"Hahaha!"
Inside the rental house, Leo and Caleb were roaring with laughter, tears streaming down their faces.
Elliot couldn't help but curl his lips into a smile.
Heh heh, a famous scene!
"Elliot, did you record the screen?" Leo asked while laughing.
"Absolutely!" Elliot snapped his fingers.
"Send me a copy," Leo said impatiently, "I want to post it online and let more people appreciate Princess Chloe Belle's stunning beauty!"
Elliot gave an "OK" gesture, "I've already sent it to you."
After getting the video, Leo immediately uploaded it to TrendTok. Not only that, he also spent a hundred and fifty dollars on TrendTok Boost, which is paid promotion, to push this video to more people.
He wanted Chloe Belle to become "famous" across the entire network.
"Hey, she turned off the live stream," Caleb said, pointing at the screen.
Of course, she had to turn off the live stream. If she didn't, would she wait to be continuously mocked by the netizens?
<[System Notification]>
[Host has successfully completed the
At this moment, the
"Haha!"
Elliot was excited and was about to look at the
"Elliot, thank you so much today. I finally got that anger out," Leo was overjoyed, "Let's go, I'll treat you guys to a late-night snack to celebrate."
"Late-night snack..." Elliot originally wanted to study the
So, the three of them happily left the rental house to eat a late-night snack.
By the time Elliot returned to the dormitory, it was already past one in the morning.
"System!" Elliot called out the
The light screen appeared—
<[Elliot]>
{
[
...
The points increased a lot.
Just while eating the late-night snack, they increased from the initial 1200 points to 6000.
It must be the points brought by the Chloe Belle exposure incident.
With points, can I exchange for
But, how do I exchange?
As if sensing Elliot's thoughts, the
<[System Mall]>
[
...
It turned out that there was also a tool mall in the
Elliot clicked on the
<[System Mall: Tools]>
[
...
So many
He continued to click on
These two libraries contained countless virus codes and vulnerability information, many of which Elliot had never heard of.
What this meant was self-evident.
This was simply a huge treasure trove.
Finally, there was the
The more Elliot looked, the more excited he became. This
With it, he felt like he was about to take off.
Oh right, the
"Open the gift package."
<[System Notification]>
[Congratulations, Host. Reward:
The
A vulnerability, so-called, is a BUG that exists in computer software and hardware systems. Hackers can exploit these vulnerabilities to attack target systems.
In the
Elliot was curious and clicked with his finger.
<[CVE-2024-30078]>
{Type: Vulnerability | Danger Level: ★★★★}
[This vulnerability is related to the Android gateway driver and allows attackers to exploit this vulnerability to connect to the target's network and remotely execute code without any user interaction.
Note: Vulnerability danger level is divided from 1 star to 5 stars.]
This was a brand new Android gateway driver vulnerability that Elliot didn't know about.
Eighty percent of mobile phones worldwide, including laptops, have the Android system installed, which means that by exploiting this vulnerability, it is easy to invade eighty percent of mobile phones and laptops worldwide, unless the relevant vulnerability patches have been applied.
Is it that powerful?
Testing it will tell.
Next, Elliot first downloaded the vulnerability code and documentation to his computer.
After carefully reading the code document, Elliot typed on the keyboard and wrote a piece of code that exploited the
The code was integrated into a vulnerability scanning tool that Elliot wrote himself.
After that, he started scanning.
He directly scanned the WiFi network on the floor where he lived.
A few seconds later, the scan results came out:
<[Network Scan Results]>
[192.168.1.113 (
192.168.1.120 (
192.168.1.68 (
...
More than sixty IP addresses were scanned, each IP representing a terminal device, which could be a mobile phone or a laptop.
Without exception, every device had the
Including Elliot's own mobile phone and laptop, the vulnerability was also scanned.
Elliot randomly selected an IP terminal and ran the vulnerability invasion code he had just written.
One second, two seconds...
"Ding!"
A message popped up on the screen:
<[System Notification]>
[Invasion successful. Successfully connected to 192.168.1.120 terminal. Obtained
Wow!
It was successful!
Elliot couldn't help but exclaim, this vulnerability was too powerful.
Of course, with his skills, even without this vulnerability, he could still successfully invade, but it would be more troublesome. He would need to first crack the WiFi router password, then enter a mobile phone, and also implant a Trojan... Not to mention anything else, just cracking the router password was full of difficulties, and sometimes it even depended on luck.
He remembered that one time he spent a whole week cracking the password of an internet cafe router.
It was nothing like the current ease and comfort, it was simply effortless.
Therefore, vulnerabilities are the sharpest weapon of
Elliot typed a few times on the keyboard, and a window immediately popped up on the screen, displaying the desktop of the 192.168.1.120 terminal.
Heh heh, this laptop was playing steamy adult action movies from the Crescent Isles.
Elliot did not disturb this gentleman's enjoyment and exited the system.
He was just testing the effect of the vulnerability and didn't really want to peek at other people's privacy.
This test gave him a deeper understanding of the vulnerability rewarded by the
If he had this vulnerability when he exposed Chloe Belle before, it wouldn't have been so troublesome. When she was live streaming, he could have directly scanned her mobile phone's IP address and then used the Android system-level vulnerability to easily invade her mobile phone without anyone knowing.
In contrast, the method of implanting a Trojan was more risky, easy to leave traces, and had a higher probability of being discovered.
Of course, Chloe Belle herself didn't understand technology, so she didn't notice, but if it were a network security expert, it would be easy to find problems.
And the
This shows how great the value of an unknown vulnerability is.
And in the
Thinking of this, Elliot couldn't help but feel a surge of excitement.
If he could exchange all these vulnerabilities, wouldn't he be able to roam freely in the network world.
(End of this chapter)
*-*-*-*-*-*-*-*-*-*-*-*-*
Translator and Editor - Husband
*-*-*-*-*-*-*-*-*-*-*-*-*
