a series of fictional short stories about hacking, drama, and talking with your friends
Don't wanna be here? Send us removal request.
Text
hf archives: Cybersecurity 101
"Welcome to day 1 of the worst course of your life, so far. You are here because you are looking to become a sysadmin of some big shot corp, or perhaps because you hate yourself. You probably think you are good at coding, that you know your way around a computer.
You are not, and you do not.
Since the advent of widespread quantum computing in 2053, most processes performed on a computer are entirely human incomprehensible. While plenty of simpler, surface level of code remains, typically for consumer applications, low-level operations require tools to use your tools. From a cybersecurity standpoint, this is fantastic. From a you standpoint, this is the worst.
As a result, most advanced computer work requires a user to be connected to a seamless neural mesh - in layman's terms, "jacked in." With specialized hardware, much of the needed information is processed and reprocessed several times and wired directly to your brain, far more efficiently than you could hope to get off of reading a screen. I will not lie to you, because you must understand the exact importance of your work and its true nature - this is unbelievably dangerous. You should really only be doing this when you're certain your network is secure, and you're not dealing with any dangerous code. To be absolutely clear: if you fuck up, or worse, the unthinkable happens and you get attacked: this can KILL you. I say this not to dissuade you; after all, practically any job has the potential - did you know ride service drivers are one of the highest mortality jobs? - but so you do not take this lightly.
Page 102, everyone.
Standard systems, nowadays, are multi layered. Some people are baffled by this; after all, isn't the first layer enough?
No.
In an age where anything and everything is stored online, failure is not an option. You cannot be lazy. You cannot loosen your grip.
That brings me, of course, to the first layer: RBS-08, AKA "The Wall."
Practically standard issue and yet nigh impenetrable, this is your first line of defense, and against a standard attack, is completely unbeatable. The creation of the Realtime Bounceback System didn't just revolutionize cybersecurity, it defined it. An ever shifting layer of hopelessly complex, self-modifying encryption, that nevertheless is weak to the oldest security flaw known to man: human error. While a wall completely and utterly defends against unauthorized external attacks, it by nature cannot defend from the inside, and it really only takes one employee to be a tad gullible (or worse, just poor in his password choice) to render your magic wonder-wall about as secure as a wet tissue.
This leaves us to the other layers. I tackle them at the same time, because they are fundamentally reached at the same time. Once past the wall, an attacker is already inside your system. In the old days, this is usually where we'd shrug and say oh well. We can't afford that. Computers run every part of our lives; and failure means so, so much more.
This isn't a game, or a skirmish. This is war. Make them pay for every step they take.
File storage and sorting has gotten quite complex. Use this to your advantage. Your next layer is the labyrinth. While on consumer grade machines, this is practically nonexistent as a form of defense, most of you will not be working on consumer grade machines, but machines few should have access to. Turn this into an advantage. An average corporate hub server at this point is littered with traps and shifting passageways, threatening to boot-or worse-anyone who doesn't know their way around. This, ultimately, is passive defense, and one not deterred by the wall is unlikely to be deterred here.
Which brings us, of course, to active defense. A watchful eye can personally deal with intruders as they come, but there are two issues with this. One, of course, is that it is dangerous, as I said earlier. The other is that you cannot personally watch a system 24/7. A defense is only so good as its weakest point.
This, of course, is why specially trained neural networks have become mainstream in the standard suite of cybersecurity. Most networks tend to have a watcher - yes?
Great question. It actually is possible to have multiple watchers, but given their volatile nature, this takes a lot of work to make sure they won't end up recognizing the other as a threat. Watchers have to be trained to match their network - their "labyrinth" - which is why most are unique, and why they cannot be practically transferred between networks or cloned. You can make a backup of one, of course, but they won't really function elsewhere.
Those, of course, consist of the standard set of layers, but by no means are they the only possible ones. Throughout my course I will teach you every damn trick in the book, and then some. You will learn to train a watcher, you will learn to attack and defend a system, you will learn to tango with the best of them. You will learn exactly how goddamn important your job is, and take it in stride.
Any questions?"
