create account

Foiling Cyber Attacks by manclar

View this thread on: hive.blogpeakd.comecency.com
· @manclar ·
$2.10
Foiling Cyber Attacks
<center>

![Hacked](https://cdn.leonardo.ai/users/d8012f03-30a7-4812-9c33-bb6b50e56f47/generations/d1cf8f0c-8401-43ff-93f2-9eb3a6f45210/DreamShaper_32_Imagine_sitting_at_your_desk_staring_at_your_co_3.jpg)


<center>
<a href="https://leonardo.ai">Sitting at your desk, staring at your computer screen as the lines of code and data scroll by in an endless strea (AI Art)</a>
</center>


<div class="text-justify">

#

<center><img src="https://images.hive.blog/0x0/https://files.peakd.com/file/peakd-hive/manclar/23tm7V6A8vX2HuSGjpHt7QNiqsSf6g8MaH1Q6Kxyf22njxs4svBBUeASAPDFJBEHJ3oPW.png"></center>

This was just another day more ordinary like the rest of all the days he had lived. She had to go back to her usual daily work. The routine was something that was an obligation. He felt pressured by having to do the same thing every day. Despite the fact that he liked the job, he immediately set out to check on the to-do list everything he had to do today. He clicked and saw that the first item on his list was to answer the emails of Mr. Peterson, who had been asking him to meet the requirements for about three months. So, he also searched his files for all of Mr. Peterson's emails. He made a list with all the pending tasks and saw that among the most outstanding were to recover the information that had been accidentally deleted from his servers.

So he immediately entered the address of Peterson's servers into his computer. Upon doing so, he immediately bypassed the PROM with the password, asking her to enter the corresponding word to give him access. He tried once and the system immediately threw the word at him, he needs a longer sentence. He actually checked his database to see if it matched what he was writing and was correct. There was some error in the system or the password had been changed at this time. It was not possible for him to ask her for a longer sentence, since everything was correct. So he started doing a port scan in an alternate window of his terminal.

This scan lasted approximately 20 minutes and he was able to realize that his computer was being monitored from another place unknown to him. He was probably being watched by one of the competing hackers, who had somehow, through his oversight, managed to leak some spyware that was responsible for putting your computer in a zombie state and absorbing all the information it had. .

He had to remove this zombie program as soon as possible and detect it so it wouldn't keep stealing his data. So he knew that the usual procedure was to disconnect any network connection, but if he did, he couldn't figure out where the communication was coming from. So what he did next was to generate a new list of keys in a file that was going to be the bait, so that in this way his idea was that this automated zombie would detect the new file with keys and send it. In this way, he was going to be able to find or monitor where this information was going.

Said and done, like this, creating the file with 3GB of new keys from fictitious clients, he was immediately able to trace where the information was going. Once the information was traced, he managed to find the IP address of the person who was stealing his data, or at least he already had the IP address, so he could continue the rest of the investigations.

The process did not take him more than a couple of days to realize that his competition, Jaime Piedradura, was the one who was trying to put him out of business, which was quite useless, because after realizing and putting all the systems in tune, The first thing he did was create a fake server, a honeypot to confuse all future attackers from Piedradura or whoever they were, believing that they were violating or stealing information that was really false information and dedicated solely to deceiving these malicious pirates who wanted to steal all your data.

And so he managed to free up one more day of work and one more day of information, realizing the importance of when something asks you for a long sentence or they ask you for something that you weren't usually used to, this is an alert signal for anything in life. . And this has been my 5-minute writing for today. Thanks for participating and reading.

This is my entry in @mariannewest's daily freewriting challenge. Today's prompt is **long sentence**.

<hr>
<center>Spanish</center>

<p>

Este era solo otro día más común como el resto de todos los días que había vivido. Tenía que nuevamente dedicarse al habitual trabajo de todos los días. La rutina era algo que era una obligación. Se sentía presionado por tener que hacer todos los días lo mismo. A pesar de que le gustaba el trabajo, inmediatamente se dispuso a revisar en la lista de pendientes todo lo que tenía para realizar el día de hoy. Se hizo clic y vio que el primer ítem en su lista era el responder los correos del señor Peterson, que le había estado solicitando atender los requerimientos desde hace unos tres meses. Así que, él también buscó en sus archivos todos los correos del señor Peterson. Hizo una lista con todas las tareas pendientes y vio que entre las más resaltantes estaban recuperar la información que había sido borrada accidentalmente de sus servidores.

Entonces, de inmediato ingresó la dirección de los servidores de Peterson en su computadora. Al hacerlo, de inmediato le brincó el PROM con la contraseña, solicitándole que ingresara la palabra correspondiente para darle acceso. Probó en una ocasión y el sistema inmediatamente le arrojó la palabra, necesita una frase más larga. Realmente revisó en subase de datos para ver si coincidía con lo que él estaba escribiendo y estaba correcto. Había algún error en el sistema o la contraseña había sido cambiada en este momento. No era posible que le solicitara una frase más larga, pues todo estaba de manera correcta. Así que empezó a realizar un escaneo de puertos en una ventana alternativa de su terminal.

Este escaneo duró aproximadamente 20 minutos y pudo darse cuenta de que su computadora estaba siendo monitoreada desde otro lugar que desconocía. Probablemente estaba siendo observado por alguno de los piratas informáticos de la competencia, que habían logrado de alguna manera, por un descuido de él, seguramente filtrar algún programa espía que se encargaba de poner su computadora en un estado zombie y absorber toda la información que tenía.

