{"id":126785,"date":"2026-05-14T07:22:47","date_gmt":"2026-05-14T07:22:47","guid":{"rendered":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/"},"modified":"2026-05-14T07:23:50","modified_gmt":"2026-05-14T07:23:50","slug":"to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely","status":"publish","type":"post","link":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/","title":{"rendered":"To gain root access at this company, all an intruder had to do was ask nicely"},"content":{"rendered":"<p> <a href=\"https:\/\/go.fiverr.com\/visit\/?bta=1052423&nci=17043\" Target=\"_Top\"><img loading=\"lazy\" decoding=\"async\" border=\"0\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/fiverr.ck-cdn.com\/tn\/serve\/?cid=40081059\"  width=\"601\" height=\"201\"><\/a>\n<br \/><img decoding=\"async\" src=\"https:\/\/mailinvest.blog\/wp-content\/themes\/breek\/assets\/images\/transparent.gif\" data-lazy=\"true\" data-src=\"https:\/\/image.theregister.com\/5239865.jpg?imageId=5239865&amp;x=0&amp;y=0&amp;cropw=100&amp;croph=100&amp;panox=0&amp;panoy=0&amp;panow=100&amp;panoh=100&amp;width=1200&amp;height=683\" \/><\/p>\n<div data-element-guid=\"d11159dd-82a3-4c53-901c-d41dec75505c\">\n<p class=\"kicker \" style=\"\">Safety<\/p>\n<p class=\"subtitle \" style=\"\">Human IT managers thought they have been being good to the boss, however have been helping a menace actor<\/p>\n<\/div>\n<div data-element-guid=\"4c9dc5d9-c886-4348-bf4a-01d0dc71377d\">\n<p><span class=\"tertiary color_mobile_tertiary\" data-lab-text_color=\"tertiary\">PWNED<\/span> Welcome as soon as once more to PWNED, the column the place we allow you to put together for safety success by learning others\u2019 embarrassing failures. In the present day\u2019s horrible story entails people making an attempt to do proper by an organization government by letting their guard down, by no means a wise transfer.\u00a0<\/p>\n<p class=\"align-left mobile_text_align_align-left primary color_mobile_primary\" data-lab-text_align=\"left\"><span class=\"tertiary color_mobile_tertiary\" data-lab-text_color=\"tertiary\">Have a narrative about somebody leaving a gaping gap of their community? Share it with us at\u00a0<a href=\"https:\/\/www.theregister.com\/a\/mailto:pwned@sitpub.com\">pwned@sitpub.com<\/a>. Anonymity is obtainable upon request.<\/span><\/p>\n<p>Our unhappy story comes from Brandon Dixon, who at the moment serves as CTO and co-founder of AI safety agency <a href=\"https:\/\/ent.ai\/\">Ent<\/a>. In a previous life, nevertheless, Dixon was a penetration tester for rent and he noticed some issues that made all my remaining hairs stand on finish simply listening to about them.<\/p>\n<p>Throughout one pentesting project, Dixon tried to learn how simple it might be to steal somebody\u2019s account utilizing social engineering. The reply: barely an inconvenience.\u00a0<\/p>\n<p>Dixon telephoned IT safety and pretended that he was the top of safety who had misplaced his password. Once they requested him problem questions, he mentioned he had forgotten the solutions to these additionally.\u00a0<\/p>\n<p>Then he gave them the password he wished to make use of over the cellphone they usually did a reset for him. After that, he was in a position to get into the community and do no matter he wished there.\u00a0<\/p>\n<p>There\u2019s a lot that\u2019s clearly incorrect right here that it\u2019s laborious to know the place to start with our lesson-taking. The IT help brokers shouldn&#8217;t have taken Dixon\u2019s phrase that he was the safety supervisor, particularly after he failed problem questions, and may have denied his request to reset the password. They have been in all probability considering \u201cthis man is an government and we don\u2019t need to piss him off\u201d moderately than \u201cwe now have procedures that everybody should comply with.\u201d<\/p>\n<p>The opposite downside right here is that the IT division entered Dixon\u2019s steered password for him over the cellphone. Initially, the IT division ought to have despatched a password reset to the true worker\u2019s e mail or cellphone quantity. Second of all, it\u2019s piss-poor safety for anybody to know a consumer\u2019s password apart from the consumer themselves. And I say this as somebody who used to work for a corporation the place, for those who had an issue, the IT help individuals would ask in your password through chat.\u00a0<\/p>\n<p>Dixon additionally shared one other story about social engineering from a time when he consulted for a pharmaceutical firm. Members of the competitors would name gross sales and advertising reps, fake they have been coworkers, after which extract details about upcoming medication. This is able to enable opponents to know what was coming and the way to reply to it.<\/p>\n<p>To assist remedy the issue, Dixon instituted a system the place actual staff needed to give a secret password initially of a dialog.\u00a0<\/p>\n<p>\u201cI constructed a system referred to as &#8216;Chal-Resp,&#8217; brief for &#8216;challenge-response,&#8217; that generated work pairings so a consumer may validate they have been talking with an precise worker,\u201d he informed <span data-lab-italic=\"italic\" class=\"italic m-italic\">The Register<\/span>. \u201cThe caller would wish to say the phrase and the end-user would wish to reply with the correct problem; solely staff had entry.