HacKer

HK1552 Weaknesses and Black Hands!

.

There is really not much difference in protection power between the three-layer protection network composed of 324 temporary broiler servers and the triangular defense network composed of three supercomputers.

However, when the three-layer protection network faced the mysterious intruder, it collapsed as quickly as an avalanche. It seemed that there was no resistance at all. It was like a lamb facing a pack of wolves, only to be slaughtered.

On the contrary, Shi Lei did not have high hopes for the triangle defense network, which brought him an unexpected surprise. It successfully blocked the fierce intruder, allowing Shi Lei to reversely analyze the intruder's attack data.

By analyzing the intruder's attack data, Shi Lei discovered some clues. The intruder's attack data was not pure attack data, but highly paralyzing comprehensive data.

The Triangular Defense Network consists of three supercomputers. Among them, the supercomputers located in Lijian and the British Empire are private supercomputers of high-tech companies. The computing task of this kind of supercomputer is very simple. It only handles the company's computing tasks and basically has no other computing tasks.

The supercomputer located in Wasang Country is affiliated with Osaka University. It is an academic supercomputer with complex computing tasks and a large number of data processing tasks.

Shi Lei analyzed the intruder's intrusion data and found that the intruder's intrusion strategy was to impersonate the normal computing task data of Osaka University's supercomputer and mix the intrusion data with the normal computing task data, thus trying to successfully hide the secret.

But the mysterious intruder never expected that Shi Lei didn't care about the control of the three supercomputers and directly used the mission simulator to fully control the supercomputers.

In other words, although the three supercomputers appear to be performing their own computing tasks. But in fact, they did not perform any computing tasks at all, but invested all their computing resources into the defense system that Shi Lei needed.

When a mysterious intruder pretends to be the normal computing task data of Osaka University's supercomputer, he tries to pass the supercomputer's defense strategy and endless defense system. When entering the supercomputer, it was directly intercepted by the endless defense system.

If Shi Lei did not choose the plan of burning both stones and squeezing all the computing resources of the three supercomputers, but carefully reserved the computing tasks of the three computers, then the endless defense system would not prevent the normal computing tasks of the supercomputers. Intrusions can quickly break through supercomputer defense strategies and endless defense systems by impersonating data.

The reason why the three-layer protection network was quickly broken through is for this reason. Directly killed by the mysterious intruder. It's not that the Endless Defense System has no effect, it's that the weakness of the Endless Defense System's defense strategy has been exploited by the mysterious intruder.

Of course, the defense strategy weaknesses of the Endless Defense System can only be exploited on external networks. If you want to exploit the weaknesses of the endless defense system in the internal network of Mirui Technology Group, it is absolutely impossible.

The internal network of Mirui Technology Group is completely under the control of Yizuer. Yizuer controls all data calculation tasks, and the endless defense system will never let any unauthenticated data enter the internal network of Mirui Technology Group.

so. The defense strategy weaknesses of the Endless Defense System can only be exploited by external networks. Moreover, once Shi Lei chooses to die together, the weaknesses of the endless defense system's defense strategy will disappear.

The intrusion method of the mysterious intruder was determined. Shi Lei breathed a sigh of relief. The invading party was not omnipotent, and Shi Lei had more options to deal with.

"Damn guy, I was almost scared by you. Now it's my turn to deal with you!" The fingers of Shi Lei's hands brought up a series of afterimages on the keyboard, and large sections of source code were displayed on the screen.

The triangular defense network composed of three supercomputers successfully resisted the intruder. Although the intruder gradually increased its computing resources, the triangular defense network supported by the IWN secret network showed no signs of collapse.

Shi Lei checked the intruder's situation while tapping the source code. So far, the attack resources used by the mysterious intruder have reached 200tflops. The loose distributed computing resources injected into the triangle defense network by the IWN secret network have reached the level of 800tflops.

Based on the ratio between the two, Shi Lei determined that the computing resources used by the intruder were intensive distributed computing resources, which meant that the intruder had a private supercomputer.

Worldwide, there are only a handful of private supercomputers with speeds reaching 200tflops. There are only a handful of supercomputers that are not open to the public.

Because maintaining the normal operation of a supercomputer is a huge continuous investment. Supercomputers are different from personal computers. The continuous use cost of personal computers is very low. Supercomputers are different. Ordinary forces simply cannot afford a computing speed of 200tflops. Supercomputer operating costs.

"The government of Lijian?" Shi Lei's first target of suspicion was the government of Lijian. It was rumored that the government of Lijian had secretly built a large number of supercomputers, and through these supercomputers, it was making waves on the Internet around the world.

However, Shi Lei immediately denied such speculation!

The reason is simple. The mysterious intruder's attack resources are stuck at 200tflops and have not continued to increase. If the mysterious intruder is the Li Jian government, then the attack resources of the mysterious intruder will definitely continue to increase until the triangle defense network is completely defeated.

