And soon enough, the program had already started testing every exploit that could be used to breach the University’s system's defences, rendering the firewall it was supposed to be protected with as ineffective as a tofu, just a touch it couldn’t even stand for more at all.
While the University has invested a significant amount of money for the security of their system, when it was in the eyes of Aron's program, it looked like nothing more than a kid trying to fight against a tank.
It was effortlessly ripped through, identifying and detailing every weakness, providing instructions on how even a beginner-level programmer could exploit the system.
With the passing of the seventh hour since the system started going through the University’s System, Aron’s program still continued on exposing more and more vulnerabilities.
There were several reasons why this process was taking such a long time to complete.
Firstly, it was because Aron’s computer was cheap since his family couldn't afford a better one that would be quite expensive without leaving a hole in their finances.
Currently, his cheap computer would even be able to cook an omelette from the heat that it had been generating. And to mitigate the issue, Aron had to set up an impromptu cooling system by using his household fan.
Secondly, since the program was developed in the 2100s. This meant that it had a compiled list of weaknesses from all the years before and after its development. However, during that time, many of these weaknesses were widely known by almost everyone and thus were consequently removed during the development phase.
But in this particular universe, since Aron is years before that, it means that most of these weaknesses have not even been discovered yet. And as a result of which, the program was busy finding a butload amount of them, which resulted in making his computer a kind of stove.
On the third day after Aron’s program had started scanning the University’s System’s weaknesses, the program finally completed its job and started compiling a comprehensive report on how they could be used to exploit the system and provide solutions on how to address them.
However, since the numerous inefficiencies in the system were also considered to be its weaknesses, the program also listed them in the report, along with ways on how to solve them, this gave Aron hope on how he could potentially use the program to also optimize other people’s programs for earning money. But first, he wanted to know as to who was so hellbent on making his life living hell.
The final P*F document spanned 1200 pages and about 400 of them were solely devoted to the weaknesses and how to exploit them, providing intricate details on how such an attack could be done.
The rest of the pages discussed its optimization and how to solve the 400 pages of aforementioned weaknesses.
So, Aron took his time, thoroughly reading the whole document while enjoying every second of this as he knew that once he learned everything about it and implemented it later on, he will easily be able to identify who was fucking with his life.
It took him 5 hours to complete reading the entire document and also comprehend everything mentioned in it.
....
Now, here is a lesson if you aspire to hack something, there are 5 steps that you will need to follow:
The first step is Reconnaissance: During this step, all you have to do is gather information about your target. This may include identifying the target, finding the target's IP address range, network details, and DNS records.
The second step is Scanning: This phase includes the usage of tools such as dialers, port scanners, network mappers, sweepers and vulnerability scanners to scan and gather the data.
The third step is Gaining Access: In this phase, the hacker designs a blueprint of the target’s network with the help of data that was collected during the previous two steps. Thus, the hacker has now finished enumerating and scanning the network and can access from the available options to gain access to the target network.
The fourth step is maintaining the access: Once a hacker has gained access, their goal is to maintain that access for future exploitation and attacks. Now that the hacker owns the system, they can use it as a base to launch additional attacks.
The fifth and final step is covering the tracks: After the access is gained and privileges have been escalated, the hacker should cover their tracks. This includes clearing the emails sent, erasing the server logs, deleting the temp files, and much more. The hacker also has to look for any indications that the email provider may have tried to alert the user of the possible unauthorised logins under their account.
However, since Aron’s program had already done most of the steps, he now only needs to focus on doing one step– the third step, as for the steps 4 & 5, he doesn't need to do them because the method with which he was going to gain the access to the University’s System would not leave behind any traces. This was the most effective attack his program had discovered among the many others when it had been testing the University System’s weakness.
…..
Aron sat in front of his computer, his whole body shaking due to anger. If one looked at what he was reading right now, they would find that he was reading the emails that were sent by Professor Eli Yehudah Rotem Rothschild to someone on the disciplinary committee.
The other email was from the same professor, this time it was sent to someone in the scholarship department. God knew how foolish they were to communicate using university-provided email accounts.
[
Subject: Request for Disciplinary Hearing for a Student
Dear Members of the Disciplinary Committee,
I am writing this letter to request a disciplinary hearing for a student whose conduct has come to my attention as a faculty member. I believe that this student has violated the university's code of conduct and may have engaged in academic misconduct, which has serious implications for the academic integrity of our institution and the trust that we place in our students.
