HacKer

Hk258 Catch the Broiler, Loophole!

In 2006, the Xia Kingdom had a total of two cyber wars against the Wosang Kingdom. The Woosang Kingdom retaliated once, but retreated in a hurry.

This is because ns intervened without Shi Lei's knowledge. Their official security expert team tracked down the members of the Sakura group, and the Woosang hackers lost their leaders, so the Woosang hackers retreated after a short attack.

Pink Sakura's initial public opinion attack was too sharp, pointing directly at the social problems existing in Xia Guo, which made the leaders of Xia Guo very unhappy.

Fortunately, Pink Sakura ran fast, and ns only dispatched a formal team to pursue it. If Pink Sakura is still in Xia Guo's network, it is not allowed that the twelve expert groups of ns will collectively besiege Pink Sakura.

That pink cherry blossom must kneel! [

In the online world of Wosang Kingdom, Raphael provoked Shi Lei's vest, Mr. M. Shi Lei successfully completed the anti-virus firewall and had the premise to protect himself.

Although Shi Lei participated in the first two wars between the Xia Kingdom and the Wosang Kingdom. But he is either adding to the flames, or behind the shadows, and he has never fought head-on!

This time, the moon virus is raging in Wosang Country, and Raphael is provoking, so Shi Lei decides to bully Raphael!

If you want to bully people, you must first make perfect preparations, such as catching broilers.

There are only two fixed broilers in Shi Lei's hands. The first is the core broiler supercomputer Yan, and Yan is the absolute ace in Shi Lei's hands. With the supercomputer Yan in hand, and with all his defenses, Shi Lei is not afraid of anyone at all!

Of course, just because you're not afraid of anyone doesn't mean you can mess with anyone. For example, the ns of the Xia Kingdom, the International Intelligence Bureau of the Ministry of Foreign Affairs of the Wosang Kingdom, and the Lijian Kingdom and FB, etc.

The supercomputer Yan cooperated to defend, and it was indeed possible to resist them, but this would expose the supercomputer Yan.

If you lose the supercomputer Yan, Shi Lei's strength in the Internet will be reduced by at least half!

Shi Lei's other broiler is the public server of Shuangqing University. This broiler is very weak and can only be said to be Shi Lei's little toy, which can be used for daily tasks. It is impossible to borrow the public server of Shuangqing University at a critical moment.

During the second cyber war between Xia Guo and Wo Sang Guo, Shi Lei abandoned Axios' first-class broiler and the Panshi Firewall, just to protect the supercomputer Yan. That lesson also made Shi Lei remember deeply.

So before bullying Raphael, Shi Lei was going to catch a few more broilers and be fully prepared.

Using the supercomputer Yan, to scan the Internet world in Wosang Country, Shi Lei himself also used Woosang Country's search engine to check the official websites of some high-tech companies, looking for opportunities to take advantage of.

On the search engine, I searched for a while, but did not find a suitable object. Shi Lei touched his stomach, stayed up all night, and slept all day, he was indeed a little hungry now.

Glancing at the scanning progress of the supercomputer Yan, Shi Lei stood up and found some food in the refrigerator, that is, things like bread and milk.

He heated the bread and milk in the microwave. Although it was not delicious, Shi Lei's own cooking skills were even worse. He missed Ouyang Xiang's cooking skills!

After barely finishing the bread and milk, Shi Lei washed his hands and sat back in front of server number 1.

The scan of the supercomputer Yan has returned good news. Supercomputers are rented out, and some companies that need supercomputers have purchased the computing services of supercomputer Yan.

Most of these companies that need supercomputers are high-tech companies, and their own servers are also quite powerful. With the help of the supercomputer Yan, Shi Lei has the authority to connect to the servers of those high-tech enterprises, and traces the reverse direction from the supercomputer Yan to several high-tech enterprises.

Among these high-tech companies, Shi Lei screened two companies with superior server performance and lower server utilization. [

These two companies, like ACCESS at the beginning, rented the supercomputer Yan just to enhance the company's reputation, rather than actually using the supercomputer Yan.

Shi Lei first attacked a company called Leyu Company through the authority of the supercomputer Yan. This enterprise, mainly for other enterprises, provides computer service support.

Their servers are clustered. The so-called cluster mode is the cluster server. Simply describing a cluster server is to make multiple servers work like one server.

For example, the cluster server of Leyu Company has a total of eight independent servers, which improve the stability and computing power through the cluster system.

