Cherreads

Chapter 6 - Chapter 6: Hacking skills

With a few keystrokes, he opened the terminal and inserted his bootable USB. 

The ISO file (installer) was around 3 GB in size. To create a bootable USB, he used a tool called Rufus on Windows to turn the ISO into a bootable USB stick.

His USB drive had a capacity of 16 GB, so it was more than enough.

After preparing the drive, he booted Kali Linux by plugging the USB into the laptop, restarting the system, opening the boot menu, and selecting the USB drive as the boot source.

The Kali then began to load without installing itself on the hard drive.

The screen flickered as he rebooted the system, bypassing Windows. A dark interface appeared, loading Kali Linux, a system designed for cybersecurity and ethical hacking.

Now, he could access all its built-in tools like airmon-ng, airodump-ng, and others without installing anything permanently on the laptop.

He had downloaded the ISO back when he was creating his version of Minecraft at the computer shop, thinking it might be useful someday.

He hadn't expected that day to come so soon.

"Let's test just how godly I really am," Jeff muttered as he cracked his fingers.

The reason why he chooses Kali Linux is because it's a free open-source OS used for penetration testing, ethical hacking, and cybersecurity.

Then a black and green terminal greeted him as he started his work.

{Note for readers: This is for fictional/educational purposes only.}

...

Bash

{Editsudo airmon-ng start wlan0 sudo airodump-ng wlan0mon}

...

[Authors Note :Bash, or the Bourne-Again Shell, is a widely used command interpreter for the Linux operating system. It's a powerful tool that acts as a command-line interface, allowing users to directly instruct the operating system through written commands. Bash is known for its efficiency in automating tasks, scripting, and job control.]

Lines of code began streaming down the screen, listing nearby Wi-Fi networks. As one stood out immediately.

ConvergeHome_F892

"Bingo." He then copied the BSSID and locked in on the frequency.

He saw its BSSID (router MAC address) and channel (the radio frequency it's using).

...

Bash

{Editsudo airodump-ng --bssid A4:21:8C:9D:3F:22 -c 6 -w jeffhack wlan0mon}

...

The command uses --bssid to specify the target Wi-Fi router, -c to indicate the channel number obtained from the scan, and -w to write the output to a file named jeffhack.cap.

A soft hum from the laptop's fan grew louder as the scan began targeting the nearby network.

Still, he needed a handshake at the crucial moment when a device connects to the Wi-Fi, allowing him to capture authentication data.

But instead of waiting, he had a better idea which is to force it.

"Sorry, neighbor." Jeff muttered coldly like it was war.

It's a neighbor, since his boarding house is close to the Wifi he wants to hack.

He launched a deauthentication attack, sending silent disconnect signals to one of the devices on the network.

...

bash

{Editsudo aireplay-ng --deauth 10 -a A4:21:8C:9D:3F:22 wlan0mon}

...

This line of code sends 10 fake disconnect signals to the router.

Almost instantly, the device reconnected, and Kali captured the handshake like a hunter snaring the prey.

"Finally Got You," Jeff mumbled, feeling in awe on how fast he did this.

With the encrypted data in hand, he pulled out his personal script. It was something he wrote just a minute ago.

It was a hybrid brute-forcer, designed to combine common Filipino passwords, number patterns, and typical Wi-Fi naming conventions.

He was a total demon since creating a personal script like that would normally take days or even weeks for most people, but for him, it only took minutes.

He then fed the handshake file into it.

"Let's see… converge2023, mywifi0917, fibernet1123…" he then tried some.

The guesses rolled by.

Then suddenly...

[ Password Found: 0917converge ]

A flicker of satisfaction crossed Jeff's face. He reloaded into Windows, typed in the password manually, and connected.

[Connected. Secured. Internet Access]

"No subscription. No load. No wonder being a programmer is the best path. You can literally access anything in the digital world," Jeff said, feeling amused.

After that, he downloaded Visual Studio, Python, and Code::Blocks for C++. He was already an all-rounder, so he was very much ready to tackle any kind of project.

Visual Studio for his web-based systems that would soon host his games, tools, and maybe even his own AI services.

Python for scripts, automation, and AI-related work.

Code::Blocks for when he wanted a lightweight, no-nonsense C++ IDE. 

He set everything up because, in his mind, the more tools the better. He had already planned everything ahead, the only thing left now was finding a way to earn some money.

He had about 2,500 pesos remaining in his account, just enough to finally buy an extra pair of pants for his school uniform.

He was currently a junior high school student and had been dealing with financial struggles for years.

He owned only one pair of school pants and two uniforms, one white and the other pink.

The pants had been worn repeatedly for over five months, and the color had already faded significantly.

Now that he had the skills, the only obstacle left was money. So he can buy it and does not need to worry about losing money.

He searched for freelancing opportunities on Google and was pleasantly surprised by how fast the internet wifi than using hotspot.

Wasting no time, he created an account, carefully choosing a name for his freelancing profile.

Razon

After that, he used the filter on the website and selected the programming field, setting the payment range from 5 to 30 USD.

A list of available jobs appeared before him. One task stood out as particularly simple, so he decided to accept it without hesitation.

Work: Help Me Fix A Bug

Payment: 15$

Contact me here: Ginago@Gmail.com

...

He saw that the job had only been uploaded recently, so he contacted the client using his Gmail account.

He briefly wondered why the poster had chosen to use email instead of a messaging app like Messenger or WhatsApp.

But since he was just looking for work, he decided not to overthink it and focused on his goal. After typing his message carefully, he clicked send.

Far away, in another part of the world, it was already nighttime.

Inside a dimly lit room, a man was about to stand up to make some coffee when his laptop chimed with a new email notification.

But he stopped as soon as he heard the notification. Opening his Gmail and seeing that there was a new message, he clicked on it and began to read.

Razon: I'm up for the job. Can you give me the details?

Seeing the message, the guy who looked to be around 18 years old, sat back down in his chair and began typing a response.

Client: Do you have a portfolio?

He asked knowing he couldn't just trust a random stranger without understanding who they were. After all, this was his project, and it needed to be submitted by tomorrow.

Razon: I'm sorry, I don't have a portfolio, but I know how to code. So why don't you send me your code, and I'll fix it? If I can't, then you don't need to pay me.

Seeing this, the client thought it made sense. After all, the project wasn't a large one or something that involved a lot of money, so he agreed.

Client: Alright then. If you finish fixing the code, send me the result, and I'll pay you.

Jeff, reading the message, felt a surge of excitement. He was confident in his abilities, especially with his skill, Godly Programming.

Just then, another message came in from the client.

Client: Here, I attached the zipped project file. The bug's in the contact form it reloads the page instead of submitting the info. I included a screenshot of the error and a short README to run it. Let me know if anything's unclear.

More Chapters