The plan
It had all started with a mistake - not on my part, but on theirs. An outdated instance of an SFTP server, used only for backups, had been hiding in the network. Nobody cared, nobody noticed that it hadn't been updated for years
I had spent weeks mapping the network, digging through forums and picking up information in the depths of the darknet. The decisive breakthrough was a gap in the authentication system. It was complicated, but not unsolvable.Getting started
The first step was always the most difficult. My fingers flew over the keyboard while I executed the initial scripts. The server responded sluggishly, but it responded.
“ACCESS GRANTED”, it finally flashed on my screen."
I leaned back and took a deep breath. The first breakthrough had been made. But I knew that this was just the beginning. The server was secured - two-factor authentication, intrusion detection systems, the whole nine yards..
An exploit script I developed did most of the work for me. Within a few minutes, I had switched off the monitoring sensors and gained undetected access to the backup server.