There are many advantages of using cluster servers. For example, when servers are upgraded, old servers cannot be discarded like this, and the problem of service continuity must also be considered. At this time, if cluster servers are used, new servers can be directly connected. Form a cluster server to directly improve performance.

Another advantage of cluster servers is that if there is a problem with a certain server in the cluster server, other servers can undertake fault-tolerant tasks, isolate the faulty server from the cluster system through dedicated software, and the remaining servers, through Load transfer mechanism between servers to re-implement load balancing. At the same time, give security personnel on duty to prompt the existence of the faulty server.

The unx system adopted by Leyu Company's cluster system can accommodate up to eight independent servers, and they have also configured eight independent servers to reach the limit.

Shi Lei knows another cluster system that can support 96* independent servers, that is Compaq's openvms!

However, as early as 2002, Compaq had been acquired by Hewlett-Packard, which caused HP's servers to become more and more powerful.

The unx cluster system adopted by Leyu Company is equipped with eight high-end servers with a computing speed of 02tflop\s. The integrated cluster server has a computing power even more powerful than the server group of ACCESS by about 60%.

With the help of the supercomputer Yan, Shi Lei successfully invaded the cluster server of Leyu Company and began to execute his own invasion plan.

The advantages of clustered servers are obvious, but there are also disadvantages.

Since cluster servers have fault-tolerant tasks with each other, when a certain server runs an application failure, or a certain server fails, other servers will open the application again due to fault-tolerant tasks, and take over the application located on the shared disk. The data area on the cabinet, thereby allowing the faulty application to re-run.

This mechanism is very good and one of the advantages of clustered servers, but it is also one of the disadvantages of clustered servers.

The process of application takeover generally requires three steps.

The first step is to detect fault-tolerant tasks and determine whether the fault really exists. The second step is to restart a server in the cluster server and restart the application in error. The last step is to take over the data area of ​​the shared disk enclosure.

If the application of a certain server fails, other servers in the cluster take over the application, which takes a certain amount of time. And this time depends on the size of the application in question, the larger the application, the more time it takes!

In response to this mechanism, which is both an advantage and a disadvantage, Shi Lei found a large-scale application running in the cluster server of Leyu Company.

After forcibly suspending this large-scale application and isolating the independent server, the cluster server of Leyu Company, under the management of the fault-tolerant task mechanism, starts the application from another ** server, and then the load transfer mechanism begins to adjust the remaining seven servers. Load balancing of servers.

When load balancing is deployed, the system resource occupancy rate of the cluster system is the highest, and the system defense is the weakest. With this moment and the power of the supercomputer Yan, Shi Lei invaded the core of the cluster system and captured the super authority!

Obtaining the super authority of the cluster system, that is to say, mastering the cluster server of Leyu Company, making him his own broiler!

Shi Lei laughed, and numbered the newly acquired Leyu company broiler as the second server for his own memory. [

After securing the Leyu Company, Shi Lei did not stop and continued to move towards the second goal.

The second target, named Pukong Technology, is a scientific research enterprise, and their servers are actually cluster servers.

However, the cluster server of Pukong Technology is different from that of Leyu Company. The cluster server of Leyu Company is composed of eight independent servers under the unx cluster system to form a whole. The cluster server of Pukong Technology is simply composed of two servers, one main server and one standby server.

This architecture is another form of cluster server. The main server undertakes all services. Only when the main server fails, the standby server takes over all the tasks of the main server.

Shi Lei checked that the main server's performance reached 1tflop\s, and the backup server's performance also reached 05tflop\s. The two servers combined are also more powerful than the core server group of ACCESS!

For this kind of cluster server, Shi Lei is quite handy!

Shi Lei invaded the periphery of the main server, wrote a message simulating a problem with the main server, and passed it to the standby server. The standby server immediately starts to take over the task of the main server, and the two servers will activate the priority judgment program of the cluster system at the moment of taking over.

The primary server does not fail and needs to execute all applications; while the standby server needs to take over all tasks because it receives the failure information of the primary server.

When the primary server and the backup server conflict, the cluster system will activate the priority judging program to verify whether the primary server is normal.

This conflict time and verification time are very short, but it is enough for Shi Lei, who is the world's top hacker, to break through into the cluster system of Pukong.

After successfully entering the system, Shi Lei tried to obtain super permissions, but he actually discovered a classic loophole!

Pukong's cluster system is also an unx system. Shi Lei just analyzed it for a moment, and then laughed out loud.

"What an idiot! To make such a big mistake!"

(To be continued. Please search [], the novel is better and faster!)

Chapter 270/1926
14.02%
HacKerCh.270/1926 [14.02%]