Chapter Content Processor
Switch Mode

Join Our Discord Server!

Welcome to our community! We are thrilled to have you with us and always aim to provide the best experience. To stay connected and be part of our vibrant discussions, we invite you to join our Discord server.

Click on Join Now to become a part of our awesome community!

Chapter 4 This item is at the island of art film (Ch 4)

Chapter 4 This item is at the island of art film

Access Limited

Please complete verification to view this content.

“Hahaha!”

Inside the rental house, Gao Meng and Monkey were laughing so hard that tears were streaming down their cheeks.

Su Yang couldn’t help but curl up the corner of his mouth into a smile.

Hehe, what a famous scene!

“Lao Su, did you record the screen?” Gao Meng asked with a smile.

“Must!” Su Yang snapped his fingers.

“Send me a copy.” Gao Meng said impatiently, “I’m going to post it online so that more people can appreciate Her Highness Qiao Biluo’s stunning beauty!”

Su Yang made an “OK” gesture and said, “I’ve sent it to you.”

After Gao Meng got the video, he immediately uploaded it to Douyin. Not only that, he also recharged 1,000 yuan on Douyin Plus, which is paid promotion, and pushed the video to more people.

He wants to make Qiao Biluo famous all over the Internet.

“Hey, she turned off the live broadcast.” Monkey said, pointing at the screen.

Of course the live broadcast has to be turned off. If not, are you waiting to be ridiculed by netizens?

“The host completes the hacking mission for the first time, and is rewarded with a gift package.”

At this moment, the mechanical voice of the system sounded in Su Yang’s mind.

“Ha ha!”

Su Yang was excited and was about to check what gift package was rewarded on the system interface, but was interrupted by Gao Meng.

“Old Su, thank you so much for today. I finally got rid of my anger.” Gao Meng was overjoyed. “Come on, I’ll treat you guys to a midnight snack to celebrate.”

“Midnight snack…” Su Yang originally wanted to study the system… No rush, have a midnight snack first, it won’t be too late to study it when he comes back.

So the three of them walked out of the rental house and happily went out for a midnight snack.

When Su Yang returned to the dormitory, it was already past one in the morning.

“System!” Su Yang called out the system.

The light curtain emerges——

Name: Su Yang

Hacker ID: LittleBoy(LittleBoy)

Hacker Toolbox: [Glacier Trojan] [Gift Pack]

Popularity points: 6000

The points have increased a lot.

Just by having a midnight snack for a while, my points increased from the initial 1,200 to 6,000.

I guess it’s the points brought by Qiao Biluo’s exposure incident.

With points, you can redeem hacking tools, right?

But, how to redeem it?

As if sensing Su Yang’s thoughts, the system interface refreshed and an item exchange mall popped up:

【tool】

【Virus Database】

【Vulnerability Library】

【knowledge base】

It turns out that there is also a prop mall in the system.

Su Yang clicked on the [Tools] column and saw a dazzling array of various hacker tools:

Ghost Trojan, points 150000

Shield Encryption, Points 200,000

Unzip King, 200,000 points

Su Yang was dazzled by so many hacking tools.

Continue to click [Virus Database] and [Vulnerability Database].

These two libraries contain a large amount of virus codes and vulnerability information, many of which Su Yang has never heard of.

What this means is self-evident.

This is simply a huge treasure.

Finally, there is the [Knowledge Base], which contains all theoretical knowledge and algorithms related to hacking technology and artificial intelligence.

The more Su Yang looked at it, the more excited he became. This system was simply too amazing.

With it, I feel like I’m about to take off.

By the way, the system rewarded a gift package before… Oh, Su Yang saw that there was an extra gift package in the tool column.

“Open the gift package.”

“Congratulations to the host, reward: CVE-2024-30078 vulnerability”

There was a loophole in the gift package.

The so-called vulnerability is the bug that exists in the computer software and hardware system. Hackers can attack the target system by exploiting these vulnerabilities.

In the hacker world, vulnerabilities mean money. A new vulnerability can be sold for hundreds of thousands or even tens of millions of dollars on the dark web.

Su Yang clicked with his fingers out of curiosity.

“Vulnerability ID CVE-2024-30078

Danger level: ★★★★ (the vulnerability danger level is divided into 1 star to 5 stars)

This vulnerability is related to the Android gateway driver and could allow an attacker to connect to the target’s network and remotely execute code without any user interaction.”

