Page 68 of Sovereign


Font Size:  

Hmm. I’m not jealous at all. I narrow my eyes at him. “Yeah? Tell me.”

“May I?” He gestures toward my laptop.

“No one touches my laptop.” I glare at him. “Tell me.”

Mikhail nods, so Aleks tells me, even though he’s obviously not too pleased about it. “Voice over Internet Protocol. We intercept VoIP traffic and —”

“I thought of that,” I interrupt impatiently. “We don’t have time for that.”

His lips thin. “Have you found any vulnerable devices? Security camera with a microphone, unsecured smart phones?”

He has a fair point. “Maybe not fully,” I admit. Maybe not at all?

“I’d start there.”

I’m already on it. In seconds, I’ve locatedJim’s iPhone,wide open for all to see. I quickly enable the audio function and hit the speaker volume on my laptop. I can hear them as well as if I were standing in the room next to them.

Point one for Aleks, but I won’t admit it.

“Something’s not right here,” one of the voices says. “We should be able to access all video footage, and it seems…”

Their voices get jumbled for a moment.

“Our ten o’clock hasn’t arrived.”

I put my hand over the speaker. “Their ten o’clock hasn’t arrived because I hacked their texting system and gave him the day off.”

Aleks looks impressed. Mikhail, however, gives me a wary look and pulls out his phone.

“Relax,” Aleks says, waving off Mikhail. “I have a firewall and MFA installed so no one can access our lines.”

“MFA?” Mikhail shakes his head.

“Multi-factor authentication,” Aleks and I say in unison. He glares. I narrow my eyes at him. Not sure if now’s the time to demonstrate I can totally get by his firewall and MFA?

“You should conduct more frequent penetration testing,” I tell him.

“Oh for fuck’s sake, the network segmentation covers that,” Aleks says with a near-growl.

“Hmm,” I say, stroking my chin. I lift my phone. “Are you sure about that?”

Mikhail looks from me to him. “I can’t tell if you two are getting along or fighting.”

“Neither,” we say, again in unison.

Aleks crosses his arms across his chest. “What’s your favorite scripting language for penetration testing?”

“Can you stop sayingpenetration?” Mikhail mutters but I’m already thinking.

“God, that’s a hard one. Ruby’s a fave, but Python…”

“Infinitely more readable minus the simplicity of Ruby,” he supplies.

“Mmm.” I’m starting to warm up to him, but he can answer a question of mine now. “Best way to handle the aftermath of a data breach and compromised system?”

“Murder and bloodshed, obviously,” he says with a shrug of his shoulders.

I laugh out loud. “You are so brothers. Okay, so murder and bloodshed aren’t my methods, but of course they would be yours, after you lock down encrypted data and issue an alert. Real question. Protocol for if and when you encounter a WAF and have you ever successfully bypassed it?”

Source: www.allfreenovel.com
Articles you may like