this post was submitted on 20 Dec 2024
6 points (87.5% liked)

Hacker News

309 readers
496 users here now

RSS Feed of HackerNews

founded 3 months ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 1 points 2 days ago (4 children)

Notice a few red flags. 1) they were contacted before the system was rolled out. Before anyone else could look for bugs 2) it is reported by techcrunch and is trending tech news 3) the exploits are rudimentary 90s era mistakes that even LLMs don't make these days

So it's likely that they paid McDonald's India to pretend to have horrible practices. $240 is another tactic to appear good and trustworthy. That brings traffic to their blue team company site, effective advertising. Standard fakery that security removeds utilize to spread the FUD to create demand for their services.

[–] Manifish_Destiny 3 points 2 days ago (3 children)

As a response to 3, I'm a professional pentester. I see several of the mistakes mentioned more than I'd like. Stuff like that still happens on the regular.

I typically get higher profile brands similar to McDonald's as well.

[–] [email protected] 2 points 2 days ago (2 children)

Let me guess, you signed an NDA, and won't tell anyone which brands had badly configured access control in their web apps?

Each red flag is okay, but all together is rather strange. It's kinda classic to say that pajeets write shitty code.

[–] Manifish_Destiny 1 points 5 hours ago (1 children)

Of course I'm not telling you my fucking clients. My career path requires a modicum of professionalism

[–] [email protected] 1 points 1 hour ago

Good, because it's not of interest.

Even better for your career is being an actual researcher with a good grasp on heap grooming, MAC circumvention instead of spreading FUD over something that can easily be detected with burp.