HK1580 The Mysterious Hacker! 【Wishful Spring Festival! 】
.
The designed assessment mechanism is divided into four levels!
To break through the first assessment server, you need to be at the world's third-rate level, not only in terms of attack, but also in defense.
If the defense does not reach the world's third-rate level, it is possible that the assessment server will counterattack, clear out the assessment server, and be eliminated.
After completing the first step of the test, and finding the link address of the second assessment server in the assessment server, trying to invade the second assessment server requires at least a second-rate level in the world, which is also a second-rate level in the world with a balance of offense and defense, and Not second-rate in one aspect.
The third assessment server corresponds to world-class and world-quasi-super-class, while the fourth assessment server needs to completely reach the world-super-class level before it can break through.
The hacker who enters the fourth assessment server is the truly recognized member, and can also be said to be a formal member!
If you want to get a subsidy of 100,000 US dollars per month, you definitely need to know the identity information unilaterally. Otherwise, are you really treating Shi Lei as the enemy?
Among the inspection mechanisms, the first assessment server is the easiest to break through, but Shi Lei is currently observing a hacker who participated in the first assessment.
This hacker is competing with the first assessment server. If we only look at the macro analysis, the hacker's attack and the server's defense strategy are almost evenly matched.
But in fact, Shi Lei discovered something abnormal!
This hacker seemed to have poor skills and could reach the third-rate level in the world. Maybe very powerful. Because, this hacker's attack data did not choose to bypass the defense strategy of the assessment server, but cracked it head-on!
Not only that, this hacker’s cracking method is very clever and will hardly trigger the defense strategy alarm system of the assessment server.
If Shi Lei hadn't happened to discover the existence of this hacker. He also didn't know the hacker's situation. But now Shi Lei accidentally discovered the hacker's intrusion, and Shi Lei quietly observed the hacker.
'Hey, this method is...' A familiar feeling flashed through Shi Lei's mind, but Shi Lei couldn't remember what specific information it was.
In desperation, Shi Lei continued to observe the hacker's intrusion.
The hacker's battle with the first assessment server continues. If I had to describe it in one word, it would be boiling a frog in warm water!
That's right!
This hacker dealt with the first assessment server as if he was boiling a frog in warm water!
He is dismantling the defense strategy of the first assessment server bit by bit. It seems that they are evenly matched, and there is even a faint feeling of being unable to do what he wants, but it is all an illusion!
This hacker showed great strength. The first assessment server was contained, and the first assessment server slowly fell.
Even, Shi Lei set up an information collector inside the assessment server, which was a small measure to collect hacker intrusion plans and defense plans. Also blocked by this hacker.
Shi Lei took a breath of cold air and felt a chill in his heart!
‘Damn it. Who is this guy? It’s so powerful! ’ Shi Lei secretly thought in his heart that the other party could actually stop the information collector. He was definitely not an ordinary person, at least not the so-called third-rate person in the world!
Shi Lei did not alert the mysterious hacker immediately. Instead, he was prepared to continue to observe and see what the hacker's purpose was.
Trying to blend in? Or through the test mechanism, track the relevant server information to collect useful intelligence information.
"Yizur, display all the hacker information that passed the first assessment server. Arrange them in ascending order according to the time of invasion breakthrough!" Shi Lei ordered Yizuer.
"Yes, Sir!" Yizuer immediately put all the hacker information that passed the first assessment server into the virtual transparent screen of the LIP lens information processor.
In the virtual transparent screen, Shi Lei checked the relevant situation. Through the fastest hacker, it only took forty-seven seconds to break the first assessment server!
Shi Lei checked the relevant information of the first place in particular. The information collector of the first assessment server collected relevant information of this hacker.
After analyzing this information, a disdainful smile appeared on Shi Lei's face. This hacker with the fastest speed was not a threat. Because although this hacker did have skills, he used nearly 3tflops of computing resources to complete the first assessment server in such a short period of time.
The computing speed of the first assessment server was less than 0.1tflops. Attacking with nearly 30 times the resources was already using force to defeat skill.
