Default Username Usage - Use Case 1
- Pavan Raja

- Apr 8, 2025
- 2 min read
Summary:
The document discusses the issue of default usernames used in various systems, which were previously included in a lost insider threat management package. Brian Chong, who claims to have such a list for different products, has shared this information with the author via email. He provided a CSV file that can be imported into Active List and attached "Default Password List.xlsx" (220.8 KB). Additionally, he mentioned a link to the Phenoelit-us website (http://www.phenoelit-us.org/dpl/dpl.html). The main focus of the email is using wildcards in report parameter lists. Other topics briefly touched upon include: an Insider Threat package, Breaches - stats on time-to-discovery, E7200 Appliance upgrade, Software Logger, and virtualisation impacts of unusual requirements.
Details:
The text discusses the topic of default usernames and their usage in various systems. Specifically, it mentions that there was once a package related to insider threat management that included a list of common default usernames, such as "root," "admin," "administrator," etc., along with rules for monitoring against these usernames. However, the author lost this package and has been unable to recreate it since then. The post seeks assistance from other users who might have similar older packages or resources that could help in addressing this issue.
You've received an email from Brian Chong with a default username list for various products, along with a CSV file that you can import into Active List. Additionally, he provided a link to the Phenoelit-us website and attached a document titled "Default Password List.xlsx" (220.8 KB). The subject of the email is related to using wildcards in report parameter lists.
Here's a summary:
1. Brian Chong has shared a list of default usernames for different products.
2. He attached a CSV file that can be imported into Active List.
3. He provided a link to the Phenoelit-us website (http://www.phenoelit-us.org/dpl/dpl.html).
4. The main focus of the email is related to using wildcards in report parameter lists.
5. There are several other topics mentioned briefly, such as an Insider Threat package, Breaches - stats on time-to-discovery, E7200 Appliance upgrade, and Software Logger, virtualisation impacts of unusual requirements.

Comments