![]() “Yes!” You shout and people around you in the café stop their chatting and turn their annoyed faces to you, but you don’t care. A few long seconds pass before your terminal spits out the long-awaited SSH lines: Using username "john". Suddenly, you notice some movement on one of your Brazilian servers (OK, not really “your” server.) Your heart is pounding – seems like one of the passwords your system came up with fits a database server on the other side of the globe. It then builds a long dictionary of possible passwords per username and automatically tries them across corporate servers. Your system is scanning thousands of web pages across the Internet, from corporate websites to social media and local newspapers, in an effort to find hints to corporate users’ passwords. ![]() ![]() You scan your servers and routers (well, they’re not actually yours, but you know) to see if any one of your smart, brute-force attacks got lucky and you have an open session inside one of those large enterprises you’ve been gunning for so long. Just imagine that you are a black-hat hacker sitting in some seedy internet café in Europe, doing a dirty job on behalf of one of those secret, underground organizations we only hear about in the movies.
0 Comments
Leave a Reply. |