Share

TWELVE

Note: This is a past-day event, (continuation of even-numbered chapter time span: 2,4,6, etc.)

The next few evenings, after I completed the first hacking challenge under Gregory's guidance, I am busy on hackthissite after hasty study sessions and exchanged supervision duty shifts. Sometimes in my room, other times on Gregory's laptop, in his room. Afterwards, it feels like my head wants to burst from all the information, from the frustration, because the more I learn, the more I see that I still know less.

"You have to be patient," Gregory advises. "Pay attention to the detail."

So, I stumble through the challenges. Struggling, but at least. I learn that when you enter a password on a website. the system must look somewhere in its scripts for a password file. It compares your password with what it has in its password file. If the two match, you're in.

In Challenge 2 I find out after a struggle that Sam, the supposed network administrator, forgot to set up the password file. So, there
Locked Chapter
Continue to read this book on the APP

Related chapters

Latest chapter

DMCA.com Protection Status