Cherreads

Chapter 10 - Digital Footprints

Our character was left in shock by what they had just witnessed.

(You saw that too, didn't you? I feel like I'm in a dream right now. Normally, the death of people close to me or acquaintances doesn't affect me that much, and I'm not disgusted by blood.)

Our character was walking quickly towards home.

(Actually, the reason I'm so scared is that I might have accidentally left some evidence or made a mistake somewhere. But I never thought I'd go as far as killing someone.)

When our protagonist arrived home, no one answered the door. They called their mother:

****: Mom, where are you?

Sarah: Son, did you get home?

****: Yeah, Mom, I'm home. Aren't you here?

Sarah: No, I'm not, son. I'll be home later in the evening. The key is under the doormat.

****: Alright, Mom.

Sarah: Heat up the food in the fridge and eat.

Our character took the key from under the mat and went straight into the house. He went up to their room, threw their bag onto the bed, and turned on his computer.

(Yeah, yeah. Things happened so quickly, I know. Would you believe me if I said I'm speeding things up so I don't bore you?)

(Just kidding. I'm trying to figure out what's going on myself. I need to get my hands on the footage from the neighborhood cameras. For that, I need to access the records at the local office. Now, you might wonder how that's possible, or if it's even possible at all. Well, I don't need to be that professional for this. If you're ready, the fun begins—or continue reading; maybe it won't entertain you, but it's worth a try.)

(First, we need to use a VPN. This will make us somewhat invisible. But even VPNs can't always hide you. At least, we'll be invisible. Now, we'll test the cameras in the neighborhood, and I need to find the one closest to Burcu. I can scan for it using "Shodan.")

It had been nearly an hour since our character had arrived home.

(Hmm, it didn't take me long to find it. There's a camera that can show the location of chloe's body. I can access it. First, I'll scan the IP address using the "NMAP -SP" command. It won't take long, and... Here it is! IP address: "192.168.0.45". Now, let's check the ports and try to access the web interface. This won't take too long. For this, I'll use Hydra. Hydra is a brute-force attack tool. I'll use one of the password attempt lists on my computer to log in.)

It had been three hours since our character arrived home.

(I cracked the password. Really? The neighborhood mayor's birthday is the password? Anyway, I've logged into the interface. The cameras are protected by SSH. I'll access them with the "ssh @admin192.168.0.45" command... Here we go, yesterday's recordings haven't been deleted. So, they're being recorded. I'm pulling the footage for myself using the "ffmpeg -i rtsp://192.168.0.45/stream -c copy" command.)

(And done... Well, not quite. I'll use "Logcleaner" to erase my login entries, and then I'll be done.)

Four hours later, our character shut down the computer and threw themselves onto the bed. They took the 3 sleeping pills from the drawer and tried to fall asleep. he hadn't even watched the footage he obtained.

More Chapters