Benalu's Son-in-law Turns Out to be a Genius Hacker

Benalu's Son-in-law Turns Out to be a Genius Hacker
Chapters 16. Learning to be a programmer



“I can't believe!” Stefan's stunned.


“Oath, for God's sake, I didn't lie.”


“Why don't you work there with your dad?”


“In addition not allowed by my father, I also only want to work in Indonesia.”


“Your father lives in Jakarta, why did you even live in Palembang and work in a small private company?”


Grace gave a pretty sharp look. “I want to find a new experience. Why do so many people go to Java, especially Jakarta? Anti-mainstream. I want to find my luck here.”


Stefan's playing his phone. “Chat me and your father haven't erased. If I offer myself back with your name, is there any chance I will be accepted?”


“I can't be sure, Stefan. But I'll try to help later. I'll tell my dad that you deserve to work there. If accepted, what about your family business?”


Stefan leaned his back against the wall. “Entahlah. My brain feels like it's going to break when I think of household.”


\=\=\=>>>∆<<<\=\=\=


That night, Stefan called Grandpa Sanjaya by phone. After knowing the story of Stefan's affair, what was the response from Grandpa Sanjaya? Will he hate Stefan and support Bobby and his family?


Stefan ketar-ketir. If Grandpa Sanjaya is angry with him, it's his life. Who else will he be able to rely on? Who else would care about him in domestic affairs?


Stefan continues to convince Grandpa Sanjaya that he is not having an affair with Grace. “Grandfather, trust me, where might I do it.”


“Because Grandpa wasn't there, so Grandpa couldn't judge and decide. Why did you become ojol?”


“Temporary work before working at PT Sanjaya Sawit, Grandpa.”


“You don't deserve to work like that, Stefan. It's a pity, why did you get such a bad report from your father-in-law? Though soon you will work, then become an official in the company.”


Stefan kept strengthening himself. If he spoke openly about their mistreatment, what would solve the problem? Even later it could be Bobby will make a new essay story that is much worse, the edges will make things worse. Stefan was still trying to hide the pain in his heart.


The story about him leaving the house, the reason he wanted to calm down, without explaining the real problem. Sanjaya's grandfather still holds pity and trust in Stefan to this day.


\=\=\=>>>0<<<\=\=\=


John wants to learn programming and ethical hacking from Stefan. Especially today he will take a day off in order to draw knowledge from the master. There is still a desire from him to become a programmer. So he had to borrow his cousin's laptop and was taken to Stefan's boarding house.


In the next few weeks Stefan will teach you the ins and outs of anything cyber-related, from basic programs like John the ripper, Nikto, Acunetix, Wireshark, Social Enginer toolkit, to more, then programs such as Hackcode, lucky patcher, ettercap, termux and so on.


Stefan teaches hacking techniques commonly used for application penetration, such as: SQL Injection, Cross Site Scripting (XSS), Denial of Service (DoS/DdoS), Remote Code Execution (RCE), etc, Cross-site request forgery (CSRF or XSRF).


“You must patiently learn it, John. Relax, I will teach from the easiest thing.”


“Wah, the original has started to lighten my head. Sori if I can't absorb it all.” John knitted his two eyebrows while shaking his head.


“You must master C,C++ and Java. The process of converting a high-level written code into a low-level language without changing the original program is called reverse engineering.”


For days Stefan taught hacking techniques used to tap and take over systems over networks, such as: DDoS, MiTM, Sniffing, Spoofing, and Worm. Then, the technique of user hack or social engineering.


Stefan said, “Social Engineering can be used in influencing and mastering the minds of others. If you are good at talking, it is certainly not difficult to seduce others to submit to you.”


Stefan teaches Phishing, Whalling, Self XSS, Reverse Social Engineering, Piggy back Riding, Vishing, and Scamming techniques. Although so complicated, John received a lesson from Stefan felt easier because Stefan taught with calm and without being patronizing.


“What are the steps taken to do hacking?” john asked while busy paying attention to the foreign codes on the laptop.


“First, you must know the target and destination, what in terms of network infrastructure, physical, or applications and the like. Second, you must know the target's weakness. Rest assured that no system is one hundred percent safe and you will make it through.”


Stefan continued, thirdly, the collection of needed detailed information. This information is essential for the fourth stage of pentesting to find loopholes or vulnerabilities that will be exploited as a way into the system.


A hacker will usually create a small application designed to carry a payload containing a backdoor. The payload will be infiltrated through a small gap with the help of exploits and designed so that the payload is automatically executed to the system.


“If the backdoor payload has been successfully inserted through a small gap with the help of the exploit tool, then the hacker has logged into the system. Backdoor is the term for back door, John.”


The next step is to maintain access so that it cannot be entered by other users, then remove traces or logs, this step is taken so that it is not as often experienced by amateur hackers who are always arrested after cracking a live system.


Stefan also tells John that there are several targets that can be attacked. Starting from hardware components such as computers, WiFi AP, Routers, switches, printers, and any hardware connected to the internet. Of the software will be quite a lot as well, such as database servers, web servers, ms. office, browsers, OS, and more


“So, not all malicious hackers?” ask John who is still innocent.


“Hacker is a cyber savvy person, tasked with maintaining the security system, and repairing if there is a malfunction. If the excess is used to penetrate the system without permission for bad purposes, such as stealing data and doing damage, it is more appropriate he is called cracker.”


“You should have been rich with your advantages, Stef.”


“By bad way? It won't! I was even worried that the knowledge and skills I had were used for bad deeds.”


“But, everything can happen. Human heart can turn at any time.”


Stefan stared intently at the laptop screen, then a grin appeared on his face. Suddenly his heart was hot as he remembered the faces of his two in-laws and his two in-laws. Suddenly, Stefan's chest tightened.


Stefan leaned against his boarding wall, sighing many times, continuously strengthening himself. He vowed to prove to Bobby and his family that he would be successful and admired!