The War of HK1391 Is Never Far Away!
.
It was nearly eight o'clock in the evening. ? .
According to Shi Lei's instructions, Tao Wenxian hacked into the internal network of the FBI and successfully contained the network defense forces of the FBI and the CIA.
Shi Lei didn't follow him into the FBI's internal network, but took advantage of the fact that the CIA Central Intelligence Agency was supporting the FBI and killed him!
Shi Lei has a better understanding of the cia CIA. He knows that the cyber security force of the cia CIA usually has an action notification when it is in action.
The action notification usually explains the reason for the action, and the purpose of the action. Of course, this action notification belongs to automatic deletion information, which will be automatically deleted when it is read or the preset storage time expires.
Shi Lei plans to invade the CIA's internal network, so as to restore the relevant notification information in the CIA's notification system data server.
As for whether it will be successful, Shi Lei does not know for the time being.
After all, the CIA's notification system data server, in addition to having a strict defense strategy, the storage medium they use is not an ordinary mechanical hard disk.
Under normal circumstances, the data information is first stored in the memory temporarily, and then written into the storage medium. However, the notification system of the cia Central Intelligence Agency needs to process a lot of data every day, and it needs to be highly confidential. Therefore, the cia Central Intelligence Agency uses the nandssd storage technology. This storage technology far exceeds the read and write speed of mechanical hard disk storage technology. It is the next generation storage technology and will be widely used in the future.
Compared with HDD mechanical hard disk technology, nandssd has many advantages. But for Shi Lei, under the current situation, this technology is extremely pitiful.
Because Shi Lei wants to recover the data, read the notification information from the CIA. The technology of recovering data is very convenient to put on the HDD mechanical hard disk. Even the data ten years ago can be read out.
But nandssd technology is different. The theory of storing data is different!
It is very difficult to recover data from the nandssd hard drive. Shi Lei can only hope that the notification system data server of the CIA has not performed data cleaning operations for the time being, so that it is possible to obtain relevant data information.
otherwise. It's really not possible to recover deleted data from nandssd hard drive.
Shi Lei instructed Yizuer to not immediately invade the CIA's internal network after preparing the computing resources, but to find a better way to invade.
"Yizul, catch a broiler server used by the CIA Central Intelligence Agency to invade the Dreamer online payment system." Shi Lei thought of a good method. According to Shi Lei's past habits. He likes to start directly from the official website of the cia CIA, from the official website to force the intrusion, breaking the defense of the internal network.
This method seems stupid, and it makes it look like it is very easy to find. actually not. Just a little camouflage. cia, the security experts of the Central Intelligence Agency, will only think that this kind of intrusion is a test by unknown hackers, and will not attract attention.
Although the direct intrusion method is very safe. But Shi Lei didn't want to do that. Because, that way of invading. The probability of failure is the greatest, and once it is discovered, the security experts of the CIA will definitely track it up, which will cause a more troublesome anti-tracking problem.
Therefore, Shi Lei chose a more covert anti-tracking solution, directly from the cia CIA's broiler server, along the cia CIA's intrusion route, and traced back in the past, and entered the computer that the cia CIA issued the intrusion.
This scheme is more stealthy, but also more dangerous!
Because the ultimate source of the intrusion must be the security experts of the Central Intelligence Agency in cia, and they are operating the computer to hack the Dreamer online payment system of the Dream Entertainment Company. The slightest bit of mishandling will be discovered by cia CIA security experts.
Or should not be said cia CIA security experts!
Because this part of the staff, like the mysterious temporary workers in the Xia country, they do not have the establishment of the CIA Central Intelligence Agency, nor do they have any identity records.
Even if Shi Lei accurately tracked their location information, there was no way to label them as CIA employees.
So in the face of these guys who are considered temporary workers, Shi Lei really only has to confront each other, instead of saving relevant evidence, causing a lot of uproar.
According to Shi Lei's instructions, Yizuer quickly grabbed an unimportant broiler server. This broiler server did not transfer many data streams. Shi Lei successfully traced the data stream and went upstream to trace the source.