Compared with the hackers Shi Lei was observing, this cracking method was completely inferior!
The hacker who ranked first in passing time was like a gorilla with a brain full of muscles, while the hacker Shi Lei was observing was like a wise man, weaving an unbreakable dragnet and wiping out the first assessment server step by step. , and will not send any message, and will not expose his existence.
‘Who is this guy? More than five minutes have now passed, and this mysterious guy is still fighting against the first assessment server. What does he want to do? ’ Shi Lei guessed while observing.
With the invasion of the mysterious hacker, Shi Lei gradually discovered what the mysterious hacker was doing. This mysterious hacker is not only cracking the first assessment server, but also analyzing the defense mechanism of the first assessment server.
To make matters worse, this mysterious hacker was silently destroying the defense mechanism of the first assessment server, and at the same time rebuilding the defense mechanism through analysis.
Of course, the defense mechanism rebuilt by the mysterious hacker is definitely not the original defense mechanism, and it definitely contains intrusion code belonging to the mysterious hacker.
‘Damn it, did you actually reach this level? ’ Shi Lei paid great attention to it. Judging from the performance of this mysterious hacker, this guy has at least reached the world level, or even the world’s peak level.
Without this level, it would be impossible to conceal the information collector of the first assessment server and rebuild the defense mechanism of the first assessment server.
‘When this guy passes the first assessment server and enters the second assessment server, we can probably judge what level this guy has reached! ’ Shi Lei thought secretly in his heart.
As Shi Lei quietly observed, more than three minutes passed by. This mysterious hacker finally completed the first assessment and found the link address of the second assessment server in the assessment server. .
According to the assessment settings, once a hacker participating in the assessment leaves the first assessment server, the connection to the first assessment server will be automatically disconnected.
The mysterious hacker knew this rule and entered the second assessment server without any hesitation.
Somewhere in a mysterious place, in the dark shadows, a guy whose gender is unclear is typing on the keyboard. Even through the light of the screen, it is impossible to see what the hands typing on the keyboard look like, because this His hands were actually wearing gloves!
"What happened to the server in the first assessment? Let me see what the background is!" The guy hidden in the shadows said to himself. Judging from the voice, it should be A middle-aged man.
This man hiding in the shadows was the mysterious hacker Shi Lei observed. He rebuilt the defense strategy of the first assessment server, and just as Shi Lei predicted, he added his own source code to the defense strategy.
It was a piece of tracking and positioning code. This mysterious man hiding in the shadows was trying to pass the first assessment server and determine the internal network.
If Shi Lei hadn't been very lucky and happened to discover the situation of this mysterious hacker, I'm afraid this mysterious hacker might really succeed.
After all, according to Shi Lei's design plan, once the first assessment server is passed, it will indeed return to the sequence of the IWN secret network.
The mysterious hacker's intrusion method was very clever. He blocked the information collector, rebuilt the defense strategy, and hid the positioning and tracking code in the defense strategy. When the first assessment server returns to the IWN secret network, the tracking and positioning program will be started and relevant information will be sent to the mysterious hacker.
The mysterious hacker can also know the existence of the IWN secret network and further investigate the information of the IWN secret network.
However, luckily, Shi Lei discovered this mysterious hacker and knew that this guy had rebuilt the defense strategy in the first assessment server.
Therefore, Shi Lei ordered Yizuer to conduct a thorough scan and reset of the first assessment server that tested the mysterious hacker.
When Yi Zuer carried out Shi Lei's order, the mysterious hacker actually chuckled, "Reset the server? Well, that's interesting! It seems that all these assessment servers belong to you? Or are they using virtual servers?" technology?"
Since the first assessment server has been reset, this mysterious hacker has lost the channel to obtain more information. He can only continue to invade the second assessment server.
Shi Lei also has more opportunities to observe this mysterious hacker and determine the identity of this mysterious hacker...
.(To be continued ~^~)
PS: Thank you all for your support, thank you all, and wish all my friends a good harvest in love and career in the new year!