HK1581 The Peak Has Arrived! 【Happy New Year! 】
.
To recruit members of peripheral organizations, the assessment server used indeed adopted a virtual server solution. Using the resources provided by the IWN secret network, Shi Lei constructed a virtual server. However, this virtual server used Shi Lei's unique technology, even if it was of the same level. Hackers, without spending a lot of time researching, can't tell.
Shi Lei observed the contest between the mysterious hacker and the second assessment server. Just like the first assessment server, the second assessment server was trapped in the mysterious hacker's network from the very beginning.
The level targeted by the second assessment server is mainly the world's second-rate hackers, and the mysterious hacker's skills far exceed this level. Therefore, the mysterious hacker handled the defense system and counterattack system of the second assessment server with ease.
Shi Lei just quietly observed the mysterious hacker's intrusion method and had no intention of intervening. Even though the server in the second assessment was almost powerless to resist, Shi Lei did not take action personally.
In a mysterious room, the mysterious hacker was typing on the keyboard with gloved hands, unhurriedly, without increasing his typing speed.
This means that the mysterious hacker is so confident that he doesn't care about the defense system of the second assessment server or the counterattack system. He is absolutely sure to win!
"The defense strength has been greatly improved!" The mysterious hacker said to himself while dealing with the second assessment server.
Regarding the defense strength of the server, every hacker has his own weights and measures in his mind. The assessment system designed by Shi Lei basically takes the boundaries of the mainstream public as a reference.
The mysterious hacker suddenly stopped typing on the keyboard and deliberately let the second assessment server counterattack, as if he couldn't resist anymore. This is the mysterious hacker analyzing the second assessment server, the plan and intensity of counterattack.
‘The defense strength and counterattack strength of the first server were almost slightly lower than the third-rate level in the world. At the same time, the computing speed of the assessment server is not very good. If the hackers participating in the assessment have reached the world's third-rate level and have computers with reliable performance. There is a good chance of breaking the first server. ’ The mysterious hacker was thinking secretly in his heart.
'As for the current server, the computing speed should have increased by more than ten times, and the defense system is better, almost close to the second-rate level in the world. It seems that this organization does have some strength, at least the assessment system is doing very well. ! ’ The mysterious hacker is in the heart. I couldn't tell whether it was a compliment or a joke.
After all, the mysterious hacker almost ignored the second assessment server, making it a completely one-sided battle. If you're not a mysterious hacker, you'll have to do more than just pass the test. He also needs to restrain the second assessment server from transmitting information and prevent it from being discovered. I am afraid that the second assessment server has been breached by him long ago!
Even with so many restrictions, this mysterious hacker. Still showing shocking strength, the fast cracker tested the server's defense system in the second game.
It takes about ten minutes. All defense systems of the second assessment server were broken through, all counterattack systems were restrained, and the mysterious hacker announced the completion of the second assessment server test.
Inside the second assessment server, the mysterious hacker didn't even spend a minute. The specific link address of the third assessment server has been found.
"Sir, do you want to improve the security defense strategy of the third assessment server?" Yi Zuer observed the intrusion of mysterious hackers anytime and anywhere. Two consecutive tests were easily broken through by mysterious hackers. Based on conditioned reflex judgment, Yi Zuer took the initiative to ask Shi Lei give suggestions.
But Shi Lei shook his head, the situation of the third test must not be changed!
If we upgrade the security defense strategy of the third assessment server, it is very likely that mysterious hackers will discover flaws. After all, the members of the peripheral organizations selected in the third test are not truly elite, so there is no need to spend a lot of effort.
Shi Lei planned to set up a strict security defense system inside the fourth assessment server to try to fight against this mysterious hacker.
After all, the announcement made it clear that once you complete the LE Legend level test, you will be eligible to become a full member of LE, not just a peripheral member.
Under such circumstances, it makes sense that the security defense strategy of the fourth assessment server should be stricter and would not arouse suspicion.
"Yizur!" Shi Lei shouted softly, "Isolate the second assessment server used by the mysterious hacker. Once the other party leaves the second assessment server, prepare to fully analyze the situation of the second assessment server!"
"Yes, Sir!" Yizuer responded to Shi Lei's instructions in the bone-conducting earphones of the LIP lens-type information processor.