\u201d<\/p>\n<p>What each of Dixon\u2019s tales have in frequent is the proof that people are desperate to please and be useful. However suspicion is the entire root of infosec, so it behooves us all to be rather less useful to strangers within the office.\u00a0\u00ae<\/p>\n<\/div>\n<iframe data-lazy=\"true\" data-src=\"https:\/\/www.fiverr.com\/gig_widgets?id=U2FsdGVkX18x7XQvttUTrv1oEqmGNGTgvvCUiUoJ\/AP4z\/UyMz8lXGOLpu15jIMxBbTR0gmD5uBoFvhC4KWeALQRp3h\/X\/AwcVD0K8Wj9H\/ZzYKzcCNHosB9oS4SCJJFWiN85P9ICAc4OgCoE\/wHKIY7CDkf2\/DQ1vqGvk4smVe5cRDEmrLPCWi4FC8p40VUhSmWQ5udCm0zoJtorgWv3vbDQw0kKYkwn39ozAnQXDe+YvWMxkLFWA+O3TFwkJvdkIK+\/AUSnRssPKt5WHY0FhNOxnSPcLslEL4G4\/RfP95ve99U+kRnDy3X+KtzdQLY+u935ghON\/o3UE4IMv9oN6JX9RnxzL\/LRcOgnHigxStSGPKsZYtnz8RWNVT\/rOLAibqiWJadC5MYHRbekF3eg6FOGrQGkXYbsn0+a5aovnlLCbLwIqY9fcS17UX8J235iQ6cdmHNbrPeS84CMm34RA==&affiliate_id=1052423&strip_google_tagmanager=true\" loading=\"lazy\" data-with-title=\"true\" class=\"fiverr_nga_frame\" frameborder=\"0\" height=\"350\" width=\"100%\" referrerpolicy=\"no-referrer-when-downgrade\" data-mode=\"random_gigs\" onload=\" var frame = this; var script = document.createElement('script'); script.addEventListener('load', function() { window.FW_SDK.register(frame); }); script.setAttribute('src', 'https:\/\/www.fiverr.com\/gig_widgets\/sdk'); document.body.appendChild(script); \" ><\/iframe>\n<br \/><a href=\"https:\/\/www.theregister.com\/a\/5239853\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Safety Human IT managers thought they have been being good to the boss, however have been helping a menace actor PWNED Welcome as soon as&#8230;<\/p>\n","protected":false},"author":1,"featured_media":126786,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-126785","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-universe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>To gain root access at this company, all an intruder had to do was ask nicely - mailinvest.blog<\/title>\n<meta name=\"description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"To gain root access at this company, all an intruder had to do was ask nicely - mailinvest.blog\" \/>\n<meta property=\"og:description\" content=\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/\" \/>\n<meta property=\"og:site_name\" content=\"mailinvest.blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/freelanceracademic\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-14T07:22:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-14T07:23:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/5239865.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin@mailinvest.blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin@mailinvest.blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/\"},\"author\":{\"name\":\"admin@mailinvest.blog\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\"},\"headline\":\"To gain root access at this company, all an intruder had to do was ask nicely\",\"datePublished\":\"2026-05-14T07:22:47+00:00\",\"dateModified\":\"2026-05-14T07:23:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/\"},\"wordCount\":638,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5239865.jpg\",\"articleSection\":[\"Tech Universe\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/\",\"name\":\"To gain root access at this company, all an intruder had to do was ask nicely - mailinvest.blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5239865.jpg\",\"datePublished\":\"2026-05-14T07:22:47+00:00\",\"dateModified\":\"2026-05-14T07:23:50+00:00\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#primaryimage\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5239865.jpg\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/5239865.jpg\",\"width\":1200,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/2026\\\/05\\\/14\\\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/mailinvest.blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"To gain root access at this company, all an intruder had to do was ask nicely\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#website\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"name\":\"mailinvest.blog\",\"description\":\"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/mailinvest.blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#organization\",\"name\":\"mailinvest\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"contentUrl\":\"https:\\\/\\\/mailinvest.blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/default.png\",\"width\":1000,\"height\":1000,\"caption\":\"mailinvest\"},\"image\":{\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/freelanceracademic\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/mailinvest.blog\\\/#\\\/schema\\\/person\\\/012701c4c204d4e4ebd34f926cfd31a4\",\"name\":\"admin@mailinvest.blog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g\",\"caption\":\"admin@mailinvest.blog\"},\"sameAs\":[\"https:\\\/\\\/mailinvest.blog\",\"admin@mailinvest.blog\"],\"url\":\"https:\\\/\\\/mailinvest.blog\\\/index.php\\\/author\\\/adminmailinvest-blog\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"To