HacKer

Hk434 The Power of Hackers!

ps: Is there any 'like'? The praise index is so low that it hurts, I urge everyone to support it!

Woosang is a country that is both powerful and weak.

The technology level of Wosang country is very developed, especially in the aspect of electronic products, which occupies almost half of the Xia country's market, making it impossible for the local electronic enterprises in Xia country to raise their heads.

Not only electronic products, including various industrial equipment, automobiles, and even home appliances, also made Xia Guo’s local products unstoppable.

It is such a powerful country of Wosang, when facing the country of Lijian, it bows like a slave. In Wo Sang, many areas have been occupied by the Lijian Kingdom, and military bases have been established, which is equivalent to the concession yyng. [

For example, the Futenma Marine Base in Okinawa Prefecture, at the Futenma Base, the Lijian Kingdom has deployed nearly 100 armed helicopters, and even the latest secret weapons.

The Futenma Base is located in the center of Ginowan City, occupying 25% of the entire urban area. It has been severely protested by local residents, but the Wosan government can do anything.

Originally, at the end of 2006, the Wosang government and the Lijian government had reached an agreement that the Futenma base would be completely withdrawn from Ginowan City in 2014, but until Shi Lei was reborn, there was no action from the Lijian country.

Perhaps the governments of the two countries have long known that the so-called final agreement is just a pretext for de-escalation.

Because the Futianjian Base, the Wosang Kingdom and the Lijian Kingdom were full of overt or dark battles, Shi Lei went to the Futenjian Base to start!

At this sensitive time, when the withdrawal agreement was only signed at the end of last year, the Futenma Base was the most capable of provoking trouble!

In Jingyayuan, Shi Lei brought a headset to keep in touch with Yizuer. Looking at the data on the monitor, I put my hands on the keyboard, making the final preparations.

"Yizul, copy the defense system to the supercomputer Lei, once Lei can't stand it, activate the defense system immediately, use Lei's super administrator authority to obtain all the computing resources of Lei, and provide full support for the defense system. "Shi Lei first considered the worst, in case it was in the military network. After being discovered, the supercomputer Lei Tie definitely couldn't keep it, so he might as well hold on for the last time for himself and let Izull clear the connection records and protect his real p-address.

This is also the reason why Shi Lei wants to win another supercomputer privilege. You can't lose Yan, can you?

"Sr, the defense system has been installed. It can be used for mines at any time. Turn on the defense system." Yizuer responded.

"Then, let's get started!" Shi Lei took a deep breath, put his ten fingers on the keyboard, tapped quickly, and typed line by line of code.

The time of Wo Sang Kingdom was only an hour later than that of Xia Kingdom, and it was currently more than nine o'clock in Xia Kingdom time. It was more than ten o'clock in Woosang Country, and the time difference between the two sides was not too big. It was still in the first half of the night, and the main control computer of Futenma Base. There should be security guards, so Shi Lei must be very careful.

Shi Lei was the main attack, while Yizuer detected and defended. As time passed by, the firewall of Futianjian's master computer blocked Shi Lei's entry.

Because in the military network, Shi Lei could not force an attack, so as not to cause an alarm on the firewall, he could only keep looking for loopholes in the system.

Xia Guo time, close to eleven o'clock in the evening, Shi Lei finally discovered a system loophole in the Futianjian master computer, and successfully entered the Futenjian master computer.

Inside the master computer of Putianjian, Shi Lei kept testing the status of the permission group, and wanted to obtain the corresponding information from the permission group.

After some hard work, Shi Lei obtained some basic information.

The Futenma Base, as an overseas base, has great autonomy. After all, if there is an emergency, and the situation of the battle is changing rapidly, you can't ask the Ministry of Defense of Lijian Nation for everything, right?

Although in the same military network, the information of the Futenma base can be transmitted to the Ministry of Defense at any time, but it is impossible for the Ministry of Defense to respond to the information anytime and anywhere. [

Therefore, the highest authority of the Futenma base's main control computer has considerable autonomy, especially in terms of automated weapons, the highest authority of the Futenma main control computer can be directly finalized, without the need for confirmation by the Ministry of Defense.

Shi Lei found this information, and his heart was excited. His choice was not wrong. As long as the highest authority of the main control computer of the Futenma Base is obtained, then

How powerful is a hacker?

For ordinary people, most hackers are very powerful, especially broadband access users, because they are dynamically assigned p addresses, and hackers with slightly inferior technology cannot help ordinary users at all. And sophisticated hackers, unless they are too busy, will not attack ordinary users.

