HacKer

Hk112 Steal Canon Technical Data!

The tracking expert from the International Intelligence Bureau of the Ministry of Foreign Affairs of Wo Sang stopped for a while after chasing the server of the Hacker Alliance. They obviously regarded Shi Lei as a core member of the Hacker Alliance, and Shi Lei's blame was very successful!

The tracking experts only paused for a moment, contacting colleagues who specialize in intrusion and attack, to assist in attacking the hacker alliance's server.

The Asahi Shimbun and the Yomiuri Shimbun in Wosan are controlled by two trios of the Hacker Alliance. In the internal voice channel of the Hacker Alliance, Heidao said with a smile: "Brothers, we can take a breath. The grandsons of the International Intelligence Bureau of the Ministry of Foreign Affairs were led away by the great god Lucifer. Know if Lucifer can escape in the end!"

Heihu, the second-in-command of the alliance and also the team leader, said, "Boss, from the strength that Lucifer has shown, he should be able to easily escape tracking!"

Black Panther agreed: "Second brother is right, Lucifer's strength is too strong! The defensive power of the official website of nhk was pierced by him like a layer of blank paper. The internal security department of nhk , there is absolutely no way!" [

"Boss, it's not good!" Hei Gun suddenly said, "Boss, our server has been attacked, and it is suspected to be the grandson of the International Intelligence Bureau of the Ministry of Foreign Affairs!"

"What!" Black Blade exclaimed, "What's going on! We didn't provoke the International Intelligence Bureau of the Ministry of Foreign Affairs at all, and didn't they go after Lucifer?"

Black Panther had a bad feeling in his heart, "Boss, do you think it's Lucifer who put the blame on us?"

Black Gun shouted: "Boss, second brother, black hand, let's go back to defense together! Our team is about to be unable to stop it!"

"Everyone back on defense! Damn Lucifer!" Black Blade snorted angrily. The seven core members of the Hacker Union immediately gave up their mission, brought their own broilers, and returned to the Hacker Union's server to defend themselves.

There was a twist in the black wolf's heart, something called hatred slowly grew in his heart, and he roared angrily in his heart: Lucifer, it's you again! I must catch you, I must take revenge on you!

The International Intelligence Bureau of the Ministry of Foreign Affairs, through nhk television, issued an emergency press note. They only announced one news that the hackers who hacked into the nhk national TV station were suspected to be the core members of the hacker alliance. At present, their tracking experts are closely encircling and suppressing the hacker alliance's server. Once they break through the hacker alliance's server, then everything will be revealed.

Sitting in front of the No. 1 server, Shi Lei looked at the Hacker Alliance and the International Intelligence Bureau of the Ministry of Foreign Affairs of Wo Sang with a smirk, using an internal server of the Hacker Alliance as the battlefield, fighting to the death!

The strength of the International Intelligence Bureau of the Ministry of Foreign Affairs of Wo Sang only showed one-tenth at most, and the Hacker Alliance was able to withstand it. Shi Lei didn't care about them for the time being, and he had more important goals.

After the second step of framing the blame, Shi Lei began to execute the third step of the plan, invading Canon!

In this scene of hackers in the Xia Kingdom making a riot in the Wosang Kingdom, the most fundamental fuse is Canon, Canon's little dog Ichiro. If Shi Lei hadn't been exposed by Inu Ichiro, Shi Lei wouldn't have stirred up a cyber war behind his back.

Although the loss of Wo Sang Kingdom has been very heavy, Shi Lei is not satisfied. Canon, as the fuse, was not harmed in any way, which is simply ironic!

Shi Lei connected to the supercomputer Yan and Axios' first-class broiler. The performance of the two powerful broilers combined to sneak up on Canon.

Shi Lei's goal is Canon's technical information, especially the optical equipment, as well as the technical information of digital cameras. Although Shi Lei doesn't like the little devils of Wo Sang country, he has to admit that Canon is in the world's leading position in the field of digital cameras.

If you can invade Canon's interior and obtain the technical information of Canon's R&D department, it will be developed!

The main computer of Canon's R&D department is also a supercomputer, and its computing performance is very advanced, almost one-fifth of the supercomputer Yan, ranking more than 300 in the global supercomputer ranking.

Such a powerful supercomputer is very difficult to invade. Even if Shi Lei controls Yan, the ninth-ranked supercomputer in the world, it is very difficult!

High-tech confidential technology industry, telecommunications industry, financial industry, the reason why these giant oligarchs like supercomputers is because supercomputers are safe!

Shi Lei controlled the supercomputer Yan and wandered the official website of Canon, but did not immediately invade the inside. He was looking for the most opportune time to find a gap in Canon's security defense. [

From Canon's official website, Shi Lei carefully entered Canon's personnel department server and searched for the personnel information of the R&D department in the personnel department server.

