HacKer

Hk300 Premeditated so Plan

ps: The new work is No. 1 on the best-selling list and No. 7 on the overall best-selling list. We have won again! Council of Angels, hehe [please subscribe, measuring the performance of a book is a subscription to a book, I hope brothers and sisters who can support it can be generous, and the daily subscription costs 18 cents to 36 cents , give Mushan a little support! ]

The official website of jfs adopts a very extreme setting, that is, the extension technology of one-way link, one-way data transmission. There are advantages to doing so, but there are also obvious disadvantages.

The obvious disadvantage is that normal users browse the official website of jfs and want to apply for any data. The web server does not have the authority to issue applications, and can only passively wait for the internal data server to detect the application and then give a reply.

As a result, the official website of jfs, the browsing speed is greatly reduced. [

If it is another website, if the browsing speed is so slow, it will definitely be run on similar websites. But where does jfs come from?

If you have to say peers, maybe s and count their peers. It's just that jfs wants everyone to browse the official websites of s and s and cause confusion for them.

At this moment, the official website of jfs is under attack. And it is a very hidden attack method. If Shi Lei is not very proficient in computer technology, he probably would not have discovered it!

After discovering that someone was attacking JFS, Shi Lei didn't act rashly, but sneakily followed behind to see what their purpose was.

Best to have something cheap to pick up!

Follow the intruder. Shi Lei found that they had more than ten offensive data streams in total. He secretly guessed in his heart, these guys who invaded jfs. Could it be the Dark Night Dynasty?

Shi Lei picked one of the intruded data streams and tracked the other party's p-address in reverse. After breaking more than 30 broiler servers in a row, Shi Lei finally discovered the other party's real p-address.

It is the p address of Xia Guo, and the corresponding real address, Shi Lei did not check carefully, only knew that it was in the capital!

It is rumored that the boss of the Dark Night Dynasty, Dark Night, is a person from the capital.

Confirming the conjecture in his heart, Shi Lei became even more curious. Could it be that the Dark Night Dynasty ate the gall of a bear's heart and a leopard, and dared to provoke JFS?

The power of jfs, roughly speaking, is about twenty times larger than that of the Hacker Union. If jfs wants to win the hacker alliance, it is estimated that in the hacker alliance, except for the core members who can escape, whoever wants to win will be taken!

even core members. There is also a considerable chance of being tracked!

The Night Dynasty and the Hacker Alliance are both second-generation hacker organizations, how dare they provoke JFS?

But since they are invading jfs now, it means that they have something to rely on, otherwise it is impossible to come directly to die, right?

Shi Lei didn't know the support of the Dark Night Dynasty, but since the other party was willing to spread the firepower of JFS for him. Shi Lei was naturally very happy. The last time in the International Intelligence Bureau of the Ministry of Foreign Affairs, in the confidential information server, in order to frame Raphael, Shi Lei deliberately moved a folder named 'so plan'.

That so plan made Shi Lei very interested!

A robot plan after all. It has brought an excellent background to Shi Lei's future development. If in the International Intelligence Bureau of the Ministry of Foreign Affairs. What good things can be found, then Shi Lei will never be polite.

The attack of the Dark Night Dynasty, jfs has not yet discovered. As a compatriot, Shi Lei was embarrassed to pit them. Anyway, in the web server of the JFS official website, there is a very hidden alarm mechanism, and they will definitely trigger that mechanism and attract the attention of the JFS security experts.

Shi Lei only needed that time to sneak into the jfs internal network based on the system backdoor he left behind to find what he needed. [

While monitoring the movements of the Dark Night Dynasty, Shi Lei connected to the internal data server of the Tokyo Metropolitan Earthquake Prediction Agency.

In the earthquake prediction agency, Shi Lei's plug-in left in the earthquake prediction software is still working normally. Through records, Shi Lei discovered that the earthquake forecast for Kanagawa County had not yet appeared.

Instead, it prevented a felt earthquake and changed the data to a felt earthquake. The plug-in works normally, and everything is executed according to Shi Lei's script.

Just when Shi Lei felt chatting and was about to tease Haneda Airport, on the JFS official website, the Dark Night Dynasty triggered and activated the alarm mechanism.

Xia country time, it is now 6:10 pm, Wosang country time is 7:10. Due to the cyber war between the two countries, all the security experts of JFS did not take a break from get off work, but held a breath, and they could be ready at any time. Prepare to rescue the cyber world of Vosang.

The security experts of jfs, being molested by Mr. M repeatedly, are already full of ghosts and venting.

When the Dark Night Dynasty triggered and activated the alarm mechanism of the JFS official website, it was as if a hornet's nest had been stabbed. Twelve official security expert groups and twenty-seven preparatory expert groups were all killed.

The people of the Dark Night Dynasty were bitten by the JFS security experts before they could realize what was going on, and they desperately tracked their real p-addresses.

