The corperation | Teen Ink

The corperation

October 24, 2016
By Anonymous

“Just run it, we are running out of time. They removed the worm”


>  ./theCorperationTakeDown


“Done, and it worked” I said.


The sense of accomplishment filled the room as we realize that we finished.
“We are Finally done,this viruses” I say happily.


Log 185 (last Log): {
We did it.
The question is, at what cost was it for? Guy 4 and Guy 3 have been compromised.


There…
}


\\4 days earlier//
Log 182: {
It has been 5 months now and we are almost ready to deploy the Resident Viruses. For 5 months we have been working and infiltrating the corporation. To rthis virusill work from previous logs: The viruses is deployed via a bad usb with a script to have the computer type/make the viruses and compile it in the background (0.01 seconds to make). After the usb is done typing in the code it is no longer needed to be in the computer.  Then the file is just waiting to be run.


Now the virus (the code made by the bad usb) will do:
First, it will get access to th
}


“Dude, we need to start, stop writing your log and get ready”


I’m going to pause here and mention some people who are apart of our group. There are 5 people in our group, for privacy reasons i’m going to call them guy1 - guy4, and then me. The person who just said the previous line is guy 2. Now continuing.


“Ok coming”, I said.


Walking to the base computer (we call it the mother ship) I turn to tell everyone “get your comms running and online. Connect them to this secure and encrypted channel.”


Guy 4 leaves to plant the usb into the computer, because he has a job at the corporation.


Later when everyone is in position:
“Ok Guy3 is everything ready for Guy4?” I ask.


“Yes, the security systems are paused” ,says Guy3.


“Go,” I say.


Guy4 is walking in going to his desk.


“I have to go off line for this” guy4 states.


“Ok, Guy3 get a visual” I say.


“Done, wait what hell, there is no there. What the hell”
“It is a still image. They had access to the cameras the whole time, we were in a honeycomb” says Guy 3


“&@#!” I scream into the comm while slamming on my keyboard.


“Hold on, have some code at the base we can use to break into the cameras manually with.” says Guy2.


Guy2“It is copied onto the mother ship, send it over Guy0 .”


“It is on its way,” I say.


“Ok, I can get it on to the USB,” says Guy1.


Guy1 :“done.”


“Um guys, They found my IP in Guy4’s comm I think they traced it to this van”, Guy3 said concerned for his life, “my fingerprints are all over this van and keyboard.”


“Get out Guy2 and Guy1 now.” I said screaming “I’m sorry Guy3, but you are just going to have to run security protocol 1 and hope for the best.”


Guy 3 says “Comms are going offline for good. Finish what we started.”


…………………


Silence hoping for something good to happen. Then there was a sound. I realize it means the code is on the target computer. I am only thinking one thing Guy4 did it.


When Guy1 and Guy2 get back I tell them the mission was a success.
They tell me that both Guy3 and Guy4 were arrested, and they Guy3 says ”Guy3 successfully did security protocol 1. He saved us”


“I know” I responded.


Log 183 {
Security protocol 1 saves the mission no matter the cost.
It replaces all mention of our group with a faked group consisting of only Guy 3 and Guy4 Removing everyone else from comm system. Changing the mission data and mission code. Finally leaving Guy 3 exposed to the corporation as the hacker. And Guy4 and his infiltrator.


I wrote it myself.


He saved this mission.
}


“I'm calling it for the day, go home.” I say.


Log 184 {
It has been 3 days of nothing. We have decided to try to hack into the corporation again after this major setback. The payload is still on the computer so we have a shot at this still. And I have been analyzing that state at which it is in and can conclude that it has direct access to everything. But has it been found yet?
}


Reassembling the group we get ready to hack the corporation for good. Because the corporation is connected to a commonly used download server we could secretly have the virus attach itself to the their server allowing us to download the information about the virus with an encryption secretly with out them knowing. We also disguised it as a popular download to not seem suspicious.


> wget http://www.TheCorperation.com/downloads/package01105V1.2a.txt.gpg
> gpg *gpg


Here I just enter the encryption password and opened it.


> nano package01105V1.2a.txt


“We are all good,serves” I said.


“What! NO! NO! They are on to us they found us via the file download” I yelled


“Yea their downservers offline. They were waiting for us. They proble also found the one of the files by now” guy2 noted.


“I will place a worm, you get to running it” Guy1 Proclaimed.


“Are we ready?” I asked.


“Just run it, we are running out of time. They removed the worm”


>  ./theCorperationTakeDown


“Done, and it worked” I said.


The sense of accomplishment filled the room as we realize that we finished.
“We are Finally done,” I say happily.


Log 185 (last Log): {
We did it.
The question is, at what cost was it for? Guy 4 and Guy 3 have been compromised.


There is just one last thing to do.
}


The author's comments:

Ideas came from MR. Robot. although the story was not from MR. Robot


Similar Articles

JOIN THE DISCUSSION

This article has 0 comments.