Before hacking, you need to be fully prepared so that you won't be in a hurry to deal with emergencies. Canon's Tokyo headquarters has a total of more than 3,000 R&D personnel, who are distributed in various research institutes in Tokyo.

In these studies, the corresponding research data are stored, but the main computer of the R&D department at Canon's headquarters also stores the research and development data. However, the main computer of the R&D department is closely guarded, and it is not that simple to enter the main computer of the R&D department!

Shi Lei looked up the information of the R&D department in the personnel department, and then a smile appeared on the corner of his mouth. There is a saying in Xia State that a solid defense often collapses from within!

Canon's external defense is indeed very strong, and it can even be described as a pervert. It is definitely not the paper-based defense of the official website of nhk TV!

Unfortunately, such a powerful defense system also has a weakness, that is, the lack of internal defense! Shi Lei found the identities of several senior researchers in Canon's headquarters and R&D department on the server of the personnel department. Then he hacked into the internal complete defense system. After intercepting the account numbers and passwords of the senior researchers from the internal security defense system, he unknowingly bypassed Canon's defense system and entered the R&D department. in the internal system.

The internal system of Canon's R&D department, according to the authority of the senior researchers mobilized by Shi Lei, basically obtains information outside their research, but Shi Lei is a hacker!

Shi Lei secretly bypassed the system authentication, exploited the loopholes in the system authorization, and secretly gave the senior researcher's authority a temporary weight, temporarily allowing the senior researcher to access the information of other research projects.

The computing power of the supercomputer Yan exceeds that of the supercomputer in the R&D department. The two sides are in fierce confrontation. The system authorization loophole is under the protection of the supercomputer Yan and continues to take effect.

Shi Lei hurriedly entered the code on the keyboard and searched the research and development department for research on optical technology and related technologies of digital cameras. Under the restriction of conditional screening, a large number of technologies related to copiers, fax machines, medical equipment, etc. were eliminated, leaving only the digital camera technology and optical technology that Shi Lei needed.

Even if only optical technology and digital camera technology are left, the file data size calculated by the system exceeds 200gb!

Canon's supercomputer strictly restricts the flow of data. Although Shi Lei now uses the supercomputer Yan to easily view these data, there is no way to take it away. Because Canon's supercomputer, once it detects that there is data flowing out of the connection, it will send out an alarm!

Shi Lei was in trouble when he saw the data over 200gb, all of which were gold mines and silver mines. How can there be a reason to enter Baoshan but return empty-handed?

However, Canon's supercomputer has strict data flow restrictions. This limitation comes from the hardware device, and trying to suspend it through software will only cause an alarm!

Shi Lei scratched his head, even if he was given an unforgettable superpower at this moment, it might take several months to read over 200GB of data! Not to mention that he has no ability to remember, how can there be time for him to remember?

"What should I do!" Shi Lei said to himself, looking at the computer screen.

Suddenly, Shi Lei thought of a story about a child deceiving people. This story has been widely circulated in the Xia Kingdom, telling the story of the wolf coming!

Shi Lei decided to use the story of the wolf coming to test Canon's internal security department. He controls the supercomputer Yan, and in the supercomputer of Canon's R&D department, he makes a dummy data packet. Then send this dummy packet out randomly.

Canon's internal security department immediately discovered that the supercomputer in the R&D department was sending data out. They immediately acted and closely monitored the supercomputer, but found that no data was flowing out at all.

The highly vigilant Canon's internal security department relentlessly investigated the entire supercomputer, but found no problems, and finally gave up.

When they gave up, Shi Lei increased the size of the dummy data packet to 10gb, and then sent out random data again.

The huge data flow caused Canon's internal security department to issue a crazy alarm. The hardware alarm system of traffic monitoring calculated that the data volume was 10gb, but after the internal security department intervened in the investigation, they still found nothing. There is no abnormality in the supercomputer of the R&D department, no internal data is lost, and there is no trace of duplication. [

After Canon's internal security department relaxed a little bit, Shi Lei increased the size of the virtual data packet to 100gb again, and created another random transmission data.

The hardware alarm of flow monitoring, Canon's internal security department, once again thoroughly investigated the supercomputer of the R&D department and the research data in the supercomputer. However, those flows were all virtual data constructed by Shi Lei, leaving no traces at all. How can Canon's internal security department find out the problem?

After more than a dozen repetitions, Canon's internal security department was also fed up. When the traffic monitoring hardware issued an alarm again, they didn't even check it.

Shi Lei knew the opportunity was coming!

(To be continued. If you like this work, you are welcome to register as a member of this work. Your support is my greatest motivation.)

Chapter 113/1926
5.87%
HacKerCh.113/1926 [5.87%]