0 notes
Text
hf short: like phish in a barrel
Subject: Mandatory Password Reset
From: [email protected]
Dear Loyal Employee,
In keeping with company security policy, all personnel are required to reset their passwords every six months. Failure to comply within 3 days will resort in you being locked out of your account.
To reset your password, please click this link and insert your current username and password, as well as the new one.
Thank you,
Johnathan Floyd Banks, Human Resources
0 notes
Text
hf: public static void main
establishing connection
attempt 1
waiting.
waiting..
waiting...
tunnel complete.
Connected Users:
.ac1d, .jj084, .raya, .vecna
Connected Admins:
.raya
SERVER: .jj084 has established connection.
.vecna: about time
.ac1d: ddid u forgt how to doubl click
.vecna: probably just had things to do
.raya: jj! hey!
.raya: @.jj084
.ac1d: give hm a sec he needs t find th chat option
.jj084: test
.vecna: didnt work
.ac1d: test failed
.raya: this is so sad
.jj084: sorry i was helping my mom with something
.jj084: why arent we using like
.jj084: IRC
.ac1d: or discord like a normal person
.raya: its more secure this way
.vecna: is it
.jj084: is it
.ac1d: isit
.ac1d: shit typo
.raya: shut up
.raya: also because its COOLER because i MADE IT MYSEF
.jj084: that is kinda cool tbh
.vecna: ^
.ac1d: ye
.raya: wait no my weakness
.vecna: anyways
.jj084: anyways?
SERVER: .vecna has disconnected.
.ac1d: oop
.raya: her wifi is like that
.ac1d: wait vec is a she
.jj084: yes dumbass
.raya: did you really not know
.ac1d: I DONT PAY ATTENTN TO THS KIND OF THING
SERVER: .vecna has established connection.
.raya: goofball
.vecna: sry dced
.vecna: ?
.raya: not u
.vecna: a
.vecna: LIKE i was saying
.vecna: we have SERIOUS BUSINESS to talk about
.jj084: oh creekside
.ac1d: frankly i dnt thnk a computr should go in water
.vecna: as you all know
.vecna: my compatriots
.vecna: my loyal minions
.jj084: your lovers
.vecna: uwu
.jj084: was NOT expecting that one
.raya: PFFFT
.vecna: we're gearing up for ONE LAST HEIST this sunday
.vecna: JUST WHEN I THOUGHT I WAS OUT
.raya: we are definitely doing more
.vecna: youre ruining my flair
.ac1d: yeah raya
.jj084: smh
.raya: WOW
.vecna: the target is a bunch of SHITTY ROTTEN ADULTS who work at creekside, a new startup investment company
.raya: @.jj084 why did you show her persona
.jj084: ITS FUN
.ac1d: nver played
.raya: @.ac1d you havent played like anything
.ac1d: not true
.vecna: creekside's mostly gotten their wealth from pump-and-dumps and flipping local businesses at their expense
.jj084: tbh i was sold as soon as you said company
.raya: name one game youve played
.ac1d: minesweeper
.raya: that doesnt count!
.vecna: their sec should mostly be nothing we havent seen before, though they have recently hired consultants from keltech
.ac1d: keltech cnt secure shit
.jj084: seen their stuff before?
.ac1d: ye its kiddie stuff
.vecna: to reiterate everyones roles
.vecna: @.jj084, you're going fishing
.jj084: creek fishing my favorite
.ac1d: booooooo
.vecna: @.ac1d, you're responsible for their watcher
.ac1d: :D
.vecna: @.raya and i are in charge of grunt work
.raya: dont say it like THAT
.ac1d: goon wrk
.vecna: minion work
.jj084: goblin work
.raya: NOOOOOOOO IM JUST A LIL GOBLIN
.vecna: once we got the account numbers, we cover our tracks and bail
.jj084: the encryption on the numbers?
.vecna: raya's tool should handle it
.raya: assuming theyre smart enough to bother lmao
.jj084: right well
.jj084: sounds like a plan
.ac1d: i like the plan
.vecna: we know you do
.raya: ^
#hackerfiction#hfmain#fiction#my writing#writers#writers on tumblr#series#oc fiction#hacking#jj084#vecna#raya#ac1d
1 note
·
View note