily

1,024 Listeners

The Clark Howard Podcast by Clark Howard

The Clark Howard Podcast

5,450 Listeners

Click Here by Recorded Future News

Click Here

418 Listeners

Bold Names by The Wall Street Journal

Bold Names

1,446 Listeners

Hacking Humans by N2K Networks

Hacking Humans

315 Listeners

All-In with Chamath, Jason, Sacks & Friedberg by All-In Podcast, LLC

All-In with Chamath, Jason, Sacks & Friedberg

9,938 Listeners

Cyber Security Headlines by CISO Series

Cyber Security Headlines

139 Listeners

What the Hack? by DeleteMe

What the Hack?

221 Listeners

The 404 Media Podcast by 404 Media

The 404 Media Podcast

386 Listeners

The Kim Komando Show by Kim Komando

The Kim Komando Show

160 Listeners

Decoding Retirement by Yahoo Finance

Decoding Retirement

21 Listeners