Counting from Zero (31 page)

Read Counting from Zero Online

Authors: Alan B. Johnston

Tags: #FIC036000, #FIC022000

BOOK: Counting from Zero
7.79Mb size Format: txt, pdf, ePub
 

Anonymous_19:
i’ve
seen the source code...
 
it is good stuff.
 
someone
with a clue

 

Anonymous_6:
 
probably
usgov

 

Anonymous_19: or .
cn

 

Anonymous_1:
 
either way
its
bad.
 
can
you share the source?

 

Anonymous_19: no don’t have it anymore will try to share if I can.

 

Anonymous_1:
 
cool...
 
keep us posted

 

.
 
.
 
.

 

Chapter 1E.

 

 

Mick O'Malley
– knows how the emperor with no clothes felt.
 
(7 comments)

 

The next morning found Mick sitting in a conference session, sipping his espresso (not bad), and still trying to come to grips with the fact that someone had installed a keylogger on his computer.
 
As soon as he saw Kateryna, he wanted to tell her everything that had happened.

They left the conference and set off walking towards St. James Park as Mick told her about the keylogger.
 
Kateryna was both amazed and concerned, especially about the implication that someone had physical access to Mick’s computer to install the bug.

“How did you find the keylogger?
 
How long had it been there?
 
Who put it there?” she began excitedly.

“Well, the mail Miles showed me was generated with a particular well-known piece of malware of Russian origin that is typically associated with both hardware and software keyloggers.
 
I was fairly confident that I didn’t have a software keylogger… I mean
,
I’m not such an idiot that I could have a rootkit on my computer, so that meant a hardware keylogger.
 
As for how long it had been there, I have no idea.
 
I’ve certainly had strange things happen to me ever since I was in Los Alamos and Vegas...
 
I guess whoever is trying to discredit me and disrupt my work put it on there.
 
Think about all these things: the forged email to
ISW
, the threat in Los Alamos, the No-Fly
list
.
 
Which were done by Zed dot Kicker and which
were done by the government
?
 
And, who even knows I am working on this project?” Mick paused.

“I know, it is incredible...” she replied, and they were silent for a few blocks.

“The mention of three days in the forged email suggests that is the date they are working towards.
 
If I had to guess, I’d say the full force of the botnet will be unleashed in all the ways they’ve been testing it: against web servers, mail servers, and DNS servers in the ultimate zero day!”

“You could be right,” Kateryna replied.

“I know I am.
 
I need a break… something to give me an edge against this botnet...
 
and soon,” he replied, and drifted off into his own thoughts.

By the time Mick and Kateryna reached the park, their conversation, influenced by their surroundings, had moved on to other topics.

“Walking around London and England makes me think of Jane Austen –
Pride and Prejudice
is my favorite novel of all time,” Kateryna replied.

“I know how you feel.
 
Myself, London makes me think of Sherlock Holmes,” Mick replied.
 
“You can’t beat Victorian times.
 
By the way, are you familiar with ‘steampunk’?”

“No, what’s that?” Kateryna asked.
 
Mick raised his eyebrows.

“Well, let me tell you about it!” Mick replied,
then
launched into an explanation.

As the afternoon passed, they sat down on a bench in a part of the garden with a nice view of the lake.
 
Kateryna took out a water bottle, twisted it open and took a sip.
 
She raised the bottle and looked at him, asking a question without words.
 
He nodded.
 
She took another sip then passed it to him.
 
He put it to his lips and felt a thrill of intimacy, putting his lips where hers had just been.

Sitting in the afternoon sun, they watched some equestrian riders go by in the park as the clouds moved across the sky.
 
They returned to the conference later, and Mick felt the stress of the situation had drained out of him.

 

That evening, Mick was tired, but still couldn’t sleep.
 
He was feeling keyed up over the logger.
 
In his mind, he kept going over all the places his computer had been, looking for where an attacker might have had access to it to install the keylogger.
 
He couldn’t come up with any instances that he had left his computer alone with a stranger.

He was interrupted in his musings by a knock at the door.
 
He knew Lars wouldn’t knock.
 
Mick jumped out of bed and looked out through peephole, but didn’t see anything or anyone.
 
He noticed a piece of paper on the floor that must have been pushed under the door.
 
On it was printed:

 

Alec, be at these coordinates at 2am.
 
Turing

 

Finally, Turing had made contact!
 
He was impressed both by Turing’s knowledge of his Alec Robertson identity, and that he was staying in Lars’ room.
 
Mick wondered what else Turing knew about him…

He examined the printout carefully and realized it was printed using a dot matrix printer – how quaint!

Mick put the coordinates into GPS and got a location in the East End of London.
 
He checked the time and decided he had plenty of time if he left right away.
 
He set off on the Tube, bringing his computer, determined to never let it out of his sight again.
 
Ever.

Arriving at the building located at the specified coordinates at slightly before the hour, Mick walked up to the door and knocked.
 
