Trap the Hacker

2 60
Avatar for MicroReylatos
1 year ago
photo.jpg

This was just another day more ordinary like the rest of all the days he had lived. She had to go back to her usual daily work. The routine was something that was an obligation. He felt pressured by having to do the same thing every day. Despite the fact that he liked the job, he immediately set out to check on the to-do list everything he had to do today. He clicked and saw that the first item on his list was to answer the emails of Mr. Peterson, who had been asking him to meet the requirements for about three months. So, he also searched his files for all of Mr. Peterson's emails. He made a list with all the pending tasks and saw that among the most outstanding were to recover the information that had been accidentally deleted from his servers.

So he immediately entered the address of Peterson's servers into his computer. Upon doing so, he immediately bypassed the PROM with the password, asking her to enter the corresponding word to give him access. He tried once and the system immediately threw the word at him, he needs a longer sentence. He actually checked his database to see if it matched what he was writing and was correct. There was some error in the system or the password had been changed at this time. It was not possible for him to ask her for a longer sentence, since everything was correct. So he started doing a port scan in an alternate window of his terminal.

This scan lasted approximately 20 minutes and he was able to realize that his computer was being monitored from another place unknown to him. He was probably being watched by one of the competing hackers, who had somehow, through his oversight, managed to leak some spyware that was responsible for putting your computer in a zombie state and absorbing all the information it had. .

He had to remove this zombie program as soon as possible and detect it so it wouldn't keep stealing his data. So he knew that the usual procedure was to disconnect any network connection, but if he did, he couldn't figure out where the communication was coming from. So what he did next was to generate a new list of keys in a file that was going to be the bait, so that in this way his idea was that this automated zombie would detect the new file with keys and send it. In this way, he was going to be able to find or monitor where this information was going.

Said and done, like this, creating the file with 3GB of new keys from fictitious clients, he was immediately able to trace where the information was going. Once the information was traced, he managed to find the IP address of the person who was stealing his data, or at least he already had the IP address, so he could continue the rest of the investigations.

The process did not take him more than a couple of days to realize that his competition, Jaime Piedradura, was the one who was trying to put him out of business, which was quite useless, because after realizing and putting all the systems in tune, The first thing he did was create a fake server, a honeypot to confuse all future attackers from Piedradura or whoever they were, believing that they were violating or stealing information that was really false information and dedicated solely to deceiving these malicious pirates who wanted to steal all your data.

And so he managed to free up one more day of work and one more day of information, realizing the importance of when something asks you for a long sentence or they ask you for something that you weren't usually used to, this is an alert signal for anything in life.

And this has been my 5-minute writing for today.

Thanks for participating and reading.

4
$ 0.84
$ 0.52 from @TheRandomRewarder
$ 0.27 from @Telesfor
$ 0.05 from @Pantera
Sponsors of MicroReylatos
empty
empty
empty
Avatar for MicroReylatos
1 year ago

Comments

What a smart way to win. Fellows thinking smart but no way near a perfect smartness. Lesson: don't let them know your moves.

$ 0.00
1 year ago

It is a common practice in the world of cybersecurity, known as honey pots. This is how you get information =)

$ 0.00
1 year ago