Shi Lei was waiting for this opportunity. Taking advantage of the JFS security experts who bullied the Dark Night Dynasty, Shi Lei immediately sneaked into the JFS internal local area network.

The system backdoor written in assembly language sinks into the bottom layer of the system, and it is really powerful. Many security experts of jfs have not found the existence of the system backdoor.

After Shi Lei entered the internal LAN of JFS, he quickly searched for their confidential information server. The confidential information server has been found last time, this time Shi Lei did not spend much effort to find the confidential information server.

After entering the confidential server, Shi Lei felt a little uncomfortable in his heart. Came in because it was too easy, like there was no defense at all?

Inside the confidential server, Shi Lei first discovered the so plan, as well as various other confidential information. For example: South Vietnam Forest Project, Indonesia Island Project, Nanyang Project and so on.

Shi Lei did not open any information rashly. Instead, the file system is analyzed first.

The first analysis is the so plan, and nothing useful can be analyzed from the name of this plan. It's not like other plans. More or less can analyze some information.

For example, the South Vietnam Forest Project can be analyzed, it is related to the South Vietnam country, and it is related to the forest plan. South Vietnam is very rich in forest resources, perhaps Woosang is paying attention to this aspect.

Shi Lei had read a report before that there are many native forests in Wosang, but they do not develop their own forest resources, but import wood from Xia. Such behavior. It not only met the wood demand of Wosang Kingdom, but also caused serious damage to the forest resources of Xia Kingdom.

However, some people in Xia Kingdom could not see the facts clearly, and they tried every means to sell the wood to Wo Sang Kingdom.

Returning to the topic, Shi Lei analyzed the file system of the so plan and found that it was limited by the file system. It cannot be opened directly, cannot be deleted, cannot be moved, cannot be copied. In short, it means nothing!

Shi Lei was very distressed about this kind of document!

It's filesystem. It is bound to the permissions of the server. If you want to obtain permissions, you must invade the permissions group of the server.

If it was a normal server, Shi Lei would kill all the privileged users in the permission group in minutes and become the only member of the permission group. But this is the International Intelligence Bureau of the Ministry of Foreign Affairs. Confidential Information Server! [

Shi Lei didn't even need to think about it, he knew the confidential information server. Absolutely and jfs that supercomputer, linked together.

If you want to get the authority of the confidential information server, I am afraid you have to deal with the supercomputer of jfs.

The supercomputer of jfs is very powerful, and its performance is not much worse than that of the supercomputer Yan. Although Shi Lei mastered the supercomputer Yan, Shi Lei did not dare to compete with the supercomputer of JFS.

Shi Lei does have the supercomputer Yan, but Shi Lei can only borrow part of the supercomputer Yan's performance. After all, the supercomputer Yan's system undertakes various large-scale tasks. If Shi Lei did not impose restrictions and messed around with the supercomputer Yan, he would definitely be discovered by the security personnel of the supercomputer Yan.

It is for this reason that Shi Lei did not dare to fight recklessly with the JFS supercomputer, so he could only think of other ways.

Looking at the so plan, Shi Lei carefully inquired about the user status of the privilege group of the confidential information server.

From the permission group of the confidential information server, Shi Lei found that there were only three users who had permission to mobilize the so plan.

After finding these three usernames, Shi Lei investigated the network security department and everyone's account information in the jfs internal network.

The best way to investigate their account information is to hack into the other party's computer and find relevant information in the other party's computer.

If you want to invade the computer of jfs security experts from the external network, although you can do it, it is quite difficult not to be discovered by them.

It's just that Shi Lei is now on the jfs internal network. It is not that difficult to enter the computers of security experts from the internal network, and it is not easy to be discovered.

Controlling the supercomputer Yan, in the internal network, he found the connection information of the security experts. After entering the computer of the security experts, first search the name of their computer.

Many people like to change the computer to their own username. Sure enough, in the computer name of the Ministry of Network Security, Shi Lei found a user name that was the same as that of the confidential information server authority group.

Shi Lei carefully checked the computer, and successfully extracted the computer login password from the computer's configuration file record.

With this password, Shi Lei now needs to gamble!

Bet that the password of this username can be used in the same confidential information server. If the password is common, Shi Lei can naturally enter the confidential information server and take the so plan.

If the password is not common, according to the security level of jfs, it should cause an alert of the confidential information server. Then the operation to steal the so plan failed, Shi Lei still smeared oil on the soles of his feet, hurry up and run away!

In general, Shi Lei would not be willing to do such gambling. But if you don't take a gamble, you will face the supercomputer of JFS. Shi Lei is not sure that he will kill the supercomputer in a short time without attracting attention.

For now, just give it a go!

Success or failure is here

(To be continued. If you like this work, you are welcome to come to the starting point to vote, monthly pass, your support is my biggest motivation.)

Chapter 312/1926
16.20%
HacKerCh.312/1926 [16.20%]