Chapter 7:

No Miscalculations Allowed

who I am is not who I want to be


Karma: Who liked to be the boss of everything in every situation.Bookmark here

Truth be told, I would probably call myself a little obedient at times. But this woman liked to be the boss purely for the sake of being in Charge and, it gave her great delight in believing that she was the boss. She is the type of woman I would call bossy. Being bossy was a way to take credit for my work, with the hopes of reaping most of the rewards that we earned. Bookmark here

Feeling moody was her cue to return to her cocoon and get in touch with how she felt about things. In these reflective moments, she could make better choices, grow up, glow up and get back on track.Bookmark here

Karma was one of the moodiest and bossy humans I ever met. Bookmark here

Indeed she was a great hacker with lots of technical skills. Her habit of never stop learning and always finding new, efficient ways to hack was one of the best things that I can mention about her.Bookmark here

As I was a script kiddie, she had to invest a lot of her time in me to make me a better hacker. The truth is this because of Karma; I got rid of the annoying title "Script kiddie." Getting rid of the habit of Copy and pasting payloads was one of the biggest hindrances for me in my career as a Hacker. She taught me how to create "payloads" on my own.Bookmark here

( IMPORTANT NOTE: A payload is a set of malicious codes that carry crucial information that can be used to hack any device beyond limits that you can't imagine. )Bookmark here

Karma and I participated in many private Bug bounty programs as ethical hackers. Every time we used to find any bug, we received a bounty/money as a reward from the organization. Karma was a greedy woman.
Bookmark here

( IMPORTANT NOTE: A bug bounty program is a deal for ethical hackers offered by many websites, organizations, and software developers by which individuals can receive recognition and compensation for reporting bugs, especially those pertaining to security exploits and vulnerabilities. )Bookmark here

Starbucks: An American multinational chain of coffeehouses, We participated in bug hunting on the website of Starbucks. After the tiresome and continuous work of 13 days, We found that we can exploit Server-side template injection vulnerability on their website. We reported the bug and, They awarded us a handsome amount of money.Bookmark here

( IMPORTANT NOTE: Server-side template injection is a vulnerability where the attacker injects malicious input into a template to execute commands on the server-side. This vulnerability occurs when invalid user input is embedded into the template engine which can generally lead to remote code execution (RCE) )Bookmark here

Karma was one of the most of the greediest humans on earth that has ever existed. She made a rule for the distribution of awards given to us.Bookmark here

That rule was called "NO MISCALCULATION ALLOWED."Bookmark here

While implementing this rule for the distribution of money; She did the opposite of it and Always miscalculated. She never gave me more than 35 percent of the total money awarded to us. On rare events, she gave me 40 percent of the reward. After we received that handsome amount of money, I asked her for more money.Bookmark here

She said to me:Bookmark here

" If you want more money, then stop copy and pasting payloads. I definitely deserve more money than you and, there are no miscalculations in it. I'm deducting my tuition fee for teaching you."Bookmark here

I said to her:Bookmark here

" I admit it "Miss greedy." You can deduct the money for investing time in me and teaching me about all the other vulnerabilities that I didn't know about."Bookmark here

She said:Bookmark here

" Yeah, 'Mister script kiddie.' You only knew about SQL injection, Information disclosure, Access control, Click-jacking, Directory traversal, cross-site scripting, Business logic, and authentication vulnerabilities. Everything else you know now is because of me."Bookmark here

( IMPORTANT NOTE: Web cache poisoning, Access control, OS command injection, SQL injection, Click-jacking, Directory traversal, cross-site scripting, Business logic, and authentication vulnerabilities, cross-site request forgery, server-side request forgery, HTTP request smuggling are different types of bugs that can be reported by ethical hackers and they get a reward for reporting bugs )Bookmark here

I was so annoyed by the title of Mister script kiddie. It was like an insult to me after gaining technical skills. The title "Little dude" was Fine, but it's a big no to this title.Bookmark here

I said to her:Bookmark here

" I know, I can't beat you and end up myself so trash but, can you please stop calling me with that annoying title. I know I'm going to crash if you'll leave me. I don't know; why are you so harsh. "Bookmark here

We were arguing about this in a park and, a woman passed by with a cradle. A baby boy was in the cradle. The baby boy was crying and screaming. That woman tried to make him silent by showing him some toys. Karma gave a disgusting impression on them and stood up from the bench and moved away from them.Bookmark here

I followed her to the next bench where she sat and asked her why she gave a disgusting look to them.Bookmark here

She said with anger:Bookmark here

" Looking at that Miscalculation, it made me disgust that woman."Bookmark here

I said:Bookmark here

" I don't understand. what do you mean by miscalculation?"Bookmark here

She said:Bookmark here

" That baby is a miscalculation which is made by that woman. She only increased the noise pollution on the earth by giving birth to that baby ."Bookmark here

She hatted newborns due to some reasons. It wasn't the noise that made her angry but a past trauma. There was so much that I did not know about her for a long time.Bookmark here

Things that I was not able to show and tell to anyone was flooding my mind. Voices inside my head were willing to join it all again. It is a world phenomenon where only the visible things are real. Where falsehoods go hand in hand, reflecting everything.Bookmark here

If I could travel back in time and start it all over again by following a calculated path to live my life but one day, I will come across the same feeling again, and I know that it will carry over. I did not know, why I was so hurt. Can I expose it to the world? What if I tell the world that my mind got exploited by someone? Will they believe me or call me a psycho? I want to cut and open my skull and made the world look into my head. What will the world say? I want to know.Bookmark here

How long has this been going on? I miscalculated it again and again. I miscalculated the logic behind:Bookmark here

Why she wants to meet me?Bookmark here

For me, her only reason to meet me was that she wanted to confess her feelings for me. She was so shy in personal. My prediction was wrong that she has a curiosity about seeing me. I miscalculated every logic behind her actions. Bookmark here

That meeting was an initial stage of the second stage of hacking called Scanning/Enumeration.Bookmark here

Words are just a toy that people play with. A special scan she planned for finding vulnerable emotions of her hostage. Her special Words for me were just like a tool to scan me to find my emotional vulnerabilities.Bookmark here

(IMPORTANT NOTE: Scanning can be considered as a logical extension (and overlap) of active reconnaissance that helps hackers identify specific vulnerabilities of the target machine or website )Bookmark here

(Features of Akane Toru:Bookmark here

Height: 5'2'' (Year 2015 )Bookmark here

Hair: She had long, black hair cascaded down her back. Her hair was resting on the top of the ears, come to both sides, split over the right eye with some lonely straws pinching his nose.Bookmark here

Hair Texture: Soft and SilkyBookmark here

Descriptive Hair Color: Ebony/black. Bookmark here

Skin Tone: IvoryBookmark here

Characteristics of skin tone: Porcelain to light skin color, without or with minor imperfections, sensitive, and could easily burn under the sun Bookmark here

Nose: SharpBookmark here

Eyes: She had Icy blue eyes that are a bit whitish or a glassy shade of blue.Bookmark here

Cheeks: Chubby cheeks with Hallow dimple on cheeksBookmark here

Chin: Cleft chinBookmark here

Jaw: Jaw narrowed )Bookmark here

Bookmark here

Bookmarked
You can resume reading from this paragraph.