Based on my interactions with this student and my assessment of the evidence, I am convinced that this matter warrants a formal investigation and disciplinary action. I would like to request that the student be summoned to a hearing where they can present their case and respond to the allegations against them.
I am willing to provide any evidence and testimony that I have gathered in support of my position, and I am open to answering any questions that the committee may have for me regarding this matter.
Thank you for your attention on this matter, and I look forward to working with you to ensure that our academic standards are upheld and that justice is rightly served.
Sincerely,
Professor Eli Yehudah Rotem Rothschild
]
This revealed that it was Professor Rothschild who had fabricated the evidence and even reported Aron to the disciplinary committee. That was when everything clicked into place as Aron remembered that his professor had taken a vacation immediately after the failure of his thesis presentation. It became clear that he had been preparing for Aron's downfall for the embarrassment Aron had caused him.
The other email was directed to the scholarship department:
[
Subject: Request for Aron's Repayment Plan to be made at the Maximum Allowable Interest Rate
Dear Scholarship Department,
I am writing this to request a repayment plan for Aron, a former scholarship recipient who was recently expelled from our institution for thesis theft. While I cannot adequately express my disappointment in his actions, I believe that it is important for us to set an example and establish a precedent with him as we move forward and make him an example for the consequences of his mistakes.
Given the circumstances, I would like to request a modification to the terms of the scholarship agreement.
Specifically, I am requesting that the interest rate on Aron's loan be modified to the maximum allowable rate of annual 15 %. While this modification may result in a lower overall return for the scholarship fund, I believe that it is reasonable as it will set him as an example.
Thank you for your consideration of this request. Please let me know if you require any additional information or documentation.
Sincerely,
Professor Eli Yehudah Rotem Rothschild
]
Damn, the dude even wrote a letter to the scholarship department, for fuck sake. Aron realized that he could potentially use this information to his advantage to sue both the professor and the university. However, he will need to reveal where he got these private emails from. So, this evidence might as well backfire on him.
Furthermore, since he still didn't know how the professor fabricated the thesis used as evidence against him during the hearing, Aron knew that it was better for him to continue digging for more evidence. Despite that, this had brought him some relief, albeit it was just a bit.
As some smart dude in the past once said, the first step to solving a problem is knowing what caused it in the first place.
And now that he finally found out who was the instigator, and the veil of mysteriousness had been removed, the fear of the unknown was also removed from his heart. This meant that now he won't have nightmares of some faceless dude trying to destroy his future and make his life miserable.
Although he didn't understand why the professor decided to ruin his life solely because he had embarrassed him, Aron’s head was spinning thinking about how to take revenge from this professor.
But before that, he needed to know the context or the reason as to why the professor had gone this far because embarrassing someone once again wouldn’t be enough to ruin their life.
And once he acquired this information, Aron would decide how brutal his revenge should be.
But even within all of this, he was also relieved with the fact that his program was proven to be remarkably good at doing its job. This will mean that his money-making plan has finally taken its first step into his bright future.
After exploiting the vulnerabilities and gaining access to the university's database and finding out who it was who had been plotting for his misery, Aron managed to calm himself down and then shifted his focus towards earning money first in order to relieve himself from the debt so that it won't raise a negative situation in the future. With that, he decided to find his first target for his grand money-making plan. And since he needed a large amount of money, Aron needed to find the victim who would not only put way too much importance on their data security but also boasted a very large user base and wanted to prevent user data theft. This means that such a target will be willing to pay more money for his service, since a data leak for them may mean that they would lose their user’s trust in their security system. So, with all that in mind, Aron decided to focus on social media sites since they perfectly met all of his criteria. He then started investigating these platforms and ini
CAFE Aron arrived at the meeting place where he had planned to meet with Felix and give him a detailed explanation in order for him to prepare for the meeting with the F******k officials and negotiation with F******k. Three Minutes after Aron had gotten his drink, Felix arrived, shaking hands with Aron and giving him a hug. Aron's friend sat down on the opposite side. "How have you been coping since that day?" Felix asked with slight worry, he was aware of Aron’s condition and also thought that his friend wouldn’t have done such a thing. "Though, it was difficult at first, it has been going pretty well now, in fact, I'm even surprised at myself," Aron smiled while answering and waving his hand. Although he didn't explain the reason as to what was helping him cope or gave him hope, it didn't mean he wasn't grateful for it. Without the arrival of the system, it would have taken him longer to be able to recover and move on from what had happened to him, and since those nasty people
