The hack: Chapter 2 (Trent)

'Shit, I forgot to close the Protonmail window' I said to myself. 'Well we're screwed' Sine exclaimed. 'No shit we're screwed' said Scient. 'Hold on maybe he might be joking?' said Felix. 'You should listen to yourself'...

, , , , ,

The hack: chapter 1( Aron)

Chapter 1 (Aron) "Shit, we're screwed," I said as me and Trent was staring at the screen on the school's computer. The screen said a few words that had a simple message that would almost guarantee us either being locked up or...

, , , ,

Chapter 7: Large Transaction (final)

"Is the femtocell ready?" Jake asked. "The femtocell is ready, but we need to make sure she makes a transaction though" Mike said. "They should be making one soon, I will be meeting her to make sure that...

, , , ,

How the Sofurry Christmas Exploit Works

**Http requests** Http stands for HyperText Transfer Protocol, it requests a website for a page like say [https://www.sofurry.com](https://www.sofurry.com) requests for Sofurry's home page and...

,

Chapter 6: The DOS incident

Four months after the hack of Furon... "Jane! Wait up" Kit shouted. "You can knock down a door and yet you can't keep up with me?" Jane said. "I had to answer a call, besides Trent and Aron are...

, , , , ,

Chapter 5: Which deal?

Chris arrived home and sprinted towards his bedroom and opened the door to find a badger smoking in his room. "Hello Chris, I've been expecting you" The badger said. "Who are you? And why are you in my room?" Chris asked the...

, , , , ,

Chapter 4: new tactics

Chris watched the video and didn't notice anything wrong about it, until he found that there was a small gap in the sleeve which revealed some white fur and from the looks of the video, a black stripe similar to Mike's arm. Chris began to...

, , , , ,

Mike Jun Mah

Profile: Mike Jun Mah Skillset: Bluetooth hacking, high level Social Engineering, java coding, android rooting, recon Birthyear:2005 Height: 5 6" Sextuality: gay Species: White Tiger Danger level: Unknown. There is next to no information on...

,

Christopher Cailin Biton

Profile: Christopher Cailin Biton Skillset: Metasploit framework use, Android rooting and spyware, rootkit coding, remote access tools, sleight of hand, malware coding, cryptography, python coding, c coding, java coding, and vast...

,

Chapter 3: Introductions

"So are you just going to stand there? Or are you going to take a seat" Kit asked Chris. "Um, I'll take a seat" Chris said as he took a seat beside a small table in the dark room, realising that he was a lot shorter than most of them...

, , , , ,

Chapter 2: the 8200's

"What's the forenstics report on the raspberry pi?" Grace asked Evan, a hyena at 6 2" wearing glasses who was their computer forenstics expert that was probing the raspberry pi on his desk. "There are no paw prints of any...

, , , , ,

Chapter 1: A new threat

6 months after the hack of Furon... "Are you sure about this?" William asked from the ground. "I'm sure about it, and if I fall then Trent gets all of my stuff" Kit replied. "She's fine" Trent replied. ...

, , , , ,