Combat by Stephen Coonts
Author:Stephen Coonts
Language: eng
Format: epub
Publisher: Tom Doherty Associates
Published: 2011-08-30T04:00:00+00:00
In the Spook Booth, the CIA agent chuckled when he heard Wagner’s oft-played piece. “Sounds like your people have been spending too much time watching old war movies.”
Kevin Shrewsbery looked over at the visitor from Langley. “I’d rather that than have them use the training we give them here to empty my bank accounts.”
While the CIA man stared at the Army colonel, the FBI liaison chuckled. “You’ve got that right.”
Back in the Pit, Bobby Sung was finishing his tasks. “Righto, mate,” he called out to Eric Bergeron, “we be in business.”
Taking a deep breath, Eric studied his screen. “Let’s see now,” he mumbled. Bobby Sung, using an old technique, had managed to enter an open port in the host computer macnife worked from by sending a message using an address that macnife’s system was familiar with. Once past the security gateways, the body of the message was not checked by the security programs, since it followed the address of a trusted user. That body consisted of a sequence of commands, written in the computer language used by the system under attack, that established a new root account.
Neither the nation that had provided the computers nor macnife’s native country altered the basic programming language, making it easy for Eric to pull up the directory of the host computer and get to work. The first phase of the attack involved the downloading of a Trojan horse. While there are several variations to this sort of attack, the one Eric introduced to macnife’s host computer involved that system’s Internet protocol instructions.
Rather than destroy a single computer which could easily be replaced, the NSA had convinced the members of the National Security Council that it could nullify the effectiveness of future attacks by keeping track of where the dark knights from that country were going in cyberspace. Their solution was to modify the header portion of the Internet protocol instructions currently on macnife’s host computer so that every time macnife and his compatriots connected with the internet, the NSA would be alerted. The Trojan horse in this case did nothing other than send the NSA an info copy of everything that was sent out onto the Web. With that information in hand, the NSA would be able to warn any site that was the target of an attack as well as gather information on who this particular nation was working with.
Methodically Eric made his way into the operating system of macnife’s host computer. With root access, this was rather simple. What was not going to be easy was the substitution of codes. To do that Eric would have to operate on the old code. That could create a momentary interruption in service, much in the same way that a surgeon performing open-heart surgery must stop the heart in order to work on it. Everyone using macnife’s host computer that was connected to the Internet would experience a momentary delay of service. If this interruption became pronounced, the system administrator would, quite naturally, assume that there was a problem either with his connections or his system.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
In Control (The City Series) by Crystal Serowka(36198)
The Wolf Sea (The Oathsworn Series, Book 2) by Low Robert(35212)
We Ride Upon Sticks by Quan Barry(34493)
Crowbone (The Oathsworn Series, Book 5) by Low Robert(33589)
The Book of Dreams (Saxon Series) by Severin Tim(33349)
The Daughters of Foxcote Manor by Eve Chase(23583)
Trainspotting by Irvine Welsh(21606)
Call Me by Your Name by André Aciman(20465)
The Secret History by Donna Tartt(18996)
Shot Through The Heart (Supernature Book 1) by Edwin James(18900)
All the Missing Girls by Megan Miranda(15885)
The Girl from the Opera House by Nancy Carson(15760)
American King (New Camelot #3) by Sierra Simone(15756)
Pimp by Iceberg Slim(14464)
Sad Girls by Lang Leav(14382)
The Betrayed by Graham Heather(12800)
The Betrayed by David Hosp(12753)
4 3 2 1: A Novel by Paul Auster(12352)
Still Me by Jojo Moyes(11239)