home

search

Risky Man In the Middle development

  She started coding the program in Blitz, her cybernetic mind finally in use; she could imagine what this malware should do in its function.

  She could perceive the underlying schematics, knowing it would be hard to program malware and inject when you don’t have the tools for it.

  She thought of things like ‘Man in the Middle’ or reverse engineering software to cut the extra time and complexity to create malware.

  She typed out her code, her smile turning arrogant in front of the office computer, crafting a payload or an injector for her malware to the network.

  Then next she coded a malware with a TCP protocol, she could connect secretly with her mind, the program was designed to borrow processing speed from her mind with cloud computing features for faster decryption.

  A simple program that she can hide in the network, while her mind connects to the program to listen to the noise happening in the facility’s network manually.

  Soon, a manual connection has been created for this malware, ready for deployment with a worm feature that begins lurking on the internet with an encrypted shell and a deceptively innocent protocol-like name in the network’s traffic.

  She completed her network-listening program, about to deploy to the network.

  She begins her program and watches it flare up in her terminal. Looking entirely harmless, like it was a ping or a web connection to a website.

  The program was small, but effective, being a Man In The Middle exploit, listening to the noises with her mind supplying computing power to it.

  The exploit revealed a lot of information from the traffic; most was redundant as it uses her mind's computing power for information decryption, but they were too fast, causing latency.

  She soon halted the program through the socket and began updating it.

  The update was to output the decrypted information, and this was her plan for tweaking the exploit.

  She prepared the program once again and ran it, with a different backdoor protocol.

  Ava relaxed, as her mind connected to the listener program that appeared harmless. The program ran silently in the background, and after a few minutes, information started to manifest in her head.

  Did you know this text is from a different site? Read the official version to support the creator.

  Information like chats, texts, and gossiping - then some nude image of a muscular guy by female coworkers, another one is playing games secretly.

  There was too much information that her eyes began to spiral out of control, losing touch with reality, where her interest suddenly revved up.

  From the inspection, it appeared to be a secret meeting that would be held somewhere; the location doesn’t appear to be disclosed. Eventually, it faded from the program with subsequent information.

  This sparked her curiosity, where eventually her head began to ache, she used her hand to massage the pain, muttering, “My head hurts, so much information. It’s crippling me.”

  She slowly stood from her ergonomic chair and began to run to detach her mind from the listener program, until she reached the cafeteria and bought a lot of snacks.

  Her mind was rancid, as her attitude with the food attendant behind the counter did not convey a good impression of her, but supplied with the food nevertheless.

  She began ravaging on her food like an animal, and drank water using her mouth from the water dispenser like a desperate dog. This, however, unnerves people, but for the males, a wet dream comes true, where their eyes begin to dilate.

  People couldn’t help but watch. Soon, Ava detached her mouth from the dispenser and looked at the glances of the crowd.

  They quickly looked, pretending nothing had happened, but her mind was in a frenzy, unable to integrate, and she bit her teeth and headed off, no time to think, but to relax.

  She walked like a madman before relaxing with her mind.

  She returned to her office, safe and sound, giving her time to think.

  “I don’t understand, why am I like this, why am I being irrational?”

  “Creating a listener, and synchronizing her cybernetic computing to decrypt the most secure data while in the middle of the network. That was very stupid of me,” she confessed to herself shamefully.

  “Now, I realize it’s a mental torture, unfathomable to even do something like this and risky, but again”

  She smiled, “Who wouldn’t want to know the secrets?”

  She plans on building a portal device that could connect to the program listener; a schematic could be seen in her head, where the device is more efficient and less risky.

  While other external items could do the job, transcribing everything from data to text.

  Ava stores the internal schematics of the programs and terminates the program with all its activities. She rests on her ergonomic chair and plans to leave the facility soon.

  She resumed her work debugging, and even at times looked at the program she made for her reckless network exploitation.

  Standard business, everything she learned from the listener program was boring, but a secret meeting was enough to interest her - a risk assessment showed up in her mind.

  And she nodded in silence.

  “I guess in some way I have finally changed.”

  “But still I need to do a risk assessment.”

  “Maybe I should develop a mini computer with a wireless driver while doing my job.”

  Soon, she was dismissed and left the facility, so she called for a taxi, which would drop her off somewhere near a mall in Sector 451.

Recommended Popular Novels