This is a brand new Android gateway driver vulnerability that Su Yang is unaware of.

80% of the world’s mobile phones, including laptops, are installed with the Android system, which means that this vulnerability can be exploited to easily invade 80% of the world’s mobile phones and laptops, unless the relevant vulnerability patches are installed.

Is it that awesome?

Just test it and you will know.

Next, Su Yang downloaded the vulnerability code and instruction document to his computer.

After carefully reading the code document, Su Yang tapped away on the keyboard and wrote a piece of code to exploit the CVE-2024-30078 vulnerability for intrusion.

The code was concentrated in a vulnerability scanning tool written by Su Yang himself.

When you are done, start scanning.

Directly scan the WiFi network on your floor.

After a few seconds, the scan results came out:

192.168.1.113 (vulnerability found)

192.168.1.120 (vulnerability found)

192.168.1.68 (vulnerability found)

More than sixty IP addresses were scanned, each of which represents a terminal device, which could be a mobile phone or a laptop.

Without exception, every device has the CVE-2024-30078 vulnerability.

The vulnerability was also scanned out by Su Yang’s own mobile phone and laptop.

Su Yang randomly selected an IP terminal and ran the vulnerability intrusion code he had just written.

One second, two seconds…

“bite!”

A message popped up on the screen: “Intrusion successful, successfully connected to the 192.168.1.120 terminal, obtained system administrator privileges.”

Wow!

That’s a success!

Su Yang couldn’t help but sigh, this loophole is too powerful.

Of course, with his skills, he could have successfully hacked into the device even without this vulnerability, but it would be more troublesome. He would need to crack the password of the WiFi router first, then enter a mobile phone, and implant a Trojan horse… Not to mention other things, just cracking the router password is difficult, and sometimes it depends on luck.

He remembered that it took him a whole week to crack the password of an Internet cafe router.

It was not as relaxing and comfortable as it is now, and it was effortless.

Therefore, vulnerabilities are hackers’ sharpest weapons.

Su Yang tapped the keyboard a few times, and a window immediately popped up on the screen, showing the desktop of the 192.168.1.120 terminal.

Haha, this laptop is playing an island love action movie.

Su Yang did not disturb this gentleman’s interest and exited the system.

He was just testing the effectiveness of the loophole and didn’t really want to pry into other people’s privacy.

This test gave him a deeper understanding of the loopholes in the system rewards, which were indeed extremely powerful.

He had previously exposed Qiao Biluo. If there was this loophole, there would not be so much trouble. When she was live streaming, he could directly scan the mobile phone IP address, and then use the Android system-level vulnerability to easily invade her mobile phone without anyone noticing.

In comparison, the method of implanting Trojans is more risky, as it is easy to leave traces and the probability of being discovered is also higher.

Of course, Qiao Biluo herself doesn’t understand technology, so she didn’t notice it, but if she were replaced by a network security expert, the problem would be easily discovered.

The CVE-2024-30078 vulnerability is a new and unknown vulnerability that is difficult to detect even for top hackers.

This shows how valuable an unknown vulnerability is.

There are tens of thousands of such unknown vulnerabilities in the system’s vulnerability database.

Thinking of this, Su Yang couldn’t help but feel excited.

If he could exploit all these loopholes, he would be able to roam freely in the world of the Internet.


<
Hacker: Turn off beauty mode for female anchors during live broadcast

Hacker: Turn off beauty mode for female anchors during live broadcast

Status: Ongoing Type: Native Language: 黑客:直播关闭女主播美颜
(Hacking + Live Broadcast) On this day, Su Yang had an idea of ​​a god-level hacking system, where points could be exchanged for various hacking tools. Then, Su Yang put on a mask and a hood to play the role of a mysterious hacker and started a live broadcast:     10,000 netizens were online, and he connected to a beautiful anchor live, but turned off her beauty filter.     100,000 netizens witnessed him hacking into the wedding of a netizen's ex-girlfriend and exposing the black material of a gold digger.    1 million netizens witnessed him exposing the hypocritical mask of public intellectuals.      He was interested, so he started a live broadcast to catch a spy to liven up the fun for netizens.  

Comment

Leave a Reply

Options

not work with dark mode
Reset

Verification Required

You have exceeded the allowed limit of chapters. Please complete verification: