HacKer

Final-067 Is Still Not Enough!

.

The needle in the haystack project is the only solution that can discover the real IP address of Butler's parent server.

Although this plan will consume huge resources, Shi Lei doesn't care!

Shi Lei only cares whether he can discover the real IP address of Butler's parent server, and when he can find out the real IP address of Butler's parent server.

Shi Lei's confidante has already entered the sight of the god of death. If you want to save them all, you must race against the god of death.

Especially Ling Yumo, she now has less than 115 hours of life left!

Izull started the project to find the needle in the haystack, the logic analysis program has been started, and began to analyze every IP address in the Internet world, as well as the subnet under the IP address and so on.

The most important thing about the needle in the haystack plan is the grading system!

The so-called grading system is to classify IP addresses within the Internet differently, and divide them into different degrees of attention according to different levels.

Through the grading system, the workload of the haystack plan is effectively reduced. Just like the work of screening soybeans, if black beans are mixed in, the black beans must be excluded first.

Now, the grading system of the needle in a haystack program is to divide different IP addresses and which users belong to. According to the restrictions set by Shi Lei, the rating system will first exclude the IP segment of individual users, and then exclude the IP segments related to known institutions, enterprises, government departments, etc.

After excluding the IP segments of individual users, business users and government agencies, the remaining IP addresses that need to be analyzed are greatly reduced.

Through the grading system, the workload of finding the needle in the haystack can be reduced by at least half!

IP addresses that are not excluded will also be classified. According to the level of threat level. From low to high, they are safe, unknown, and suspect.

Among them, the security level is 100% certain, and it is definitely not the real IP address of Butler's parent server, so it will be placed in the security level.

Unknown level is that after Izual's preliminary scan, the situation cannot be determined. will be classified as unknown. Because, if the situation cannot be determined after Izuer's preliminary scanning, if Izuer performs further scanning tasks, more computing resources will be required, thus dragging down the overall progress of finding a needle in a haystack.

In order to avoid such a situation, Shi Lei set to discover an IP address of unknown level. If it is directly listed in the unknown level, the system administrator will be notified, and the system administrator will scan and analyze it himself.

The last suspect level was that after Izuer conducted a preliminary scan, he directly discovered the IP address. It may be the real IP address of Butler's parent server.

The number of suspect levels is definitely not too many. Setting this level is just for precaution!

"The construction of the grading system is complete. The needle in the haystack plan is officially launched!" Yizuer reminded again.

In the virtual transparent screen of the LIP lens-type information processor, it is displayed that the plan to find the needle in the haystack has officially begun. The first screening area for the needle in the haystack program. Chosen by Shi Lei in Lijian Kingdom!

After all, both the organization and the Angel Council are rooted in the Kingdom of Lijian. Another life journey. Shi Lei knew that Abertier's parent server was located in the country of Lijian.

The computing resources gathered by the IWN secret network, through the private neutrino communication network of Mirui Technology Group, have all poured into Lijianguo, and began to scan the entire Internet world of Lijianguo.

More than 1 million Tflops of computing resources have flooded into the Internet world of Lijian, almost scaring the CIA and the FBI's network security departments!

With such huge computing resources, neither the CIA Central Intelligence Agency nor the FBI FBI can guarantee that they can stop it 100%.

Even those computing resources are only loosely distributed computing resources. When the loose distributed computing resources converge to a certain level, it is still very scary.

fortunately!

The cybersecurity departments of the CIA and the FBI found out that millions of computing resources pouring into the Internet world of Lijian are just scanning the cyberspace, and they don’t seem to have any intention of sabotage. They breathed a sigh of relief for the time being. .

Lijian is a democratic and open country, at least on the surface!

Whether it is the CIA Central Intelligence Agency, the FBI Federal Bureau of Investigation, or their boss NSA National Security Agency, or even the big brother DARPA Advanced Bureau, their internal networks, in the Internet world, all have access points, even open access port.

All well-known hackers know the access points to their internal networks.

Including the government's network, as well as the military's network, access to the Internet world is no secret. Servers that really store shady data are definitely in an environment that is isolated from the Internet, even without electronic data.

Therefore, the network security departments of the CIA and the FBI found that millions of computing resources poured in, just when searching for IP address information in the online world, all were relieved.

