《An Exploration of Vulnerabilities》All your bases are belong to us

Advertisement

All your bases are belong to us

Early in the morning, cars were seen driven through the busy street, some plunged in small puddles, splashing rainwater against near passerby. These people in the sidewalk who were affected, cursed and complained at the drivers. In front of a red traffic light, raindrops beat against the red paint of the car, flowing quickly down the windows.

“Someone did apparently a rain dance.” The man in the other seat received an unimpressed glare from the woman on the driver seat, nevertheless, he continued as if he wasn’t affected by her uncomfortable glare, “Today, it’s a good day.” His driver just sighed at his antics.

“In any case better than yesterday.” He ignored her sigh, while he took a chewing gum out of his pocket and offered, “Do you want some?” Yeah, totally ignore my offer… This woman should relax more.

She reminded him whilst she concentrated on driving, “Just be silent, really. Yesterday was a massive clusterfuck, Mark.” He took a short glance at her and saw how tired she really was. He couldn’t bear the silence, so he wanted to know, “So did the suspects talked?”

“Yes, a little application of good old bad cop did the trick for him. He told us everything.” Mark couldn’t bite back his chuckle.

“What? Threaten him with the soap?” There she smiles.

“Hey, I just told him what everyone will tell you about jail time.” She tried to defend herself yet without much success if the look she received from him was an indication, so she just coughed and continued, “The RAT he used on a girl and someone else, was a backdoor. We’re investigating it at the moment. Fortunately, we could secure his computer.”

“He didn’t even have encryption on.” She muttered disappointedly as she took a right turn.

Advertisement

“What’s with the other suspect?” He instead asked her the question which plagued his mind the other day before.

“Well, he is a graduate student with a master degree in Computer Science. He went to the police station and showed us his analysis of the Trojan, he ‘luckily’ got. It’s suspicious for me.” She furrowed her brows as she said her piece.

“How interesting… Did he tell you how he got it?” Asking this he used his right hand to prop his chin up as he considered the information. So we have some Script Kiddy and a guy who knows his shit. What do they call it again? Ah, a white hat. How amusingly.

“Well, yes, he talked about how a friend of his got a nude picture of the girl, the girl whom we knew already that her computer was infected. What’s with these coincidences!” She complained to herself, then gave some other car the stink eye, because he cut her off.

“Keep calm, let our white hats work. They will conclude if he lied or not. Just relax.” He couldn’t help himself but injected a little sarcasm at the mention of white hats. Hey, the title is really hilarious. They should wear some green hats. Haha. Wait, some of them didn’t even have a girlfriend or a wife. Now I’m feeling guilty.

“CALM?! The politicians are breathing down our necks! They want the case investigated with every resource the country have. They want the culprits behind the bars.“ You know, politicians have the fear that their reputations will plummet for the next elections.

“Mark, I know that look. They are not the only ones who are fearing for their positions at the moment. You and I, if we don’t get the culprits. They will get our heads instead! -” Before she could continue to rant, she was cut off by an incoming call from her phone. She took a look at the display, accepted the call immediately.

Advertisement

“A message? What do they want?” She asked while she concentrated on driving to a place to park her car.

“’All your bases are belong to us’? Is it a quote? So and the bitcoin address?” Stopping the car at a place, she secured it. After some more time, she finally finished the call.

“We have a problem. We’ve got no more than 24 hours to find them.”

“That is the biggest embarrassment our company faced in the years!” The CEO shouted agitated in the room.

“Don’t worry about it much. You should think how to pay me the political capital I used on the case back.” The other voice answered as easily as calm as he could.

“Don’t kid me! You know what will happen if I’m going down? I’m doing you a favor! I used my connections to get international agencies to work on the case. You should thank me, after all, I heard that there will be elections in the months.”

“Wait. Let me answer the call first. I think they got some developments.”

These voices were heard outside the closed door by a middle age woman working on the computer. My workload increased again! Sorry baby, it seems that I won’t come home today.

After typing something on the keyboard the person leaned back on his comfortable chair and grabbed the remote, button pressed, turned the TV in the room on.

“- the CEO promised after the devastated Hacker attack that it won’t happen again. -”

“- police and the BKA cyberdefense division are investigating -”

“The cause of the sophisticated attack on Telekom was -”

“The method of the DDoS was Slowloris a -” With a press on the button he turned it off. Silence greeted him.

After a while, he touched the monitor, started the Firefox browser and entered a particular URL. The browser finished loading the page fast enough that he drunk from a glass, while he typed with his right fingers on the keyboard. Vodka. Password: CykaBlyat69

What greeted him was a list of connected devices with their respective IP and country location. Hmm… The pussy skid gifted me a new toy to play with hehe. Let’s decide if it is a worthy gift, if not, well then I just will torment him a little bit.

Smirking at the thought, he clicked on the victim with the title ‘ShySlut’ SS. Ha! Who says I can’t name my victims. He took a look at her computer information and saw that it was a laptop. Let’s activate her webcam.

And what he saw brought a wide grin from him, after all, who wouldn’t be happy to see a girl dressing in her underwear.

He took his pants off at the show.

    people are reading<An Exploration of Vulnerabilities>
      Close message
      Advertisement
      You may like
      You can access <East Tale> through any of the following apps you have installed
      5800Coins for Signup,580 Coins daily.
      Update the hottest novels in time! Subscribe to push to read! Accurate recommendation from massive library!
      2 Then Click【Add To Home Screen】
      1Click