She sat back. The evidence was clear. But now, ethics came into play. She couldn’t just drop a bomb in the report. She needed context . What other doors were open? She reviewed the scan logs again. Port 445 (SMB) was also exposed, missing the EternalBlue patch. Two wormable vulnerabilities on the same server.
Lisa Bock’s voice was calm, almost soothing, as she narrated the steps on screen. “Vulnerability analysis isn’t about breaking in,” she said, her cursor hovering over a network map. “It’s about finding the unlocked window before the storm arrives.”
Here’s a short story inspired by the ethical hacking process of vulnerability analysis, with a nod to the instructional style of Lisa Bock’s videos. The Silent Scan