The hack: Chapter 2 (Trent)

'step 2: code the malware and prepare the attack. as of now the malware's encryption code, encryption key code and protonmail message is done, the code is now being wrapped with the gui or graphical user interface.

, , , , ,

The hack: Chapter 11 (Trent)

I went into the tower and took out an adapter to connect the phone to my flash drive and install the malware.

, , , , , ,

The hack: Chapter 10 (Trent)

I went into the tower and took out an adapter to connect the phone to my flash drive and install the malware.

, , , , , ,

The hack: Chapter 11 (Trent)

I went into the tower and took out an adapter to connect the phone to my flash drive and install the malware.

, , , , , ,

Chapter 2: Warning

"now launch the malware," kit said as trent unloaded the malware and activated it to make sure they have admin access to their servers without them even realising it.

, , , ,

The hack: Chapter 3 (Aron)

"i've told the rest of tsociety to launch the ddos attacks to render the server useless while the malware is spreading, by the time they are finished with the ddos attack the malware would already be done" he said while driving off to a

, , , , , ,

Christopher Cailin Biton

#8 of tsociety profile database profile: christopher cailin biton skillset: metasploit framework use, android rooting and spyware, rootkit coding, remote access tools, sleight of hand, malware coding, cryptography, python coding, c coding, java coding, and

,

The hack: Chapter 10 (Kit)

"sigh, screw it, i'm just going to use an online template" i said and looked online to get a template for coding malware and started to code the malware following a template on a website.

, , ,

Chapter 4: Sudo

After typing in the command, he was able to gain full root access without the needed password and began to test the malware that he modified from ghost code.

, , , ,

Research Log [#010]

Henro delivered a briefing stating that this was happening due to a malware infection, but every time anyone has conducted a post-mortem evaluation there has been no trace of any kind of malware! there is something seriously wrong happening here.

, , , , ,

Chapter 3: To erase

"is the malware ready yet?" arron asked. "almost, i just need to convert it to an executable with pyinstaller," trent said as he booted into debian which was what the servers would most likely run.

, , , ,

P.O.D.S Manual

Support: healing and buffing their allies is their bread and butter, and even though they are the weakest when it comes to direct combat, their virus/malware extermination abilities are above all the others.

, ,