HacKer

HK1138 Big Penguin? Hardware Level Vulnerability!

.

June 28th, nine in the morning.

Shi Lei repeatedly investigated the clues that the supercomputer Lightning was hacked. He originally thought it was an internal crime, but through the security monitoring system, it was determined that he did not have the conditions for an internal crime.

After excluding the internal crime, Shi Lei could only reluctantly accept that the supercomputer was attacked by an external intrusion. Moreover, the external intruders, with unknown means, bypassed the external defense of the endless defense system and the verification of Izull, and directly entered the interior of the supercomputer Lightning.

Shi Lei is very confident in the endless defense system and Izull. According to Shi Lei's prediction, even the first giant of the Angel Council cannot break through the defense of the supercomputer Lightning.

So what kind of hacker broke through the defense of the supercomputer Lightning?

"Izuer, logically deduce the identity of the intruder." After investigating for more than an hour, Shi Lei still found no evidence, so he could only use the dead horse as a living horse doctor and instructed Izuer to logically deduce the identity of the intruder.

Logical reasoning of the identity information of the hacker mainly relies on judging the characteristics of the operation command of the intruder, thereby judging the possible identity.

"Sir, according to the logical reasoning of the system, the intruder may be the Big Penguin Company." Izuer said a possible answer.

Shi Lei frowned. Shi Lei knew the technical strength of Big Penguin Company. It was absolutely impossible for them to bypass the endless defense system and enter the supercomputer lightning.

If Big Penguin has such technical strength, they are competing with Dream Entertainment. It didn't even fail so miserably!

"How high is this possibility?" Shi Lei asked.

"It is impossible to give accurate data, and there is no comparison benchmark. There is only one answer to the logical reasoning of the system." Izuer was unable to answer Shi Lei's question, and this question could not be quantified.

Shi Lei rubbed his temples. Although he did not believe that the big penguin had such technical strength, he was still ready to investigate, at least this was a clue of evidence.

In language, you can despise Big Penguin, but in action, you must not take Big Penguin too flat!

"Yizul. Integrate the resources of the iwn secret network!" Shi Lei operated the No. 1 server, obtained the resources of the iwn secret network, and entered the internal network of the big penguin company from a secondary webpage under the big penguin company.

Big Penguin's booth was a bit big, and with Shi Lei's strength, he casually broke into their internal network. In the internal network, Shi Lei instructed Yizuer. Searching for information about supercomputer lightning.

If Shi Lei inquired by himself, it would be as difficult as finding a needle in a haystack!

About two minutes later, Izuer issued a reminder that abnormal information content was found in the internal network of Big Penguin.

"Sir, a suspicious connection IP address is found in the system log. After system comparison, the connection IP address is the network address of the supercomputer Lightning!"

Shi Lei was taken aback by Yizuer's prompt, and a display interface popped up on the screen of Server No. 1. Shows the system logging information that Izur obtained from the Big Penguin internal network.

Looking at a server of the Big Penguin Company. Directly connected to the supercomputer Lightning, Shi Lei's expression was a little weird.

"Could it be that the Big Penguin Company is really making trouble?" Shi Lei said to himself, Yizuer discovered the Big Penguin Company's server, the evidence of access to the supercomputer Lightning, and Shi Lei also began to suspect that the supercomputer Lightning's invasion was related to the Big Penguin. company related.

Shi Lei personally investigated the Big Penguin Company. In the internal network, the server's system recorded logs. Shi Lei checked it very carefully, although the previous system log was deleted by the system. However, Shi Lei extracted most of the system logs through deep disk recovery technology and fragment information integration technology.

By analyzing the system log, Shi Lei found something suspicious.

That is, the server of Big Penguin Company. Although it is directly linked to the supercomputer Lightning, it is not an intrusion source. It is just a transit server, that is, a broiler server.

Long before Shi Lei investigated the Big Penguin Company, the Big Penguin Company's server had been invaded and controlled by other personnel. If it weren't for Shi Lei's data recovery technology, he would have recovered most of the deleted system log information. Then, Big Penguin will be properly framed, and Dream Entertainment and Shi Lei will only vent their anger on Big Penguin, and will not continue to investigate.

'Insidious guy! ' Shi Lei snorted coldly in his heart, and based on the Big Penguin company's server, he began to investigate the black hand who framed the Big Penguin company again.

Shi Lei didn't think that the other party took so much trouble just to frame the Big Penguin Company. In this strange invasion, the Big Penguin Company was just hit by a gun, it was just a stumbling block for the behind-the-scenes mastermind, trying to interfere with Miray Technology's subsequent investigation.

The hacker who actually invaded the supercomputer Lightning is still hidden in the fog!