A young man with multiple piercings and a Mohawk answered the door.

“Hello, there.
 
I’m Mick… I was told to come here?” he asked.
 
The man nodded and stepped aside.
 
Mick stepped inside and walked down a long, dark hallway.
 
As he progressed, the music got louder, until he could barely hear himself think.
 
He turned a corner and noticed a small room to the one side.
 
In the room there were a dozen or so people, all younger than him.
 
A single bare bulb hanging from the ceiling provided illumination.
 
The walls had peeling paint, and the unpleasant smell of stale beer and cigarette smoke permeated the room.
 
Mick realized he was probably in a squat: an abandoned, illegally occupied building.
 
On a table in the center of the room was a single computer.
 
A young woman stood with her back to Mick, then turned around.
 
She was dressed in punk style, with platform combat boots, fishnet stockings, miniskirt, and a ripped tank top.
 
Her hair was short, spiky, and pink.

“Mick!” she called out to him, and he stopped walking.

“Yes?”
 
She motioned for him to come in, which he did, glancing around the room at others.
 
“Turing?” he asked.

“You got my message?” she asked, smiling at him.
 
He tried to place her accent, but couldn’t get further than Eastern European.
 
Perhaps, as she said more, he could figure out more.
 
He nodded and walked into the room.

“So, the famous Mick O’Malley thinks he can take down Zed dot Kicker?” she asked.
 
The others smirked and made barely audible comments in the background.

“I plan to, yes.
 
I’ve already broken the encryption and figured out the P2P routing protocol – by the way, thanks for the link!
 
But I haven’t been able to disrupt the botnet controllers.
 
Can you help?”

“Perhaps.
 
Are you sure you want to do this?
 
You have no idea who you are up against.
 
You are being targeted now, but if you take this further, you’ll have more to worry about than just the criminals.”

“I am sure,” he replied.
 
“And if these guys thought that threatening me and getting me into trouble would dissuade me, they couldn’t be more wrong.
 
I will get this damn botnet!”

“I believe you just might,” she replied, slowly walking around him, looking him up and down.
 
“I have information that you will find very useful: the location of the criminals running the botnet, and something that could help you take control of the botnet.
 
It is all on this computer,” she said, pointing at the machine in the middle of the room.
 
Mick looked at her, waiting for more.
 
She pointed again, and Mick walked over and sat down.
 
He hit the enter key and the screen turned on, displaying a login prompt:

 

login
: |

 

Someone in the back spoke up.

“Doesn’t he know how to hack a computer?” he sneered.

“Oh, I think he does,” replied Turing.
 
“He’s so good at what he does, that he must have once been on the other side of the fence.
 
He must have been one of us.
 
If he can remember
who
he was back then, he’ll succeed.”

“Is this some kind of a test?” Mick asked, making note of her emphasis.

“If you want to think of it that way, yes.
 
I am risking my life sharing this with you.
 
I’m only willing to do so if you are in fact good enough to use it.”
 
She paused and leaned over him almost whispering.
 
“So, go get it!”

Mick glanced around the room,
then
focused on the job at hand.
 
He did enjoy a challenge after all, although it had been quite a while since he had broken into a computer like this.
 
Turing was right – he had once been a hacker, and as a teenager had hung around with a crowd like this, and used to enjoy showing off.
 
But that was a long time ago.

First, he had to determine which operating system was in use – this only took a second.
 
It turned out to be a popular closed source operating system, but the usual graphical user interface had been disabled, only allowing typing, a so-called command line interface.
 
This eliminated a number of easier ways to get into the system, but not all of them.

The first step was to gain access to the system.
 
He would need to login with system administrator rights, also known as ‘root’ or ‘super user’, to the computer to find the information he needed.
 
He tried some common tricks but they all failed.
 
He tried a number of common usernames and passwords but none worked.
 
Then he thought about what Turing had said about him remembering who he was.
 
He looked quizzically at her, then typed:

 

login
: eireforce1

password
: ***************

 

After a pause, the screen showed a command prompt, indicating that he had successfully logged in:

 

$ |

 

A murmur spread around the room.

“Very good!” Turing said.
 
“Next...”

“I have no idea how you learned my hacker alias from all those years ago, or my favorite password back then...” Mick said, truly mystified.
 
Turing just shrugged, and he focused back on the job at hand.

Mick now was logged in and had command line or 'shell' access to the computer.
 
He still needed to get ‘root’ access.
 
He tried a number of approaches but they all were patched.
 
An idea came to him as to how he could break into the system.
 
It was a risky approach, but he suspected he needed to take a chance in order to succeed.

Other books

I'm Not Your Other Half by Caroline B. Cooney
The Delicate Storm by Giles Blunt
Love at First Note by Jenny Proctor
The Indestructible Man by Jablonsky, William
My Side of the Mountain by Jean Craighead George
Dressed To Kill by Lynn Cahoon
Into the Fire by Anne Stuart
Home is the Sailor by Keene, Day