Post on 18-Dec-2014
description
A GEEK
STORY’S
Somewhere...
O ! O! We have an exam in electronic tomorrow and we haven’t studied yet. We are
doomed !
We have to steal the topic,
it’s our only chance !
Let’s prepare !
First, let’s try to physically attack the
servers to retrieve the topic.
Server : A computer which houses the files
Black force ! White force !
I am activating camouflage with my
Iphone.My GPS indicates that this stairway
will lead us to backbone !
Backbone : room which has many computers
I will take the interface command (and the new technician too..) !
Be careful ! Tabouret !
tabouret@iut:~#./etudiant > /dev/null 2>&1 *
« bye bye students »
Let’s turn back before he slices us into datagrams !
Small slices
Tqbouret is blocking us !
What are we going to do now ?
We will Hack he server !
Here we are now in the desktop ! Ça va
ouatcher !
Take a port scan with Nessus* !
Utility to introduce in a computer
He thinks he’ll get us with his HoneyPot *!
WTF !!!
Piège à pirate
We are going to use our heavy
artillery!
I call Metasploit * !
Utility to intrude a computer
Let’s hide own spyware in our files’ hidden attributes !
Long life for the NTFS*
The way the data are stored on the hard disk
No ! Administrator is taking traceroute* !
Owned !
We are doomed ! Let’s go !
Utility to find somobody
Oh ! It’s too late ! They have gone !
And the test is in a few minutes !
We didn’t have time to revise !
Oops, i have forgotten write the topic ! I’m coming back in
15 minutes !
/!\ Warnings /!\
The characters and the situations of this narrative being purely fictitious, any resemblance with persons or existing situations or having existed would know how to be only fortuitous.
Copyleft (C) 2008 Yohann LEPAGE and Jean-Christophe SCOARNECThis comic is free story; you can redistribute it and/or modifyit under the terms of the GNU General Public License as published bythe Free Story Foundation ; either version 2 of the License, or(at your option) any later version.