WebNovels

Chapter 12 - Brain Overload Attack!

The Third Hokage's words made it impossible for Sawada Hiroki to remain calm in the hospital any longer.

Danzo.

That name surfaced in his mind.

The "certain people" the Third mentioned undoubtedly referred to that Root old geezer. Only this guy—notorious as the scapegoat king even in numerous Hokage fanfictions—would contend with the Third Hokage and even disobey his will to some extent.

When Sarutobi Hiruzen said not to disappoint "certain people too much," he probably meant not to disappoint Danzo too much.

The Third said not to disappoint him, while for Danzo it was "too disappointed," and he wanted Hiroki to display "less dangerous abilities"—clearly referring to his kekkei genkai.

In other words, the cheat ability he'd demonstrated.

This cheat had to be utilized, but also couldn't be fully utilized. He needed to show his talent—talent independent of his kekkei genkai. Perhaps that was what the Third really meant to convey.

Kekkei genkai talent could be inherited. If he didn't demonstrate talent unique to himself personally, perhaps even the Third Hokage wouldn't protect him much. His fate might be becoming Orochimaru's test subject?

No, it probably wasn't that dangerous. After all, the Third Hokage was still the Hokage—he definitely wouldn't tell a child too much sensitive information. And having the Third directly turn a child into a test subject probably didn't fit the persona he displayed in Konoha Village.

So the most likely scenario was that if his other talents weren't outstanding enough, the village would allocate fewer cultivation resources to him and provide less protection?

Third Hokage, you really are...

Sawada Hiroki complained internally.

This was a problem walking on a knife's edge.

So how should he break through?

He'd better develop a technique that exhibited his kekkei genkai's nature but was full of limitations, appearing not that strong...

...

Pondering this, Hiroki quickly formed a plan.

As a programmer, what did you need to create a program with offensive capabilities?

The answer was: find vulnerabilities! Write malware! Launch server attacks!

The first thing that came to Hiroki's mind was—Denial-of-Service attack.

This thought flashed through Hiroki's mind like lightning.

That's it! This is it!

He could write a "program," a script!

This script would exploit a vulnerability he'd confirmed while connecting to WiFi in the hospital—namely, even when they had mental defenses and were hostile, their temporary cache folders were unprotected!

This meant Hiroki could write a script that automatically ran after establishing connection with a target, frantically and infinitely copying and pasting every momentary thought the target produced in their Temp (temporary thought cache) folder!

For example—if that person had a thought:

"What am I thinking?" → copy → "What am I thinking? What am I thinking?" → copy → "What am I thinking? What am I thinking? What am I thinking? What am I thinking?"

Then endlessly repeating the copying would make it rapidly multiply the instant he made contact, entering a state where the brain was filled with useless thoughts!

This way, the target wouldn't be able to think about whether to form hand seals next or launch a taijutsu attack. They couldn't even form seals. Going further, perhaps they couldn't even maintain body balance, thus falling into a "brain crash" state!

Completely at his mercy!

This technique perfectly met all requirements!

First, it was powerful—a significantly effective control technique.

Second, it was "not that dangerous" because it didn't steal core secrets (jutsu, memories), only temporarily created chaos. More importantly, it required connection to use.

This meant that with intelligence about him, given his current physical capabilities, he actually couldn't easily make contact with people, making it appear very "exploitable" and targetable!

This way, it met the requirement of showing something impressive yet not too dangerous, right!

Thinking this, Hiroki could no longer lie still. He immediately immersed himself in his consciousness space, on that deep blue desktop.

His mental intention became a mouse: Right-click → New → Text Document.txt.

A blank document appeared. He renamed it Brain_Overload_Script.bat.

Double-clicking it open, Hiroki's thoughts transformed into code, rapidly "typing" in the document:

@echo off :: setlocal enabledelayedexpansion

But having just typed the first line, Hiroki frowned.

He'd thought of something.

His system didn't seem to be some standard company's Windows! This Windows system seemed to have an entirely different code structure! The thought cache files he'd seen in folders all had unusual naming formats in an unfamiliar language.

The paths also contained lots of non-standard characters.

This might mean the basic programming language was already different from the Windows default programming language he knew. Would the program still execute normally? Should he write the script in this new language or stick with batch file syntax?

Hiroki took a deep breath.

Whatever, he'd write both scripts and try them out first.

Silent mode enabled

Enable delayed variable expansion

If mental connection not established then (

 Exit program

)

Set target path = C:\Users\%target_name%\AppData\Local\Temp

If check directory "%target_path%" fails then (

 Exit program

)

Set attack intensity = 10

::This value represents how many times each original thought will be copied and amplified

Set overload threshold = 10000

::When the number of junk files in the temp folder exceeds this value, the attack pauses

Begin attack loop:

::Step one: Scan all current thought cache files of the target

Execute loop traverse directory files in ("%target_path%\*.tmp") do (

 ::Step two: For each scanned thought file, perform multiple copy amplifications

 Execute loop %%i from 1 to %attack_intensity% step 1 (

 ::Step three: Generate new, chaotic, meaningless filenames for the copied junk files

 Set random number = a randomly generated number

 Copy "%target_path%\%%~nxF" "%target_path%\%%~nF_copy_!random_number!.tmp" > null device

 )

)

::Check if current junk file count has reached threshold

Set total files = 0

Execute loop traverse directory files in ("%target_path%\*.tmp") do (set /a total_files+=1)

If %total_files% greater than %overload_threshold% then (jump to attack complete)

::Brief delay, then start next round of scanning and amplification attack

Pause /t 0 > null device

Jump to begin attack loop

Attack complete:

Exit program

After finishing the program, Hiroki changed the file extension to .bat for easy execution.

Next, he should find a suitable target to separately test his attack programs written in both the unfamiliar system language and the original programming language!

More Chapters