webnovel

Getting a Technology System in Modern Day

For others it takes dying and reincarnating for them to get a system but what happens when you get one without dying? Aron Michael is an average student set to graduate within a week, but he was expelled for a random reason. Due to that, he had heavy student debt and no diploma to help him earn the money to pay it back. But one day he got a system that called itself the [Advanced Tech System]. follow the story to watch him develop from your average Joe to him being the owner of the largest company in the world. Discord server is open: https://discord.gg/KptypY8dGh ********************************************DISCLAIMER************************************************ This book is a work of fiction. Names, characters, businesses, places, events, and incidents are either the product of the author's imagination or used in a fictitious manner. Any resemblance to actual persons, living or dead, or actual companies is purely coincidental. The portrayal of names, characters, positions, and companies in this book is entirely fictional and not intended to represent real-life counterparts. All content in this book that may share names, characteristics, positions, or companies with real-life entities is purely coincidental and does not indicate any conflicting part to their real-life counterparts. The author and publisher do not have any intention to defame, discredit, or infringe upon the rights of any individual, company, or entity mentioned in this book. This book is meant for entertainment purposes only and should not be construed as factual or a representation of real-life events or people.

Agent_047 · Sci-fi
Not enough ratings
830 Chs

Infiltrating the private network.

The moment the AI received permission from Rina it transferred itself to the computer and immediately took control of the computer.

After it completed its migration, it immediately started the move of infecting the devices that were within the network.

It did this by acting as a data packet being sent from one device to another, the moment the receiving device tries to reconstruct the data packets the AI will immediately take control of the device without raising any suspicion.

After infiltrating a few devices in the network, the AI finally identified one of the servers that housed and managed the private network. Realizing the criticality of this discovery, the AI ceased all its other infiltration attempts and switched to a targeted attack on the server.

The AI immediately started port scanning and network enumeration, the AI probed the server's defenses to identify the weaknesses and vulnerabilities.