System, how many points do I have now?
[ 225 points ]
Open the store, it's time to go shopping.
[ Store opened ]
[ Categories: Technology
Theorems
Weapons
Martial Arts
Cultivation Manuals ]
Hmm, I don't want to open each category and find what I can buy. System, show me what I can buy with my points. Make a list from the most expensive to the cheapest.
[ 6 items available ]
Oh, shit, I'm that poor? Let me take a look.
[ Concentration pills x10: 50 points ]
[ Proof of the Pascal triangle problem: 90 points ]
[ The burning point: 150 points ]
[ Laser gun: 180 points ]
[ Baby AI: 200 points ]
[ The assassin: 210 points ]
I didn't know that concentration pills were so expensive. Hmm, if I buy the proof of this theorem, I can write my thesis on it and complete the mission.
[ You can't write a thesis on something you don't understand ]
Unauthorized duplication: this narrative has been taken without consent. Report sightings.
That's true, and it's not worth wasting my first real purchase on it. The burning point reminds me of One Piece, peace to your soul Ace.
[ He doesn't have a soul ]
Stop ruining the mood, you emotionless system! Laser gun, it's true that it's quite interesting, but I don't think it will be useful to me right now. Hmm, what is baby AI?
[ Name: Baby AI
Category: Technology
Description: An AI program, not yet developed. It is like a baby who is just starting to learn things.
Price: 200 points ]
Interesting, I think I'm going to buy this. It could help me in my future research. I'll check out the last item first, don't tell me I can summon a real assassin.
[ Name: The Assassin
Category: Technology
Description: A real assassin can sneak into any place. This program can sneak into any system and find vulnerabilities.
Price: 210 points ]
Holy shit, you mean I can access any system, any website? Holy shit, I will be the best hacker in the world. I'm buying it.
[ Do you confirm that you want to buy the assassin? ]
YES! Hurry up.
[ Purchase confirmed ]
[ Congratulations to the host for purchasing the assassin ]
[ Points remaining: 15 ]
After the system's announcement, a USB drive appeared in my hand as if by magic. Holy shit, are you serious!? I looked left and right. Luckily, no one saw us. The library was pretty empty. I plugged the USB drive into the computer, the program was installed, and the USB drive disappeared. After what I saw after my death, the other from the higher dimension, the system, this kind of thing can't shock me.
Wait a second, I bought this because I was so excited. Holy shit, I've watched too many hacker movies. What do I do now!?
[ Idiot ]
Shut up!!
According to what I know, there are different types of hackers. Ethical hackers, also known as white hats are computer security experts who use their skills to protect systems and networks. On the other hand, malicious hackers, or "black hats seek to exploit vulnerabilities for financial gain or illicit activities. In between, there are grey hat hackers, who can reveal vulnerabilities without authorization in exchange for rewards.
Hmm, for now I need money. So the first thing to do is to find a site that I can target. After finding the vulnerabilities, I can sell them to them if they give me a good price, otherwise I can sell them to someone else.
I have to test it first, my dear university, you will be my guinea pig.
After making my decision, I started working. In a country as underdeveloped as mine, the security of the systems is not great. So after only a few hours, I was already reading the report that the program wrote me.
Now that I know how it works, it's time to make some money.