About two minutes later, Shi Lei didn't arouse the other party's vigilance, and directly killed the other party's computer. Then, using the other party's computer as a springboard, he entered the CIA's internal network naturally.
In the internal network of the CIA, Shi Lei scanned the notification information, but since the CIA dared to release the notification information so boldly, and also explained the reasons and goals in detail, it proved that they had great confidence in the notification system.
Shi Lei did not find any notification information!
Fortunately, Shi Lei didn't expect to get the information directly at first. He entered a string of codes on the keyboard with both hands, and Izuer immediately scanned the data server of the CIA notification system.
This special data server does indeed use nandssd hard disk storage technology. In just a few seconds, Izuer had already scanned the entire disk in view of the excellent performance of the nandssd hard disk.
However, there is still no remnant of the notification message found!
Shi Lei scanned it once, but also found no relevant information. It seems that it should notify the data server of the system to let nandssd execute the secure.erase command, which is the secure erase command.
This command is a special command for nandssd hard disks. It can clean up the data residues of SSDs very cleanly. It is not like ordinary HDD mechanical hard disks. Even the data ten years ago can be preserved.
Shi Lei frowned and looked at the information displayed on the screen of the No. 1 server. If the information could not be obtained from the notification system of the cia CIA, would it be the only way to tear up the face with the cia CIA?
This is Shi Lei's unwillingness!
'Yes, there is another way! ' Shi Lei suddenly thought of a solution, not for the nandssd hard drive, but a different way of thinking.
Being a world-class hacker requires not only excellent technology, but also a quick mind. Since the information cannot be obtained from the CIA's notification system data server, why not obtain the required information from the computers of the relevant security personnel who are notified?
Shi Lei smiled and returned to the security expert's computer that had previously connected to the broiler server. In the 8 years, although the nandssd technology has matured and been put into use, the cost is still very high, and the general computer is not installed.
The security expert still uses an ordinary mechanical hard drive. It's not that he can't afford the cost of the nandssd hard drive, but it's completely unnecessary.
The notification information issued by the cia Central Intelligence Agency, if it remains in the internal system of the cia Central Intelligence Agency, and the relevant information is intercepted by hackers, it is indeed a big news.
But this piece of information has flowed to the outside, and it is nothing at all!
Is it still possible to prove the guilt of the CIA because of a piece of information? That's just hilarious! If there is such a simple thing, Shi Lei can forge a hundred pieces of relevant information every day to slander the CIA.
Although the clues have been found, and the feasibility has also been determined. But Shi Lei suppressed his excitement and carefully scanned the computer of the security expert.
Because this computer has been used by security experts all the time, once there is a little bit of abnormality, or triggering the security trap set by the other party, Shi Lei will declare that the action has failed.
Ordinary HDD mechanical hard disk has a big drawback, that is, whether reading data or writing data, the hard disk light will always be on.
Shi Lei first needs to hack into the computer's motherboard bios system, and change the programs fixed in the bios system, so that the hard disk light can be reduced when the hard disk is read and written.
This is not an easy job!
It's too simple to just turn the hard drive light off. But this security expert is using the computer. If the hard disk light is off, and he himself is writing or reading data, isn't it obvious that there is a problem?
Shi Lei carefully modified the information of the bios system. It took about ten minutes to finally modify the program to control the hard disk light.
"Let me see what's the reason!" Shi Lei scanned the security expert's computer hard drive, and the scanning speed was very slow because he was afraid of causing the security expert to be alert.
After waiting for about half an hour, Izuer finally finished scanning and resumed reading the information that was deleted today. information.
After less than half a minute of screening, Izuer displayed a message on the virtual transparent screen of the ip lens-type information processor.
Shi Lei also finally knew why the CIA CIA desperately bit the online payment system of Dream Entertainment!
'According to the latest information received, Dream Entertainment's online payment system for Dreamers will facilitate money laundering services for some criminals in our country. The information comes from the well-known hacker Raphael and is highly credible. Perform tasks, hack into the online payment system of Dreamer, and confirm the source of funds and related trader information for each transaction. ’
Shi Lei's expression froze, Raphael?
.)