London has the same problem... Old infrastructure, nowhere to locate street cabinets and very difficult to get permission to do any work in the street coupled with relatively few residential customers. Central London is mostly business users, and given the rates these businesses pay for their offices they can afford to have dedicated fibre lines installed.
I just checked, it's a dependency for ubuntu-minimal.
So it's installed on every Ubuntu/Mint/....
Two factor authentication only provides any level of protection against a specific type of attack (ie guessed/harvested user accounts), and even then is often not infallible.
In a typical organisation the normal user facing clients (eg desktop machines) may require two factor, but the underlying network protocols are still using the same authentication they always have, so while you can't go in the front door through a local workstation login you can attack other devices at the network level. People frequently consider the fact that there are usually several ways to access the same data.
Exploitation of a security vulnerability also frequently bypasses the authentication system entirely (eg arbitrary code execution via a buffer overflow).
Many two factor systems rely on a third party (eg rsa), so if that party is compromised then you are effectively back to single factor...
Here's a command you can use to get all those commands :
bash -c "compgen -c | grep ^[A-Z] | sort"
On my system, I get :
ControlPanel, GET, GMT, HEAD, Mail, MAKEDEV, ModemManager, NetworkManager, POST, R, Rscript, VBoxBalloonCtrl, VBoxClient, VBoxControl, VBoxHeadless, VBoxManage, VBoxSDL, VBoxService, VirtualBox, X, Xephyr, Xorg
The users can flag ads as intrusive...
The hashes you get from LLMNR/NB spoofing are slightly different and need to be hashed, you cant pass them directly although if smb signing is turned off you can mitm the connection...
But yeah, sitting and connection hashes in this way is almost always effective too.
I'd never actually been taught trig, and was trying to learn it independently for both Statics and Calc II.
I tried to learn trigonometry by heart for a long time, and it never worked.
I would try to learn this : http://tutorial.math.lamar.edu... and could not remember anything with 100% certainty.
Is it cos(a)cos(b)-sin(a)sin(b) or cos(a)cos(b)+sin(a)sin(b), or maybe cos(a)sin(b)+sin(a)cos(b)?
Anyway, the best way for me was to remember the one formula to rule them all (Euler's):
e**ix = cos(x)+i*sin(x)
Using complex addition, multiplication and e**(i*n*x)=(e**(i*x))**n, I can find all the formulas from the cheat sheet easily.
It's less error-prone than learning by heart, and it's much more fun because I understand it and can check it with simple geometry.
SMB is indeed commonly used outside of broadcast domains, hosts can find each other through dns (or wins etc), and happily communicate across ethernet segments. In many cases most of the servers will be in a different ethernet segment to the workstations etc.
SMB will almost never be filtered internally because it's used for domain logons and file sharing, and users will have a need to access files stored on servers in other parts of the company.
On the other hand, SMB is a terrible protocol... Not only does it allow file sharing, but it can be used for all manner of other things too, so by permitting it for something you need (file sharing) you are opening yourself to all manner of other things you don't need or want.
Doing what you describe is simply not practical for a windows based environment. Sure ideally SMB would be blocked, and a dedicated "file sharing only" protocol would be used, but windows only supports SMB by default.
You're assuming that it spread by trying to guess usernames and passwords, which is highly unlikely.
Chances are it spreads using usernames and password hashes that it already knows. If you compromise a single windows host you can extract the local admin hashes (which are often the same across many hosts because they were all built from a stock image), you can also extract the hashes as well as the plain text password of any currently logged in account including domain accounts, and any account which is saved in the registry for use to start services (i've seen networks where the antivirus is running as a domain admin on every host - ensuring that an admin password is extractable from every single host).
Using this hash passing approach you can almost always spread throughout a network.
As for logging...
Your IPS will probably ignore SMB traffic, because it's extremely common and expected.
The hacker will target the workstations first, they are probably not configured to send their logs back somewhere centrally... Chances are at least one workstation will have a valid domain admin hash available on it at some point. You only start hitting the servers once you have confirmed valid logins, valid SMB logins from internal workstations won't trigger any IPS because they are expected.
Windows logging especially is usually quite shit, it's either far too verbose (the attack gets lost in the noise), or utterly useless... You might be able to detect a flood of invalid login attempts against the domain or directly against core servers, but a competent hacker is highly unlikely to try that.
Otherwise your logs are only really useful "after the fact" to try and determine what went wrong, because by that point you now have time and budget to sit and comb through them. Ofcourse this also only works if your logs are sufficiently detailed, and are still intact. If the system hosting your logs was on the domain, or accessed from workstations which are part of the domain then your logs are effectively worthless, a competent hacker would have deleted or modified them to cover their own actions.
So they're stuck with poorly designed tools (ie windows), that have gaping design flaws that make such attacks easy to perform and hard to detect or stop. You could go to significant effort and expense to make such attacks more difficult, but many companies just won't have the budget for that in terms of the number and quality of staff (competent people are expensive), all the various expensive third party software and all the extra time (or extra staff) required to do things in a more secure but far more time consuming way.
In reality, people cut corners. Even those who should know better, want to save themselves time or have to save themselves time because the company hasn't hired enough people for what they need.
Yes, yes they are...
Most companies have a horrendously insecure internal network, with virtually everything tied to an active directory domain which is laughably easy to compromise. They follow what they believe are best practices by installing patches every month, using strong passwords, setting account lockouts etc, but because of how the system is designed it only takes one weakness to make everything fall down. And then they will probably spend a lot of money buying "security software" that just makes the systems run far slower, while not fixing any of the underlying weaknesses.
Most company networks are like a tardis, they use a network firewall to ensure that only a tiny fraction is visible from the outside, but once you get inside it's much bigger. All it takes is for one minor breach in the firewall by someone semi competent and 99% of companies would be looking at a catastrophic breach. If it hasn't happened to your company yet then it's either a) luck, or b) it has happened but the perpetrators have other motives than publicity
It's common practice to put all of your servers and workstations in an active directory domain, and once you have a tiny foothold on an active directory domain it is almost always trivially easy to get administrative privileges over the whole domain (have been working as a pentester for 10+ years and never failed to get domain admin when the job scope allowed it)...
Once you have domain admin, you typically have access to pretty much everything. Even if the organisation has devices which aren't linked to active directory (typically unix boxes, routers, switches etc), you will probably find that the guys responsible for managing these devices do so from a windows workstation which is part of the domain, so you just find their workstation and start keylogging (or in many cases just find the textfile full of passwords).
Also in my experience, very few companies notice once you take control of their domain, and as a legitimate pentester i'm not trying to cover my tracks. The chances of most organisations noticing someone who is being careful is virtually 0.
Guess who owns the endpoints on the fiber?
Noone ever picked FAT, it's a very poor filesystem and the only reason it ever gets used for anything is because MS won't support anything else unless it's even more proprietary.
It's very impressive.
The Godot website reaches 0.01fps right now.
If you have an array of (t,x,y,z) points, it shouldn't be hard to do.
It sounds like you clearly know what you want, so you could either code it or make someone code it for you.
Python+maplotlib or Sketchup+Ruby would do just fine.