The hack: Chapter 2 (Trent)
'Shit, I forgot to close the Protonmail window' I said to myself. 'Well we're screwed' Sine exclaimed. 'No shit we're screwed' said Scient. 'Hold on maybe he might be joking?' said Felix. 'You should listen to yourself'...
The hack: chapter 1( Aron)
Chapter 1 (Aron) "Shit, we're screwed," I said as me and Trent was staring at the screen on the school's computer. The screen said a few words that had a simple message that would almost guarantee us either being locked up or...
Chapter 7: Large Transaction (final)
"Is the femtocell ready?" Jake asked. "The femtocell is ready, but we need to make sure she makes a transaction though" Mike said. "They should be making one soon, I will be meeting her to make sure that...
How the Sofurry Christmas Exploit Works
**Http requests** Http stands for HyperText Transfer Protocol, it requests a website for a page like say [https://www.sofurry.com](https://www.sofurry.com) requests for Sofurry's home page and...
Chapter 6: The DOS incident
Four months after the hack of Furon... "Jane! Wait up" Kit shouted. "You can knock down a door and yet you can't keep up with me?" Jane said. "I had to answer a call, besides Trent and Aron are...
Chapter 5: Which deal?
Chris arrived home and sprinted towards his bedroom and opened the door to find a badger smoking in his room. "Hello Chris, I've been expecting you" The badger said. "Who are you? And why are you in my room?" Chris asked the...
Chapter 4: new tactics
Chris watched the video and didn't notice anything wrong about it, until he found that there was a small gap in the sleeve which revealed some white fur and from the looks of the video, a black stripe similar to Mike's arm. Chris began to...
Mike Jun Mah
Profile: Mike Jun Mah Skillset: Bluetooth hacking, high level Social Engineering, java coding, android rooting, recon Birthyear:2005 Height: 5 6" Sextuality: gay Species: White Tiger Danger level: Unknown. There is next to no information on...
Christopher Cailin Biton
Profile: Christopher Cailin Biton Skillset: Metasploit framework use, Android rooting and spyware, rootkit coding, remote access tools, sleight of hand, malware coding, cryptography, python coding, c coding, java coding, and vast...
Chapter 3: Introductions
"So are you just going to stand there? Or are you going to take a seat" Kit asked Chris. "Um, I'll take a seat" Chris said as he took a seat beside a small table in the dark room, realising that he was a lot shorter than most of them...
Chapter 2: the 8200's
"What's the forenstics report on the raspberry pi?" Grace asked Evan, a hyena at 6 2" wearing glasses who was their computer forenstics expert that was probing the raspberry pi on his desk. "There are no paw prints of any...
Chapter 1: A new threat
6 months after the hack of Furon... "Are you sure about this?" William asked from the ground. "I'm sure about it, and if I fall then Trent gets all of my stuff" Kit replied. "She's fine" Trent replied. ...