gain root access at this company, all an intruder had to do was ask nicely - mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/","og_locale":"en_US","og_type":"article","og_title":"To gain root access at this company, all an intruder had to do was ask nicely - mailinvest.blog","og_description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","og_url":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/","og_site_name":"mailinvest.blog","article_publisher":"https:\/\/www.facebook.com\/freelanceracademic\/","article_published_time":"2026-05-14T07:22:47+00:00","article_modified_time":"2026-05-14T07:23:50+00:00","og_image":[{"width":1200,"height":683,"url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/5239865.jpg","type":"image\/jpeg"}],"author":"admin@mailinvest.blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin@mailinvest.blog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#article","isPartOf":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/"},"author":{"name":"admin@mailinvest.blog","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4"},"headline":"To gain root access at this company, all an intruder had to do was ask nicely","datePublished":"2026-05-14T07:22:47+00:00","dateModified":"2026-05-14T07:23:50+00:00","mainEntityOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/"},"wordCount":638,"commentCount":0,"publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/5239865.jpg","articleSection":["Tech Universe"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/","url":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/","name":"To gain root access at this company, all an intruder had to do was ask nicely - mailinvest.blog","isPartOf":{"@id":"https:\/\/mailinvest.blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#primaryimage"},"image":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#primaryimage"},"thumbnailUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/5239865.jpg","datePublished":"2026-05-14T07:22:47+00:00","dateModified":"2026-05-14T07:23:50+00:00","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis.mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what's new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","breadcrumb":{"@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#primaryimage","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/5239865.jpg","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2026\/05\/5239865.jpg","width":1200,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/mailinvest.blog\/index.php\/2026\/05\/14\/to-gain-root-access-at-this-company-all-an-intruder-had-to-do-was-ask-nicely\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/mailinvest.blog\/"},{"@type":"ListItem","position":2,"name":"To gain root access at this company, all an intruder had to do was ask nicely"}]},{"@type":"WebSite","@id":"https:\/\/mailinvest.blog\/#website","url":"https:\/\/mailinvest.blog\/","name":"mailinvest.blog","description":"Technology is forever changing, and there are always new pieces of technology to replace obsolete ones. Tons of people enjoy reading tech blogs on a daily basis. mailinvest.blog tracks all the latest consumer technology breakthroughs and shows you what&#039;s new, what matters and how technology can enrich your life. mailinvest.blog also provides the information, tools, and advice that helps when deciding what to buy.","publisher":{"@id":"https:\/\/mailinvest.blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/mailinvest.blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/mailinvest.blog\/#organization","name":"mailinvest","url":"https:\/\/mailinvest.blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/","url":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","contentUrl":"https:\/\/mailinvest.blog\/wp-content\/uploads\/2022\/01\/default.png","width":1000,"height":1000,"caption":"mailinvest"},"image":{"@id":"https:\/\/mailinvest.blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/freelanceracademic\/"]},{"@type":"Person","@id":"https:\/\/mailinvest.blog\/#\/schema\/person\/012701c4c204d4e4ebd34f926cfd31a4","name":"admin@mailinvest.blog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/98ed217bd0f3d6a6dcae2d9b0c76e305b049a07275e315e1407e19ec8b08e139?s=96&d=mm&r=g","caption":"admin@mailinvest.blog"},"sameAs":["https:\/\/mailinvest.blog","admin@mailinvest.blog"],"url":"https:\/\/mailinvest.blog\/index.php\/author\/adminmailinvest-blog\/"}]}},"_links":{"self":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/126785","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/comments?post=126785"}],"version-history":[{"count":1,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/126785\/revisions"}],"predecessor-version":[{"id":126787,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/posts\/126785\/revisions\/126787"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media\/126786"}],"wp:attachment":[{"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/media?parent=126785"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/categories?post=126785"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mailinvest.blog\/index.php\/wp-json\/wp\/v2\/tags?post=126785"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}