But now, the triangle defense network is impregnable, and the mysterious intruder is blocked by the triangle defense network on the outside. There is no way to go further.

"Since it's not the government of Li Jian, then who is it?" Shi Lei said to himself again.

It is never a simple matter to investigate the identity of a hacker, especially the identity of a master hacker, which is a secret among secrets.

The mysterious intruder is a master, an absolute master. The other party keenly grasped the weaknesses of the endless defense system's defense strategy, and thus defeated the three-layer protection network with overwhelming force, which has proved the opponent's identity as a master.

There are only three ways to investigate the other party's identity.

First, Shi Lei reversely traced the other party's real IP address to investigate the intruder's computer information and actual address information. Determine the identity of the other party.

This method is not very reliable. The mysterious intruder's technical strength is very high. It is definitely not that simple for Shi Lei to reverse intrude and investigate the real IP address of the other party.

The second method is even less reliable, and that is to directly ask who the other party is. While there is a certain chance of success with this method, those odds are about the same as winning the lottery jackpot.

The only reliable one is the third method. That is, Shi Lei and the mysterious intruder attack each other, and then use the other party's attack methods to determine the possible identity of the other party.

If Shi Lei and Raphael attack each other, Shi Lei can tell in a short time that the hacker opposite is Raphael.

If the mysterious intruder this time is a hacker familiar to Shi Lei, the two parties will attack each other. Shi Lei might be able to determine the other party's identity.

However, the other party will definitely not be able to determine Shi Lei's identity through this method! Because Shi Lei was reborn, there were very few hackers who came into contact with him in this life. Naturally, there are only a few hackers who are familiar with Shi Lei's attack methods.

After confirming the execution plan, Shi Lei immediately called on the computing resources of the IWN secret network to bypass the battlefield of the mysterious intruder and the triangle defense network. Start tracking the mysterious intruder in reverse.

Although the mysterious intruder is a master among masters, Shi Lei is also the world's top hacker. Shi Lei stood at the pinnacle of the hacker world, even though Shi Lei didn't think that the real IP address of the mysterious intruder could be found by reverse tracing it. But Shi Lei didn't give up either.

The IWN secret network has assembled 1,700 tflops of computing resources, of which 800 tflops of computing resources are used to support the triangle defense network and fight against mysterious intruders.

Shi Lei transferred another 900 tflops of computing resources and directly followed the mysterious intruder's attack data channel in reverse direction.

The huge reverse tracking data made the mysterious intruder immediately aware of Shi Lei's actions. The mysterious intruder reacted quickly and directly canceled the attack on the triangle defense network, withdrawing 200tflops of intensive distributed computing resources to block the attack. Enter the data channel invaded by Shi Lei and confront Shi Lei.

However, the mysterious invading party underestimated Shi Lei. The mysterious invading party's reaction was indeed very fast, but with the assistance of Yizuer, Shi Lei's reaction speed was also very fast.

When the mysterious intruder withdrew its attack data resources on the triangle defense network, Shi Lei almost simultaneously ordered Yi Zuer to invest the 800tflops computing resources of the IWN secret network into the reverse tracking attack sequence.

Originally, the mysterious intruder used 200tflops of intensive distributed computing resources to resist 900tflops of loose distributed computing resources, which already seemed to be a bit stretched.

Now, another 800tflops of loose distributed computing resources join the attack sequence, immediately crushing the mysterious intruder's 200tflops of intensive distributed computing resources to pieces.

With 1700tflops of computing resources, the mysterious intruder could only retreat step by step. Just as the mysterious intruder shattered the three-layer protection network at the beginning, Shi Lei continued to break through the mysterious intruder's defense.

It is not that the mysterious intruder did not resist, but the mysterious intruder miscalculated the computing resources Shi Lei had control over. The struggle between hackers, when their technical strength is about the same, is often a battle over hardware performance.

In film and television works, the use of laptops to kill supercomputers can only appear in film and television works after all. In reality, unless the laptop is just a front-end device, the background is connected to a huge cluster of computing resources. Otherwise, how could a laptop break through a supercomputer's defenses?

In an increasingly modern era, what was once a hacker war has evolved into a hardware war!

Shi Lei has powerful hardware resources, or Shi Lei has powerful hardware resources through the World of Braves and IWN Secret Network. To a certain extent, Shi Lei is already much more powerful than the average world-level hacker.

As Shi Lei's reverse invasion progressed, Shi Lei broke down the defense systems of the mysterious intruder one by one, and Shi Lei gradually guessed the identity of the mysterious intruder.

The characteristics of the mysterious intruder are very obvious. First of all, they control 200tflops of computing resources. At the same time, they have powerful hacking skills, and they also have issues with Shi Lei. Taken together, the identity of the mysterious intruder is already clear!

.(To be continued ~^~)

Chapter 1573/1926
81.67%
HacKerCh.1573/1926 [81.67%]