On the Subject of Cheat Checkout

Hacking service is not that easy. Also, be careful with every transaction.

  • The module looks similar to Cheap Checkout but some things are different. The currency has changed to cryptocurrency, the display is now interactable showing a hack that was done on a website. There are also 12 price buttons instead of 8 and 2 additional action buttons which are: Stabilize and Patch.
  • Clicking on the LCD will change to its next information that will be used in the following tables below. Continue to click the LCD to gain more information. There is a total of 5 hacks that can be cycled using the arrows.
  • Taking the information from the hacks, calculate the price for each one. If the hack failed, take the percentage of that price instead. Then, if there is an applicable discount for the current hack, apply it to the hack. Finally, figure out if the customer has enough cryptocurrency to pay for all the hacks. If not, click the “Submit” button and they will fix their price.
  • After the customer has enough money, calculate the amount of change that needs to be given back. Enter that into the module and click “Submit”. If correct, the module will solve. Otherwise, it will strike and not reset the module.
  • ROUND AFTER: GETTING THE INITIAL COST USING THE FORMULA, THEN AFTER APPLYING THE DAY’S DISCOUNT, THEN AFTER CONVERTING TO CRYPTO.

The next few tables of this manual will explain what each information gathered from each hack will mean. Below is the format of each Hack:

Initiated on: [Website]
Method: [Hack Method]
[Additional Hack Information (Can be multiple)]
Result: [Result]

The tables on the pages that will follow, will give you information on everything that can come up on the hacks.

Possible Websites:

WebsiteSecurityType
repost.com74Social Media
pointercat.com19Game
usb.os37Search Engine
color.org41Search Engine
ktane.timwi.de95Info
lol.gg8Social Media
velvet.ss58Streaming
watch.tv61Streaming
onion.co88Search Engine
flybird.tv20Streaming
sellcoin.org61Info
collection.com59Info
razor.pt66Search Engine
checkout.kt38Game
crunch.bg52Game
locco.pt67Social Media
plant.tr12Info
cartoon.com69Streaming
blogsite.co71Social Media
voila.lc20Social Media
ktane.gov94Info
loli.co88Game
anime.st41Streaming
medicalsite.co92Info
recoil.pt82Search Engine
numerical.ss35Info
isight.com26Streaming
WebsiteSecurityType
symbolic.co54Game
grocery.st58Game
galaxydeliver.com40Search Engine
vilesight.ei86Social Media
random.site100Search Engine

Possible Hacks:

MethodInformationCost
Denial of Service Attack (DSA) A DDoS attack is a cyberattack that paralyzes a computer network by flooding the network with data simultaneously sent from multiple computers. The hackers use multiple computers to accomplish this hack.
If this hacking method was used, they will show what computers were used in the DDoS:
PC-Type: [Type]
The list of computers that can be used are:
Basic PCs: The base value will be $0.8.
Advanced PCs: The base value will be $1.2.
Supercomputers: The base value will be $1.6.
Quantum Computers: The base value will be $2.
Then, another display of the amount of PCs were used. Giving the extent of how many were used to do the hack.
PCs Used: [Amount]
After that, an additional display of duration of the attack will be displayed. This will illustrate how long the attack was performed.
Duration: [Amount] Hours
Also, the “Success” result will be replaced if this attack is used. The possible results are:
Website Crashed Temporarily: The cost will remain the same.
Website Crashed Permanently: The cost of this hack will increase by 25%.
Base Value * PCs Used * (Website Security Value / 5) * Duration
Method Information Cost
Worm (W) A computer worm is a malware that replicates to spread to computers. The worm developed by our hackers uses the websites to target computers.
An additional display of the computer type will be added to the LCD if this method is the one chosen.
PC-Type: [Type]
The list of computers that can be infected are:
Defective PCs: The base value will be $0.5.
Basic PCs: The base value will be $0.9.
Advanced PCs: The base value will be $1.3.
Supercomputers: The base value will be $1.75.
Quantum Computers: The base value will be $2.1.
After that, an additional display of the worm type.
Worm: [Type]
Normal: Add 1x multiplier to the cost.
Lethal: Add 2x multiplier to the cost.
Spreader: Add 0.5x multiplier to the cost.
Infected PCs: [Amount]
After that, the amount of computers infected by the worm.
Base Value * Infected PCs * (Website Security Value / 10) * Multiplier
Method Information Cost
Code Injection (CI) Code injection is the exploitation of a computer bug that is caused by processing invalid data. The hackers will locate possible entry points to inject code in vulnerable programs on the website.
An additional display will be added if this method is the one chosen.
Vulnerability: [Vulnerability Type]
There are different types that can be exploited so it can be accessed. The list are:
SQL: The base value will be $0.9.
LDAP: The base value will be $1.8.
XPath: The base value will be $1.25.
NoSQL: The base value will be $2.2.
After that, the LCD will illustrate the complexity of the queries found:
Complexity: [Complexity Type]
Simple: The multiplier will be 1x.
Advanced: The multiplier will be 1.2x.
Complex: The multiplier will be 1.5x.
After that, the LCD will illustrate the amount of batches of code that was needed to infiltrate to hack the website:
Batches: [Amount]
Also, an additional result will be added if this attack is used and is successful. The possible results are:
Website Crashed Permanently: The cost of this hack will increase by 25%.
Host Infiltrated: The cost of this hack will increase by 50%.
Base Value * Complexity Multiplier * Batches * (Website Security Value / 20)
Method Information Cost
Cross-Site Scripting (XSS) Cross-site scripting enables attackers to inject client-side script into web pages viewed by other users.
The hackers will execute plenty of programs to infect the website.
An additional display will be added if this method is the one chosen.
Complexity: [Complexity Type]
The complexity of the codes are:
Extremely Basic: The base value will be $0.5.
Basic: The base value will be $1.
Advance: The base value will be $1.5.
Complex: The base value will be $2.
Unintelligible: The base value will be $2.5.
After that, a new display will be shown which is a hack type.
Hack Type: [Hack Type]
The different types of codes are:
Non-Persistent: The multiplier will be 1x.
Persistent: The multiplier will be 1.25x.
Mutated XSS: The multiplier will be 1.5x.
After that, a new display will be shown which is the amount of programs being sent.
Programs: [Amount]
Base Value * Multiplier * (Website Security Value / 8) * (Programs / 2)
Method Information Cost
Brute Force Attempt (BFA) A brute force attack is an attack which brute force passwords/passphrases until an access is gathered. The hackers have modified their brute force attack to attack the server until the site is hacked, the site crashed, or the site is infiltrated.
The display will show the following line:
Attack Type: [Attack Type]
The possible attack that is possible are:
Strong Inject: The base value will be $2.2.
Sneak: The base value will be $1.6.
Duplication: The base value will be $1.9.
After that, the display will show the amount of attempts that occurred.
Attempts: [Amount]
Also, an additional result will be added if this attack is used and is successful. The possible results are:
Website Crashed Permanently: The cost of the hack will increase by 20%.
Host Infiltrated: The cost of the hack will increase by 40%.
(Base Value * Attempts * Website Security Value) / 5

