Page 57 of Exploited


Font Size:

The response was immediate.

00:35 I trusted you about Ryan. Trust me about Virtuant. We each have a cause. They coexist. I need your help with this. Just as I helped you with Ryan Law.

Did I trust Toxicwrath?

Yes.

As much as I was capable of trusting someone I didn’t know.

My secret hacker friend had proven himself a capable partner. Relying on someone else was difficult, but it helped to share the burden of my mission.

Toxicwrath was clearly talented. His cracking was top notch. Clean.

I had other targets. I could go back to doing things solo.

Or I could accept the help he offered.

00:36 What’s the plan for Virtuant?

I had made my decision. I’d trust Toxicwrath. He hadn’t led me astray yet.

00:37 Great. Glad you’re on board. Need your help with hashing attack. And then an SQL integration.

Hashing attack? Toxicwrath wanted the passwords. But why? And an SQL integration was a little old school. I was confused.

00:38 What’s the hashing at Virtuant?

Hashing was the encryption of passwords. My guess was a tech company like Virtuant would have heavy-duty encryption to prevent data breaches.

I felt a ping of alarm.

00:39 Bcrypt.

Bcrypt? Seriously? Decrypting those passwords would take years!

00:40 How is this possible then? And what is the point of taking the passwords?

00:41 Virtuant has over 5 million passwords stored on the company server that uses SHA1. Easy.

“Easy” was probably a bit of an overstatement, but I trusted in Toxicwrath’s abilities.

00:42 What will we do with the passwords?

00:42 We sell them.

Wait. What?

Sell them?

00:44 I’m not sure about that. It’s not about money.

00:44 It’s always about money.

For me it wasn’t.

I didn’t like this as a motivation.

Before I could express any further concerns, Toxicwrath allayed my fears.