'Who is it? Although the Big Penguin Company is not very powerful, it is not something that a cat or a dog can bully. The other party can actually control the Big Penguin company's server, as a springboard, without being discovered by the Big Penguin company, and can deliberately leave the connection IP address as a trap, this guy is definitely not easy! ’

Shi Lei's brows were already wrinkled into the word "Chuan".

If you want to play the Big Penguin company with applause, you need at least world-class hackers. However, Shi Lei didn't know what level of hacker could do it if he wanted to silently invade the supercomputer Lightning.

The world's top hacker, certainly can't do it!

The world's top-level hackers among the first generation of hackers can't do it!

To put it an exaggeration, even in the origin of the Internet, it is impossible for the darpa advanced bureau to silently break the endless defense system and deceive the advanced pseudo artificial intelligence system Izull.

unless…

Shi Lei suddenly thought of a situation, and his face changed drastically!

Before the rebirth, the world's top 500 supercomputer. Ninety-nine percent of them use server CPUs produced by Intel Corporation and supercomputers that use AMD's server CPUs. There are very few, comparable to a 'national treasure'.

It was because of this situation that Shi Lei subconsciously ignored that the supercomputer Lightning was built using server CPUs produced by AMD.

In the last life, the server CPUs produced by AMD were hard to come by. More is used in small and medium enterprises. In a hacker technology discussion conference, a hacker published his new discovery, that is, the server cpu produced by amd company has a fatal hardware flaw.

That's right, it's a hardware bug!

AMD's server CPU has a very fatal hardware vulnerability. As long as this hardware vulnerability is mastered, hackers can directly enter. The server built with AMD's server CPU completely ignores any firewall and security system, and directly pretends to be the core program of the CPU, avoiding all troubles.

‘Could it be that hardware bug? ' Shi Lei thought about it in his heart. He tried hard to recall the hacker who published the hardware vulnerability of AMD's server CPU. Which one is it.

From the analysis of the current situation, the person who invaded the supercomputer Lightning should be the hacker.

Although the time when the other party announced the hardware vulnerability of AMD's server CPU is still several years later, no one can be sure. When exactly did the hacker discover the hardware vulnerability.

Shi Lei's memory is very good, if it is important information. As long as he remembers slowly, Shi Lei can remember.

'I remembered! It's Maha Kamal! ' A look of joy appeared on Shi Lei's face. He put his hands on the keyboard and quickly typed in the name of 'Maha Kamal'.

This name is not the real name, but the name of the hacker's 'vest'.

"Yizul, search the Internet for information about 'Maha, Kamal'! By the way, the other party is from the Inca country, and the investigation information is mainly concentrated in the Inca country area." Shi Lei ordered.

Maha Kamal is from the Inca, which Shi Lei will not remember wrong. At the original hacking technology discussion conference, every participant had to use a real vest to log in. When Maha Kamal introduced himself, he took the initiative to admit that he was an Inca.

The overall national strength of the Inca country is far less than that of the Xia country, but in terms of software technology strength, the Inca people are very powerful. They have built a world-renowned software industry chain and become the world's software outsourcing service providers.

After analyzing the possible suspects, Shi Lei breathed a sigh of relief.

A powerful enemy, not terrible. What is truly terrifying is the unknown enemy! That kind of unknown enemy makes it easy to feel powerless.

"Maha Kamal, hum!" Shi Lei's tone carried a touch of disdain. Maha Kamal's hacking skills have reached world-class levels, but they are far from world-leading.

As long as Shi Lei knew the other party's methods, he was not afraid of the hardware-level loopholes that the other party mastered. This loophole has been made public by the other party, and Shi Lei has personally verified it.

In later generations, supercomputers and large-scale servers that use AMD's server CPU basically do not exist. This hardware-level vulnerability is very tasteless, so Maha Kamal will announce it to increase his reputation.

Shi Lei tried to use the hardware vulnerability as a breakthrough to invade the supercomputer Lightning. As Shi Lei guessed, he easily entered the interior of the supercomputer Lightning, without causing a counterattack from the endless defense system, nor causing Izull's alarm.

"Sure enough!" Shi Lei sighed.

After finding the crux of the problem, Shi Lei immediately began to deal with the hardware vulnerability of AMD's server CPU, wrote the corresponding defense auxiliary program, and used the defense auxiliary program to completely block this hardware vulnerability.

Moreover, once someone uses the hardware loophole again to attempt to enter the supercomputer lightning, they will be anti-tracked by the defense auxiliary program until the real IP address of the other party is found.

After dealing with the defense auxiliary program for hardware vulnerabilities, Shi Lei began to look forward to it. He wanted to see Maha Kamal, how capable he was!

.

ps: Shanshan: I guessed the ending, but not the process! Germany won the championship, but it was in extra time! God damn it! Set up automatic updates at night, goodbye everyone, I'm going to the rooftop!

Chapter 1153/1926
59.87%
HacKerCh.1153/1926 [59.87%]