Cherreads

Chapter 41 - Chapter 41 - Pretending to be a Beautiful Woman Online, Using a Little Bit of Honey Trap

Now, what Elliot needed to consider was how to infiltrate a military armed helicopter.

First, let's see if there's anything good in the .

Thinking this, Elliot opened the and entered the search keywords: "UH-1Y 'Venom' Utility Helicopter."

"Searching..."

Two seconds later, the search results appeared:

[UH-1Y 'Venom' Utility Helicopter, manufactured by Bell Company.

Autonomic Logistics Information System (ALIS) , redeem for 5 million points.

Joint Reprogramming Enterprise (JRE) , redeem for 5 million points.

Network Control System Module , redeem for 5 million points.

FLIR Reconnaissance System Module , redeem for 5 million points.]

...

Elliot's spirits immediately lifted.

The had actually found over a hundred vulnerabilities for the UH-1Y helicopter.

"A military helicopter actually has so many vulnerabilities?" Elliot muttered, somewhat surprised.

However, upon closer thought, it wasn't strange.

He had once seen someone selling the source code for an F-15 fighter jet on the dark web, which contained over 40 million lines of code.

The complexity of a multi-purpose armed helicopter was no less than that of a fighter jet, and its code volume was estimated to be tens of millions of lines. With so much code, vulnerabilities were a very normal occurrence.

And as long as there were vulnerabilities, there was a possibility of intrusion.

"Beep beep!"

At this moment, a message notification sounded in the Crimson Hacker Base group.

Elliot tapped it, opening the Crimson Hacker Base chat group.

The group was bustling, with various messages flooding the screen.

Over the past week, members of the Crimson Hacker Base had gathered a large amount of intelligence regarding Yamato's exercise, some of which Elliot himself hadn't collected.

"Hello, Joker, I'm Brother Yuan from the Crimson Hacker Base. I invite you to join the internal group: 1256879****."

A private message caught Elliot's attention.

Brother Yuan, this name was not unfamiliar to Elliot.

Brother Yuan was a senior administrator of the Crimson Hacker Base, with very high technical skills.

He entered the group number and applied to join.

A few seconds later, the application was approved, and Elliot entered an internal group of the Crimson Hacker Base.

There were only 268 members in this group, undoubtedly all elites of the Crimson Hacker Base.

"Welcome, Joker!"

"Welcome, big shot!"

"It's actually 'Joker' big shot! I've used the scanning tool you wrote, it's very useful, and I'm still using it now!"

As soon as he entered the group, someone recognized Elliot.

Elliot had previously published a very practical scanning tool on the Crimson Hacker Base website, which was deeply loved by some . Therefore, his ID "Joker" also had a bit of fame in the Crimson Hacker Base.

"I'm a newcomer, please take care of me," Elliot said modestly.

He carefully observed the chat content in the group.

The members in the group were all sharing intelligence they had collected about Yamato's exercise, some of which was obtained through special channels and was very valuable.

Someone also shared vulnerabilities and backdoors of major Yamato mainstream websites. This information was equally useful to Elliot.

Elliot also shared an "overflow vulnerability" he discovered on the official website of the Yamato Coast Guard with the group members.

Next, Elliot monitored the information in the group while simultaneously redeeming the "ALIS vulnerability" from the .

ALIS, short for Autonomic Logistics Information System, is a technical service system provided by Bell Company for the "Venom" helicopter. It can track the helicopter's flight data, radar information, and other data in real-time, and send it to the pilot, helping the pilot understand combat indicators, location information, and formulate attack strategies.

can attack the ALIS system to provide incorrect data to pilots, thereby disrupting their actions. In severe cases, it can even lead to crashes and casualties.

Redeeming this vulnerability cost Elliot 5 million points.

Fortunately, he had accumulated a total of 6 million from several live streams over the past week, which was enough to redeem it.

Okay, the attack tool is ready.

Elliot only needed to find a way to implant this intrusion tool into Bell Company's database center.

This was not an easy task.

Bell is a military company, and the network security level of its server database center is very high. It goes without saying that the difficulty of intrusion would be very great.

No rush, let's plan carefully first.

Elliot continued to gather all useful information in the group and online, focusing on intelligence about Bell Company.

The calendar pages turned.

Another two days passed in a flash.

On this day, night fell in the Federation, while it was daytime in the United Federation, across the Pacific Ocean.

Bell Company's headquarters building is located in Fort Worth, Texas, United Federation.

Eight in the morning.

A black Chevrolet sedan slowly approached the building's entrance.

At the entrance, a security guard wearing sunglasses, with his hand on his gun, vigilantly watched the passing vehicles.

The Chevrolet sedan stopped at the entrance, the window slowly lowered, and a blonde, blue-eyed white man leaned out, showing his work ID to the security guard—

[Name: James

Position: Senior Engineer]

"Beep!"

The security guard scanned the work ID with a device. After confirming it was correct, the barrier slowly rose, and the Chevrolet sedan drove into the company compound.

A few minutes later, James, dressed in a white anti-static suit, appeared in front of a server room door.

He aimed his eyes at the scanner by the door for retinal verification.

"Verification passed."

The door opened automatically, and James walked in.

In the server room, rows of large servers emitted a low hum, and indicator lights flickered incessantly, like tireless behemoths silently processing massive amounts of data.

This was Bell Company's global data center, storing the company's helicopter technical data and customer information sold worldwide.

James surveyed the server room, then walked directly to an office located deep within the room.

He entered the office, took off his anti-static suit, walked to his desk and sat down, and made himself a cup of coffee.

He opened his computer, and while waiting for it to boot up, he pulled out a USB drive from his pocket and plugged it into the computer.

After entering a long string of complex passwords, the computer desktop appeared.

James skillfully opened a monitoring program.

This program could monitor the operating status of all servers in the server room in real-time, and would immediately issue an alarm if any abnormality occurred.

"Beep beep!"

At this moment, James's phone vibrated.

He took out his phone and saw a message from a beautiful woman:

"Hi, hottie!"

James's lips curved slightly upwards, and he replied with, "Beautiful lady."

"*Kiss emoji*" The beautiful woman sent a flying kiss emoji.

"*Muscle emoji*" James also sent a photo of his muscles, showing off his strength to the beautiful woman.

The camera switched to the Federation, thousands of miles away.

Elliot sat in front of his computer, typing on the keyboard: "Darling, I love your blonde hair. [Heart emoji]."

That's right, the "beautiful woman" chatting with James was none other than Elliot.

Two days ago, Elliot had hacked into James's phone and discovered that he often chatted up beautiful women on a social app called "Whats." So, Elliot disguised himself as a sexy and hot beautiful woman and proactively contacted him.

As the saying goes, even heroes fall for beauty.

Faced with Elliot's "honey trap," James quickly succumbed. In less than two days, the two were chatting heatedly online, like a couple in love.

(End of this chapter)

*-*-*-*-*-*-*-*-*-*-*-*-*

Translator and Editor - Husband

*-*-*-*-*-*-*-*-*-*-*-*-*

More Chapters