Posts by Gerald Stevenson
-
There's a lot of useful files there, especially the virtual machine & firewall rules. Could come in handy for later compromises. This is a classic example of security through obscurity. Experience tells me though that instead of doing an audit on the overall security of their information systems and taking further responsibility, they will just sort out the kiosk computers and do some PR about how naughty it was of you to access this information. Could have been worse if someone malicious was to get in there...