Innocence Lured


Saul decided to take the bus home that night. Considering the package he had in his possession, it seemed wise to travel with a group of people instead of alone. His head was still fuzzy from the adrenaline of having so much money for doing work that he considered more of a hobby. For a young man his age, $2,000 was the equivalent of being rich.

When he got home, Saul unlocked the front door and started toward his room. His mother was asleep so Saul moved silently in the dark until he was safely in his bedroom with the door shut. Turning on the light, he pulled out the envelope. He was still in shock at the wad of cash in the envelope but turned his attention to the folded letter tucked away neatly in between the bills.

 Saul, I want to thank you for your hard work and discretion in this matter. Enjoy the money, it was well earned. Now I'd like to ask for your help on another round of work. As before, we must maintain the highest level of discretion. My security team at the hospital has grown arrogant. In fact, I've been told by my team that they would know immediately if anyone broke into our network, assuming that anyone COULD actually break into the network. From a management perspective, this kind of attitude is dangerous. I need you to continue your work in several steps. I've listed the specific steps below. Should you need money to finance any of these steps, please let me know at the e-mail address below and I'll ensure you have what you need. 1) First, I need you to create a network of rogue wireless access points around the hospital that are bridged directly into the hospital network. There are a couple of ways I can see this taking place, but the end choice is ultimately up to you. This network of fake access points should make it more difficult for my team to detect your activities, thus proving my point. a. There are plenty of public locations around the hospital (in the plaza) where you could set up wireless repeaters to bridge into the hospitals network. You can either buy commercially produced repeaters or build them yourself. My ultimate goal is to create enough wireless traffic that no one will detect your movements on our network, even if they happen to be paying attention at the time. b. An additional option is to utilize a number of USB 802.11b capable flash drives to bridge the network. The hospital uses a lot of insecure desktop computers that all have USB ports enabled. By walking through the hospital and attaching this device to the back of an unattended computer, you could create an initial point of access into the network. Since this unit is a flash drive as well, you could potentially create an autorun file on the drive that logs keystrokes or auto-configures the appropriate network information as well. Ill leave that to your discretion. 2) You will have 2 weeks to get this network in place. At some point before the morning of the 15th of April, I want you to look for a patient record by the name of Matthew Ryan. I need to prove that an information compromise is possible, so I want you to log in and change the blood type of this individual from Type B positive to Type A. This should provide sufficient proof to my staff that our security is not up to par. Remember, this is our test record, not a real patient record. 3) Report back to me when the work is completed and I'll pay you five thousand dollars. Also, please e-mail me about what resources you require and I'll have them shipped directly to you so you don't have to order them yourself. Thank you again for your discretion in this matter. I'll certainly recommend your services to my colleagues. You could have a thriving business before you know it. As a bonus for your efforts on this project, you can keep the hardware you order once the job has been completed. Respectfully, Knuth knuth@hushmail.com 



Stealing the Network. How to Own a Continent
Stealing the Network. How to Own a Continent
ISBN: 1931836051
EAN: N/A
Year: 2004
Pages: 105

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net