After a few days, it was finally time for the meeting with the group from F******k, and having provided with all the expenses, Aron and Felix didn't fret about anything and were now in the venue that was planned for the meeting to take place. The atmosphere in the meeting room was tense as the group of eight sat in their respective positions, with each side almost mirroring the other. On one side of the long conference table sat Aron, accompanied by his friend and lawyer Felix with a laptop in front of him displaying a folder labelled as "Sensitive Information" on the screen, and a USB flash drive inserted in the computer. On the opposite side sat six individuals, including Roxana, the head of security at F******k, along with five other people, three among which were lawyers and the other two were from the security department of the F******k site. Aron fidgeted in his seat, his eyes darting nervously from the screen to the faces of the people sitting across from him, as both sides
Aron and his family finally moved into their new house by the fourth week after their initial discussion that night. After purchasing the house, Aron bought two cars for his family’s use. His parents were overjoyed, knowing that they no longer had to worry about rent and other miscellaneous expenses. Initially, when he showed the house to his parents, they asked him to consider buying a more affordable one, because this one was very expensive. However, Aron managed to convince them by telling them that he had chosen this house since it would provide an easier access for his younger brother to the better schools around here which eventually made them agree to his purchase. The house was a spacious 6-bedroom property with a ground floor, an upper floor and a basement. Currently, they were using only 3 rooms, one for his parents, one for him, and one for his younger brother, while the rest were reserved for guests and other purposes. As for the basement, it became Aron’s personal sp
[59,600sp] That was the amount of SP that Aron had right now, and this was gained after the computer had completed checking for weaknesses in the 3 apps. ... 'I hope I can get all the answers when I'm done with this,' thought Aron while he was waiting for the emails and phone information to finish downloading. Thus, while he was still waiting for the d******d to complete, Aron decided to move to Apple's iOS. Opening one of his virtual machines, he started the app after selecting Apple’s iOS to be his next system to search. As the program started doing its things, he opened the system’s shop in order to prepare for his plan, so that he would know how much he needed to collect for his next project. When he went to the technology section, an endlessly long list appeared before his eyes. [SHOP] Quantum Computing Artificial General Intelligence Fusion Energy Nanotechnology Universal Printer Space Elevators Anti-Aging Technology Bioprinting Terraforming Force Fields Quantu
Have you ever been in a situation where you got so angry that you strangely became calm, that was the situation Aron found himself in. And this peculiarity was caused by what was before his eyes and he was currently reading. Secretary: Are you okay? Professor: No, I'm not. That kid destroyed my shining moment. Secretary: So, are you not going to solve it and present it again? Professor: No, I can't do it now because my wife will need to invite those people again in a short time and this will make them annoyed by me. Secretary: So what's your plan next? Professor:..... ….. …. …. Secretary: You said that was the only way for you to be accepted into her family. Professor: I will need to find another way for that. Secretary: Which is? Professor: It’s not important right now. But first, I need to deal with that student who fucked my great moment. Secretary: Oooh... So what are going to do with him Professor: I looked at his university information and it seems that he is graduati
A week after the deal with F******k. In Bluffdale, Utah. The NSA's Data Center is located here, which was also one of the agency's newest and largest data centres. In the Meeting room. "So, what is the meeting about? It better be important, because I was preparing for another meeting with Mr. President to explain in more detail about what sort of harm that traitor Snowden did. This better be important, or else I'm sending you to the Office of the Inspector General," said the head of the Special Source Operations Directorate Teresa H. Shea in frustration. She was still stressed regarding the betrayal of the former government contractor, Edward Snowden. She had to visit the White House for like three times in this week just to explain the FUCKING SAME THING, AGAIN AND AGAIN, for fucksake. "Ma’am, there seems to be a great decrease in the amount of data that is being received from the social media site," replied the presenter hastily, not to make her angrier. "What? Explain in det
Although the Golden liquid wasn't active, it slowly continued to strengthen every single part it passed through. This meant that every part of his body was being strengthened since the golden vessels ran parallel to all the blood vessels when they were being created. The first changes were being carried on in the brain, as the first stream of golden liquid started arriving. Subsequently, this was followed by every other organ, every time the liquid circulated through the body, these organs underwent some changes. Although the changes were minuscule, they would be accumulating over time until his body was strong enough to be able to handle it when it was time for the activation of the golden liquid. But that was a matter for later. ..... Next morning. By the time Aron woke up, it was already morning. This meant that he had been asleep for more than 15 hours. But surprisingly, he didn't feel the heaviness one would be feeling after sleeping for such a long time. Contrary to that,