Él tenía que, lo antes posible, eliminar este programa zombie y detectarlo para que no siguiera robándole datos. Así que él sabía que el procedimiento habitual era desconectar cualquier conexión de red, pero si lo hacía, no podía lograr enterarse de dónde venía la comunicación. Así que paso seguido lo que hizo fue generar un listado nuevo de claves en un archivo que iba a ser el cebo, para que de esta forma su idea era que este zombie automatizado detectarael nuevo archivo con claves y lo enviara. De esta forma, él iba a poder encontrar o monitorear hacia dónde iba esta información.

Dicho y hecho, así de esta manera, creando el archivo con 3GB de claves nuevas de clientes ficticios, inmediatamente pudo realizar un trazado de hacia dónde iba la información. Una vez hecha el trazado de la información, logró dar con la dirección IP de la persona que estaba robándole los datos, o al menos tenía ya la dirección IP, de esta manera podía continuar el resto de las investigaciones.

El proceso no le llevó más que un par de días para lograr darse cuenta de que su competencia, Jaime Piedradura, era quien estaba intentando sacarlo del negocio, cosa que fue bastante inútil, porque luego de darse cuenta y poner todos los sistemas a tono, lo primero que hizo fue crear un servidor falso, un honeypot para confundir a todos los futuros atacantes de Piedradura o de quienes fueran, creyendo que estaban vulnerando o sustrayendo información que era una información realmente falsa y dedicada únicamente a engañar a estos piratas maliciosos que querían robar todos sus datos.

Y así logró liberar un día más de trabajo y un día más de información, dándose cuenta dela importancia de cuando algo te pide una frase larga o te solicitan algo que habitualmente no estabas acostumbrado, esto es una señal de alerta para cualquier cosa en la vida. Y este ha sido mi escrito de 5 minutos para el día de hoy. Gracias por participar y leerme.

Esta es mi participación en el desafío diario de escritura libre de @mariannewest. El prompt de hoy es **frase larga**.

</div>

<center>

![](https://images.hive.blog/0x0/https://cdn.rcimg.net/MicroReylatos/eea03629/5e8f2409f2cc03d0faff7b6f8481e166.png)

---




<img src="https://images.hive.blog/0x0/https://files.peakd.com/file/peakd-hive/manclar/AKKQwJ3JtTEEA7HbcFbPsKKJmMNxqwLUwRWgixDMJmhhoS4q379cjVbHSo5DN1d.png"></center>

</div>
<div class="text-justify">

*The header image is maded using leonardo.ai and has a link to their web. The separators and the signature were made using pixlr.com and are entirely my own.*
</div>
👍  , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , and 14 others
properties (23)
authormanclar
permlinkfoiling-cyber-attacks
categoryhive-161155
json_metadata"{"image":["https://cdn.leonardo.ai/users/d8012f03-30a7-4812-9c33-bb6b50e56f47/generations/d1cf8f0c-8401-43ff-93f2-9eb3a6f45210/DreamShaper_32_Imagine_sitting_at_your_desk_staring_at_your_co_3.jpg","https://images.hive.blog/0x0/https://files.peakd.com/file/peakd-hive/manclar/23tm7V6A8vX2HuSGjpHt7QNiqsSf6g8MaH1Q6Kxyf22njxs4svBBUeASAPDFJBEHJ3oPW.png","https://images.hive.blog/0x0/https://cdn.rcimg.net/MicroReylatos/eea03629/5e8f2409f2cc03d0faff7b6f8481e166.png","https://images.hive.blog/0x0/https://files.peakd.com/file/peakd-hive/manclar/AKKQwJ3JtTEEA7HbcFbPsKKJmMNxqwLUwRWgixDMJmhhoS4q379cjVbHSo5DN1d.png"],"tags":["hive-161155","alive","aliveandthriving","ctp","waiv","proofofbrain","creativecoin","hive-engine"],"description":"This captures the notion that even just five seconds of effort, with feeling, can change another person's life for the better.","app":"ecency/3.0.32-vision","format":"markdown+html","image_ratios":[0.7692307692307693,12.941176470588236,12.941176470588236,1]}"
created2023-05-25 17:16:03
last_update2023-05-25 17:16:03
depth0
children1
last_payout2023-06-01 17:16:03
cashout_time1969-12-31 23:59:59
total_payout_value1.056 HBD
curator_payout_value1.043 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length8,935
author_reputation149,950,906,809,680
root_title"Foiling Cyber Attacks"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id123,829,803
net_rshares4,470,019,307,964
author_curate_reward""
vote details (78)
@ecency ·
**Yay!** 🤗<br>Your content has been **boosted with Ecency Points**, by @manclar. <br>Use Ecency daily to boost your growth on platform! <br><br><b>Support Ecency</b><br>[Vote for new Proposal](https://hivesigner.com/sign/update-proposal-votes?proposal_ids=%5B245%5D&approve=true)<br>[Delegate HP and earn more](https://ecency.com/hive-125125/@ecency/daily-100-curation-rewards)
properties (22)
authorecency
permlinkre-2023525t173445805z
categoryhive-161155
json_metadata{"tags":["ecency"],"app":"ecency/3.0.20-welcome","format":"markdown+html"}
created2023-05-25 17:34:45
last_update2023-05-25 17:34:45
depth1
children0
last_payout2023-06-01 17:34:45
cashout_time1969-12-31 23:59:59
total_payout_value0.000 HBD
curator_payout_value0.000 HBD
pending_payout_value0.000 HBD
promoted0.000 HBD
body_length377
author_reputation549,971,524,037,747
root_title"Foiling Cyber Attacks"
beneficiaries[]
max_accepted_payout1,000,000.000 HBD
percent_hbd10,000
post_id123,830,199
net_rshares0