Login via

Becoming A Tech Tycoon Begins With Regression novel Chapter 10

Chapter 10: Testing Sentinel [2]: The Bait

Ethan watched as Sentinel quietly went to work. It easily got through Google’s firewalls, slipping through layers of security protocols like a ghost.

It cloaked its activity by mimicking Google’s own internal bots, making it nearly impossible to detect.

To an outsider, it would look like nothing more than routine traffic. But beneath all that, Sentinel was dissecting one of the most secure digital fortresses on the planet.

Ethan watched as the progress percentage increase as the seconds ticked by.

{1%... 12%... 37%... 65%... 91%...}

{SENTINEL SCAN COMPLETE

Target: google.com

Mode: Smart Adaptive Scan

Elapsed Time: 4 minutes, 19 seconds

Results: 20 Vulnerabilities Found

Action: Save vulnerabilities and Suggested fixes as PDF.}

Ethan leaned forward, curious to know which vulnerabilities Sentinel just found and if they were worth enough to get Google’s attention.

Moving the cursor towards the Results tab, Ethan clicked on it, opening a new tab with multiple drop downs.

{Results:

Critical Threats: 5

High Level Threats: 6

Low Level Threats: 9

}

"Let’s see what you found" he muttered and clicked on the first drop down, the Critical Threat tab.

No sooner had he clicked the Results tab, his eyes went wide.

His breath caught in his throat, and before he could stop himself, the words slipped out:

"Holy... f*ck."

His reaction was reasonable, after all, the results sentinel just provided was borderline terrifying.

They read:

{

1. Zero-Day RCE (Remote Code Execution) on Internal API Gateway

Threat Level: CRITICAL

Description: A hidden part of the system was left wide open. Attackers could sneak in and run their own code in the servers, without even needing a password.

Potential Damage: Full system compromise.

2. Privilege Escalation Flaw in Admin Console

Threat Level: CRITICAL

Description: A misconfiguration allowing attackers to elevate access rights from user to super-admin.

Potential Damage: Total control of internal admin functions.

3. SSRF Vulnerability in Cloud Monitoring Tool

Threat Level: CRITICAL

Description: Server-side request forgery flaw that could be used to access internal metadata services.

.....

}

The other two threats were nonetheless terrifying. If any black hat hacker got access to these then Google’s entire system would be turned upside down.

"This is gold" Ethan said.

He proceeded to open the second and third tabs. While the threats were not as dangerous as the ones marked as Critical, they weren’t threats Google could ignore either.

This proved to Ethan that Sentinel actually worked. And clearly, the system agreed, because a pop-up window appeared a moment later, displaying the updated mission progress.

[Mission progress: 98%]

Chapter 10: Testing Sentinel [2]: The Bait 1

From: [email protected]

To: [email protected]

Verify captcha to read the content.VERIFYCAPTCHA_LABEL

Reading History

No history.

Comments

The readers' comments on the novel: Becoming A Tech Tycoon Begins With Regression