In the second assessment server, the mysterious hacker rebuilt the defense strategy just like the first assessment server and made some modifications.
In the first assessment server, the security policy modified by the mysterious hacker did not result in any feedback because the server was reset. This time, the mysterious hacker already has relevant countermeasures.
‘I hope the content of the second assessment server will be reset directly after the use is completed! Huh, I don't believe that this organization, with so many independent servers, must be assessment servers constructed with virtual servers. ’ A sinister smile appeared on the corner of the mysterious hacker’s mouth.
In the second assessment server, the mysterious hacker confirmed the security defense strategy he had built himself from start to finish. He finally nodded with satisfaction, then left the second assessment server and entered the third assessment server.
When facing the third assessment server, the mysterious hacker did not rush to attack, as if he was blocked by the third assessment server, and the two sides were in a stalemate.
But in fact, the mysterious hacker is paying close attention to the situation of the second assessment server!
Although he had lost his connection to the second assessment server after leaving the second assessment server, the mysterious hacker was waiting for his preset method to take effect.
"Sir, the mysterious hacker left the second assessment server. The system has isolated the second assessment server and has not merged into the IWN secret network for the time being." Yizuer prompted.
Shi Lei nodded, "Comprehensively analyze the situation of the second assessment server, focusing on the changes in defense strategies!"
Yizuer executed the order and started the analysis. After waiting for a moment, dense data information was displayed on the virtual transparent screen of the LIP lens information processor.
Shi Lei looked at the data information carefully and couldn't help but take a breath!
The mysterious hacker’s methods are very clever!
Shi Lei had to admit that the mysterious hacker's technology was very powerful. The other party almost completely rebuilt the defense system of the second assessment server and hid the code he needed to execute.
If it were just like this, Shi Lei wouldn't be surprised at all. What really surprised Shi Lei was that the code that the mysterious hacker needed to execute was completely integrated into the defense strategy. If Yizuer's simple routine scan was not carried out, With a full scan, it's definitely possible to miss this problem.
After all, the resources of the second assessment server are only very small. Under normal circumstances, Yizuer will not perform a comprehensive scan, but will simply reset the server, collect the server's resources, and return to the IWN secret network.
The first key piece of the source code that the mysterious hacker implanted in the second assessment server was to prevent the server from resetting and send out deceptive feedback information.
Once the feedback information deceives Yizuer, the second assessment server can join the IWN secret network intact. At this time, it is not the second assessment server, but a broiler server of the mysterious hacker.
The broiler server equivalent to the mysterious hacker is connected to the IWN secret network, and the mysterious hacker has the qualification to view the INW secret network.
What’s even more amazing is that through Yizuer’s simulation, when the second assessment server enters the IWN secret network as the mysterious hacker’s broiler, it will release deceptive information again and integrate into the entire IWN secret network.
‘It turns out that this guy has already determined that the assessment server uses virtual server technology, and he actually wants to penetrate the entire IWN secret network. He is very ambitious! ’ Shi Lei snorted in his heart, but he had to admit that the mysterious hacker’s skills were very strong.
Until this moment, Shi Lei could basically tell that this mysterious hacker was indeed the world's top hacker!
However, the world's top hackers are quite rare globally. Becoming the world's top hacker requires not only the support of technical knowledge, but also strong natural ability.
The top hackers are not given relevant technical information and can follow the technical information to reach the top step by step. If it were really that easy, Li Jian's hackers would have already dominated the world, and would there be any chance for Xia's hackers to succeed?
‘Who is this world’s top hacker? ’ Shi Lei thought about it in his mind. Having had another life journey experience, Shi Lei could pat his chest to express that he knew more or less about the world’s top hackers around the world.
Even though he was an old monster in DARPA's advanced bureau, Shi Lei knew something about the situation! After all, the circle of the world's top hackers is so small that it's hard not to recognize them even if you don't know them when you look up.
Shi Lei once again looked at the virtual transparent screen of the LIP lens-type information processor. Regarding the comprehensive analysis of the data on the second assessment server that tested the mysterious hacker, Shi Lei vaguely had an answer...
.(To be continued ~^~)
PS: How is everyone’s Spring Festival going?