If the actual controller of this millions of computing resources wants to conflict with Li Jian Nation, or wants to steal Li Jian Nation's confidential information, it is absolutely impossible to scan IP address information in the online world. Directly roll up the sleeves to the determined target.

Now, the behavior of millions of orders of magnitude computing resources clearly shows one thing, millions of orders of magnitude computing resources are looking for hidden targets, and it should be a personal grudge, not to steal the official secret information of Li Jian Nation.

The results of this analysis reassure experts from the CIA, the FBI, and the FBI, and experts in the cybersecurity department, but they are secretly worried.

After all, millions of computing resources have rushed into the online world of Lijian Nation, even if there is no malicious intention for the time being, but what if it shows malicious intent?

No one can guarantee that the other party is malicious, right?

In order to prevent millions of computing resources from invading the official network of the country, even the military network, the CIA Central Intelligence Agency and the FBI Federal Bureau of Investigation began to prepare countermeasures.

If Shi Lei knew about their concerns, Shi Lei would definitely sneer at him. How could Shi Lei waste time and computing resources and invade Li Jian Nation's network system?

No kidding!

How precious Shi Lei's time is, under such circumstances, it is absolutely impossible to waste time with them!

"Brother Stone, unknown IP addresses have been marked with 27. Which one should we start with?" Tao Wenxian asked Shi Lei.

"Just these two!" Shi Lei directly selected two of the addresses as the first batch of unknown-level IP addresses preferred for manual analysis.

Tao Wenxian showed a puzzled look. Could it be that Shi Lei chose two addresses at random?

Instead of Shi Lei, Rafael explained, "Both IP addresses are from New York!"

Tao Wenxian coughed. He obviously didn't have the hobby of memorizing where IP addresses belonged. Anyway, investigating the real addresses corresponding to IP addresses is not a difficult task. Why do you want to memorize them?

In order to cover up his embarrassment, Tao Wenxian instructed: "Yizur, mark all IP addresses of unknown level with their attributions."

Shi Lei didn't make fun of Tao Wenxian. After all, there were no regulations, saying that the world's top hackers need to record the attribution of IP addresses.

Of course, quite a few hackers do record where the IP address belongs, so that it is convenient to directly and quickly determine the region to which the IP address belongs.

The two New York City IP addresses that Shi Lei chose were mainly because the parent server of Abertier of the Angel Council was located in New York City.

Don't think that New York City is too prosperous and the target is too big, and the Serpent of Chaos will not put Butler's parent server in New York City.

In fact, such a possibility exists at all!

As the saying goes, great things are hidden in the city!

What if Butler's parent server is in New York City?

The answer to this question, no one can be sure of the answer until the final result comes out!

Shi Lei and the three quickly scanned and analyzed two unknown-level IP addresses. One of the unknown-level IP addresses was also invaded by three people. They found that the unknown-level IP address was a well-defended cross-border website, mainly providing privacy for overseas. Love action art movie download service.

Shi Lei was very kind and didn't tamper with the other party's data server. After all, this kind of good person has served too many otaku in need, so he can't cut off the otaku welfare, right?

The two unknown-level IP addresses that Shi Lei picked out had nothing to do with Butler. Shi Lei was not surprised by such a result.

If it was so simple, Butler's real IP address was discovered, why did Shi Lei need to fight?

There was no result for the preferred target. Shi Lei and the three began to analyze each unknown IP address. As the three and Izuer worked synchronously, one IP address after another was cracked, but still no answer was obtained.

Shi Lei took time to look at the implementation progress of the needle in a haystack. It was half past twelve, and the needle in a haystack had been implemented for half an hour, but the implementation progress was very poor!

The first screening area for the needle in a haystack project was Lijian Kingdom. In half an hour, the screening progress was only less than 3%!

This means that there is only one Lijianguo, and it takes at least 20 hours to completely traverse every IP address in Lijianguo's network world!

The whole world is so large, the real IP address of Butler's parent server may exist in the network space of any place.

How could Shi Lei have so much time, slowly, searching for each area one by one?

In short, the computing resources Shi Lei mastered were still not enough!

.(To be continued ~^~)

Chapter 1866/1926
96.88%
HacKerCh.1866/1926 [96.88%]