Advisory for the story: Although the story is based on real life events that did happen and is focused to be as realistic as possible to real life hacking, do not take this story as a guide to how to hack or how to get away with crimes. I am not responsible for what you do, and I am not responsible for any damages you do. This story is fictional.(Sorry for the Dummy Alert before the entertainment)
Hello, my name is Jason L King, I was the leader of a cyber terrorist gang called SilverStone, throughout the years, I witnessed more things I would like to admit. I am going to tell my story from when I was a simple skript kiddie just infecting my own school PCs with Poison Ivy to my arrest in 2020 for a ransomware attack against SLOBS. Here is my story.
I was born in Southern Florida on 12/12/84, since I was born I was interested in computers, they always seemed like magic to me. Getting my dad's old 486 system on my 9th birthday that he used to do his work for SLOPS, a local government branch that he worked for. It wasn't that long after that a friend handed me a couple floppies with the writing DOOM REGISTERED COPY written on it. I played that game for hours on end. It wasn't too long that I got bored and discovered the level editor and started modifying certain things to see how it will change the map or behavior of the enemies.
This was also where I was introduced to LargeHard Basic, this got me involved with tinkering and coding, it wasn't too long after I realized I could do some damage to a computer system by making the program overwrite Autoexec.bat with a restart command. I also learned how to repair computers after such attacks, like in putting the installation LH-DOS 6.17 Floppy Diskette so I would be able to delete the line from autoexec.bat.
At Age 10, I had grown away from basic, and started to use programming languages like A+, B# Coffee, STOP and Coffee Script. I mastered them during the duration of summer vacation.
Now, I was never a straight A student, in fact, I was held back and graduated when I was 20. Now how did this happen? It was from a growing addiction at around the time. That addiction? Hacking.
Now, how did I get introduced to hacking? Well one day when I was 11, thanks to a couple hacker groups called Hagg!s and P4nts that hacked one of the biggest websites of around the time, Yankoo! An early web browser was replaced with the following message.
Yankoo!
PWND by Haggis and P4nts!
For the past 4 months, if you visited the Yankoo! Web Browser for more than 30 minutes a day, your computer now has a logic bomb in it, and if the demands aren't fulfilled by 12/15/96, this logic bomb will send all personal data you have on your computer to us for further use.
This data will be used for blackmail and will be relayed to scammers. The demands goes as follows:
140,000 American Fiat
Logs of IPs from the past 2 months
Information that you ACTUALLY collect on users
If these demands are not met, you know what will happen. We have spies inside your Head Quarters, any plans to demask us will cause the payload to be initiated prematurely.
Copyright Free Kenny 1996
This message was confirmed to be a hoaxed after the company (stupidly) paid the ransom and give into all of their demands. 2 security researchers apparently researched the attack and found out it was indeed, not true.
My first act of well, cybercrime or hacking, whatever you will like to call it, was in my last year in middle school, the eighth grade. Around this time, I heard about this remote control software called Poison Ivy. At around that time also, my mom gave me my first USB drive, a 550 MB PIZ Ultra drive and a laptop, a Quantium 4 with 1 gigabyte of RAM and with a 100 gig hard drive, a nice Bell laptop. So, I put the host software on my computer and the client software on the usb drive, the next day I ran the software on every school computer I could find.
At around the end of the day, I had about 25 of the school computers with the program running on them. So when I eventually get the chance at lunch, I would control the computers on my laptop and sometimes, rarely, a student or teacher was on the computer.
In which I would do light movements of the mouse, send random message boxes at times, but one time when I did it, I would never forget the reaction that teacher had. It was a sunny Friday morning. My mom just dropped me off at my middle school, SunRise Charter Middle School. I brought my trusty laptop and used it till the first period started.
Now, I don't fully remember my plans from back then, but I wrote the majority in a notebook which basically became my diary full of my day to day hacking of random things. From the first day of me owning the laptop and instantly installing Debian 2.1 on it to the laptop eventually being replaced.
Next Chapter: First Act: Unauthorized Access and Chicken Nuggets.
YOU ARE READING
SilverStone
FantastikHello, my name is Jason L King, I was the leader of a cyber terrorist gang called SilverStone, throughout the years, I witnessed more things I would like to admit. I am going to tell my story from when I was a simple skript kiddie just infecting my...