Unable to load image
Reported by:

women in stem moment

https://old.reddit.com/r/homelab/comments/yjbkzt?sort=controversial

this is who administrates your network

155
Jump in the discussion.

No email address required.

There's some more r-slur shit going on here than their vcenter server being publicly assessable for sure.

I actually doubt it's a VMware issue at all, just because you have access to a virtual environment doesn't mean you have credentialed access to the AD environment.

Dumb fricking :marseytrain2: probably installed some exe that spread through it's network. It's possible, but it'd take an attacker with some manual intervention and time on their hands. Doubt they'd waste that much time.

That's far more likely than their virtual environment getting compromised.

I don't like to admit it because I'm a tried and true radio guy, but I do have a current VCAP-DCV deploy certification.

Jump in the discussion.

No email address required.

OP didn't bother checking his firewall logs and probably kept all the servers on one subnet, so I'd imagine you're right.

Jump in the discussion.

No email address required.

Implying zir has a firewall capable of logging.

Jump in the discussion.

No email address required.

you just know it's porn related

Jump in the discussion.

No email address required.

Neurodivergent :marseytrain2:s are probably the only people left downloading porn. Pry cheese pizza related.

Wasn't even thinking about porn lol

Jump in the discussion.

No email address required.

What vulnerability could there possibly be, besides a Plex server full of torrented hentai?

Jump in the discussion.

No email address required.

I don't remember the name, but there was a CVE that did come out last month with the only corrective actions saying do best practices like using the integrated esxi firewall, segmenting the network that VMkernal interfaces are on, not allowing unsigned vibs to be installed, etc.

I think that's what the :marseytrain2: is referencing, but I think it was only denial of service, not allowing guest access to the vms.

What I'm guessing happened is the :marseytrain2: downloaded some "tool" off sorceforge or some shit that's actually ransomware and installed it on a windows guest OS.

Jump in the discussion.

No email address required.

I'LL PUT ALL MY COINS THAT THIS CUTE TWINK USED A VULNERABLE SERVICE FROM 2010 BECAUSE IT MADE IT EASIER FOR THEM TO MASTURBATE TO :marseytrain: SHIT

Jump in the discussion.

No email address required.

Idk why. Windows defender ain't bad.

Jump in the discussion.

No email address required.

Link copied to clipboard
Action successful!
Error, please refresh the page and try again.