Hacking Speciality:

The hackers are giving discounts? Nice.

Lookup Sunday
All the search engine websites that have been hacked are 20% off.

Just Monday
The hackers are having problems with their equipment. The hackers need to charge 10% more for the hacks. They are sorry.

Gaming Tuesday
All the gaming websites that have been hacked are 20% off.

Knowledge Wednesday
All the information websites that have been hacked are 20% off.

Media Thursday
All the social media websites that have been hacked are 20% off.

Fix It Friday
The hackers have tinkered their equipment for optimal performance. For compensation, the hackers charge 10% less for their hacks.

Streaming Saturday
All the streaming websites that have been hacked are 20% off.

Now that the hacks have been calculated and discounted, then divide this number by the cryptocurrency price.

Take the customers given price and subtract the total of the hacks (converted to cryptocurrency) and submit that answer to solve the module.

Additional Features

WIFI Connection:

There is a WiFi signal beside the two buttons below the module. This will tell you the connection of your signal. Your signal is faulty and it keeps dropping connection, so you need to fix it every now and then. The WiFi has 3 different colors depending on the connection strength as well as its bars.

Green - The amount of bars at this signal will be three. This indicates that your signal is fine.

Yellow - The amount of bars at this signal will be two. This indicates that your connection is going in and out. This will cause the LCD on its current display to be entirely glitched by chance. To fix this issue, click the “Stabilize” button when the last two digits of the timer is equal to the sum of the digits in the serial number. If the button was clicked at the incorrect time, the module will strike and not reset.

Red - The amount of bars at this signal will be one. This indicates that you have no connection. This will cause the LCD not to function at all. To fix the issue, click the “Stabilize” button when the last digit of the timer matches the last digit of the serial number. If the button was pressed at the incorrect time, the module will strike and not reset.

Hacker Shield:

There is a shield beside the two buttons below the module. This will tell you if you are safe from other hackers. The shield will retain its status throughout the transaction. The shield has 3 different colors, depending on your security.

Green - You are secured and won’t have to worry about being hacked.

Yellow - If the shield is yellow, you are still safe from hacking. However, from time to time, the text from the buttons other than “Patch” will glitch. If you press one of these buttons, you will receive a strike. To fix the issue, press the “Patch” button.

Red - If the shield is red, you are vulnerable from being hacked. A hacker will gain access to the module. The text on the entire module except the “Patch” will glitch. Also, you will not be able to access the buttons except “Patch”. To gain access, press the “Patch” button when the last digit of the timer matches the last digit of the serial. Pressing the button at an incorrect time, or not accessing the module in a span of 30 seconds will cause the module to strike and the module to reset. However, you will gain access to the module again.

Cryptocurrency:

To remain anonymous with the transaction that is being performed, you will receive your payment via cryptocurrency. To gather the current value the customer has, convert the amount of the cryptocurrency being received by using the chart below and compare the amount that the customer spent.

1 Bitdrop1 Crane1 Evol
$111$25$69
1 Linecoin1 Penpoint1 Berr
$420$777$4.4
1 Lapel1 Blade1 Qubit
$42$1234$0.5