Birkhoff: We have a breach. __(1)__, but huge.

Percy: Do tell.

Birkhoff: Well, I was running a system diagnostic. Rerouting network traffic, using a new technique I picked up from, uh – from the engineer. Actually, the truth is, uh, if I hadn't met him, I don't know if I ever would have __(2)__ it.

Percy: Spotted what?

Birkhoff: A shell program. Planted behind the firewall, like a __(3)__ back door that leads from the division subnet out into the real world.

Michael: Wait. Uh, somebody hacked into our server? I thought that was impossible.

Birkhoff: No, no, it is impossible. Look. It's like a – a private chat room, ok? It's 2 ways, and none of the chats are __(4)__. So there's no way to tell how much it's been used or what's been said.

Percy: Nikita.

Birkhoff: That'd be my bet. Question is Nikita and who. The shell can be accessed from any __(5)__inside division. Anyone with the code can bring up the shell.

Tiny spotted hidden logged terminal
伯克霍夫:有个漏洞。小漏洞,大问题。 珀西:快说。 伯克霍夫:我正在运行一个系统诊断程序,进行网络流径再定向。用的是我从那个工程师那里学的新技术。其实,说实话,如果我没遇见他,我都不知道能否发现这个漏洞。 珀西:发现了什么? 伯克霍夫:一个命令行程序。嵌于防火墙后,就像一个隐藏的后门,将组织的子网与外网相连。 迈克尔:等等,有人侵入了我们的服务器?我以为这是不可能的。 伯克霍夫:不,不,是不可能的。看这个。这就像个加密的聊天室,是双向的,而且不会留下任何记录,所以也无法估计它被使用了多少次或者聊了什么。 珀西:尼基塔。 伯克霍夫:我也是这么觉得的。问题是尼基塔和谁在联络。这个命令行可以从组织内的任何终端连入。任何知道代码的人都能启动它。