"Hacker"

"Hacker"

In this humorous story, I wanted to fantasize about what a “hacking” of a washing machine might look like in the near future with the help of a voice interface, intelligent systems and the ubiquitous donation.

Could not sleep. It’s 3:47 on a smartphone, but it’s already quite light outside the summer window. Yarik kicked off the edge of the blanket with his foot and sat down. *

“I won’t get enough sleep again, I’ll walk like a zombie all day” - he felt his slippers with his feet, put them on and wandered to the window. It was getting light. He opened the window and fresh morning air rushed into the stuffy room, ripping off the remnants of sleep.

“That’s it, now I’m definitely not going to sleep,” he looked around the room. Wrinkled jeans and a T-shirt hung on a chair in front of the sofa, and a pile of clothes lay next to him. Should have washed it. He walked over, took the T-shirt from the chair, brought it to his nose, sniffed it and grimaced.

“Is this how I walk around the office? No wonder she's avoiding me."

The new girl appeared in the office recently and immediately liked Yaroslav. Big green eyes, short hair. He remembered well when he saw her for the first time and their eyes met. Something rumbled violently in his chest, goosebumps ran down his back, and he froze awkwardly, not daring to look away. Her name was Irina and now only she kept Yarik from leaving the annoying office.

He threw the T-shirt into the laundry pile. Thinking for a bit, he also threw off his jeans. Scooping up everything in an armful, wandered into the bathroom and threw it next to the washer. The light in the bathroom obediently turned on, the washing machine door clicked and opened a crack. He loaded the laundry into the drum, closed the door and pressed the start button. The machine beeped, but did not start. He pressed start again. She just squealed again. Yarik sighed and raised his head.

— Vika, what about the washer?

— The device is working properly.

- Why won't it start?

- According to the government decree 197 fraction 2 of June 2, 2029 on the implementation of the Federal law on the violation of silence at night and morning hours on weekends and holidays, the launch is blocked until 7 am.

“No, if I start the washing machine at 7, I won’t have time for work” - thoughts about Irina and the look of crumpled clothes in the hatch of the washing machine did not give Yarik peace.

- Vika, how to hack the washer?

- According to federal law...

- Stop... switch to developer mode.

- The system has been switched to developer mode.

— List of vulnerabilities to washing machines.

- The list of washing machine vulnerabilities and other similar materials are available in the diagnostic service for developers and home security specialists by subscription only. Would you like to pay for a developer subscription?

Yaroslav sighed heavily.

- Is there a trial period available?

- There is no trial period. As a limited offer, you have access to trial access for 24 hours for 299 rubles. Offer expires in 15 minutes.

He thought for a couple of seconds: “Three hundred rubles is a lunch in the canteen” - but, imagining the face of Irina, evaluating his outfit, he said:

- Pay through Sberbank.

— Name your payment password.

— Balblo goodbye

A smartphone chimed in the room.

— Subscription payment was successfully made. Access is granted for 24 hours.

— So, Vika, ask the system for a list of vulnerabilities to washing machines.

— The system asks for the make and model of the device.

Yarik rushed into the room for a smartphone and filmed a washing machine.

— Vika, send the last photo.

- Photo uploaded, brand and model recognized, location and serial number of the device determined from geolocation data. The diagnostic system prompts you to connect to the device to scan for vulnerabilities.

- Let him do it.

— A device from the external network requests access to the washing machine. Grant access?

- Of course!

- To grant access, say the code word.

- Irina.

— Access to the device has been granted. System scan started. The process will take approximately ten minutes.

The washing machine blinked rhythmically. Yaroslav slowly moved to the kitchen, poured filtered water into the kettle and put it on heat. He sat, listened to how the water rustled in the kettle and thought about work. A month ago, he was actively looking for a place to move, but with the arrival of a new one, he lost all interest in changing jobs. Even letters with offers of a new job, he now sent to the trash without reading. The kettle clicked a relay and stopped hissing. Yarik got up, took a mug, put a bag of tea in it and poured hot water.

- System scan completed. Found four vulnerabilities. Proceed to install an update to fix them?

- No! Postpone installation! In surprise, he almost dropped the mug from his hands.

- Installing the update has been delayed by 24 hours.

Yarik breathed a sigh of relief. It was necessary to somehow start the machine bypassing the lock.

— Perform an analysis of current vulnerabilities for the possibility of remote launch.

— Vulnerabilities for attacks of this class were not detected.

Yaroslav thoughtfully took a sip of tea from a mug:

- What vulnerabilities are not closed at the moment?

— Vulnerabilities for the following systems are currently active for the device: door lock systems, voice advertising playback systems, payment systems, and time synchronization systems.

Of all the above, only the last vulnerability was interesting. He went to the kitchen and put the mug of unfinished tea in the sink.

- Vika, description of the time synchronization vulnerability.

- Vulnerability number 4126. This vulnerability allows you to remotely change the value of the system time until the next synchronization session with the exact time service. Potentially vulnerable systems: voice advertising system, subscription payment system and delayed launch system.

Yaroslav raised his eyebrows in surprise - "The delayed start system is an option." He quickly moved back to the bathroom.

- Vika, set the delayed start of the washing machine to 7 in the morning.

— Delayed start is set.

- Put the diagnostic system into the time synchronization vulnerability testing mode.

- Transfer completed.

— Menu of available commands.

— The command to increment the value of the system time is available.

Yaroslav looked at the smartphone. It was 4:15 on the clock - "So ... then we need to set the system clock to 2 hours 45 minutes."

— Execute the command to increment the system time by 165 minutes.

- The command has been completed.

He stared at the washer. Nothing happened. Perhaps the vulnerability code did not work, or it made a mistake with the increment. Yarik began to sort through the options in his head, when suddenly the machine loudly clicked the hatch lock and began to draw water for washing.

He was in the room and laying down on the sofa when the machine had already taken on water and began to slowly scroll the drum. Yaroslav leaned back on the pillow, stretched with pleasure and closed his eyes.

“Yes, it’s not for nothing that the boss calls me a“ hacker ”after all, he thought and smiled.

Source: habr.com

Add a comment