But for business users, with a fixed official website and a fixed server address, they are very vulnerable to hackers. Hackers are a disaster for business users.

As for the general public, before December 20, 2006, hackers were just a noun for them, representing the network unstable elements with powerful computer technology.

But on December 20, 2006, the earthquake hacker eq explained to everyone in the world how powerful hackers are!

Through hacking technology, earthquake hacking eq, the loss of Wosang country is unprecedentedly powerful!

Because of the earthquake hacker eq, the general public around the world knows what kind of destructive power a top hacker, especially a crazy top hacker, can cause in this society called technology!

Now, Shi Lei is ready to let the general public all over the world know what else hackers can do and how huge the power of hackers is!

Shi Lei's hands quickly tapped on the keyboard, starting with the main control computer operating system of the Futianjian Base, and slowly eroding the operating system's authority.

Although the operating system of the Futianjian base is very powerful, Shi Lei is not only a top-level hacker in the world, but also has computer technology for the next six years.

Even if Shi Lei became a monk halfway through, most of his skills were learned from the pseudo-artificial intelligence of the Angel Council, Aberdier, but Shi Lei was quite powerful!

"Sr, an abnormal data scan has been detected and is tracking us!" When Shi Lei was cracking the Futianjian operating system, Izuer suddenly issued a warning message.

Shi Lei's heart tightened. Hastily began to enter the code to disguise his own data flow.

After a while, a data scan swept across the internal network of Putianjian, but Shi Lei who was disguised was not found. Shi Lei breathed a sigh of relief, as long as he was not found, it would be fine.

"Yizul, continue to monitor the entire internal network. If there is any situation, report it in time!" Shi Lei ordered and continued to crack the operating system of the Futianjian base.

‘Nima, you have clearly obtained the description information of the permission. Why is it illegal to enter the permission group? ' Shi Lei thought to himself, and suddenly he had a flash of inspiration.

After typing a series of codes, when Shi Lei pressed the enter key, the main control computer of the Futenjian Base immediately expanded the access rights of the permission group.

‘Sure enough! It is actually a dual-system combined operating system, both lnux. And owns, it's too insidious! ' Shi Lei secretly despised in his heart.

The range of dual system applications is narrow. Mainly, the combination of dual systems is very troublesome. And the degree of confidentiality is no better than a closed system. Therefore, the dual system is gradually eliminated by the closed system.

After entering the permission group of the main control computer of the Futianjian base, Shi Lei first began to secretly search all users in the permission group. When the situation is unclear, Shi Lei will not tamper with any information of the permission group without authorization. [

After all, I don't know the protection status of the permission group. What if the information is tampered with and an alarm is triggered?

When retrieving permission groups. Shi Lei has already prevented no less than ten alarms. From this, it can be seen how strict the security settings of the main control computer of the Futianjian base are. Just a user retrieving permission groups. More than ten alarms were triggered.

How many alarms will be triggered once the permission group is actually attacked?

It took a few minutes for Shi Lei to finally retrieve all the users in the permission group. In order to prevent the existence of hidden users, Shi Lei checked it three times and confirmed that there were no other hidden permission users before starting to analyze each permission user.

For the main control computer of the Potianjian Base, Shi Lei simply analyzed each user with permissions and checked the corresponding permissions. Since this is a military network, Shi Lei did not use his own password dictionary to analyze the passwords of each authorized user.

The analysis method of the password dictionary is to test possible passwords many times.

With the corresponding permissions of each authority user, after the analysis, Shi Lei finally chose the highest authority user. Only users with the highest authority can call all the automated weapons in the Futenma base.

In order to obtain the highest authority user, Shi Lei began to think about what he should do to obtain the highest authority. According to the analysis of the code corresponding to the permission group, Shi Lei got a piece of information.

The highest authority user of Futenjian's master computer, because of his great authority, can directly use all the automatic weapons of Futenjian without going through the Ministry of Defense of Lijian.

Therefore, the password for the account with the highest authority on the main control computer of the Futenjian Base would change every day. For example, today's password is b, then tomorrow's password is definitely not b, it may be b, or b.

The password will change the day after tomorrow!

All passwords are not yyng every day!

Since a new password is adopted every day, the security of the password is guaranteed to a great extent and prevented from being stolen by hackers.

In fact, the scheme of changing a new password every day is indeed very effective in preventing hackers. After Shi Lei learned this information, he was also quite distressed.

Even if he wants to get the password, it takes a lot of effort. Moreover, there is still a certain chance of being discovered. The internal network of the Futenma base is included in the Likenuo military network. Shi Lei could not operate recklessly in the military network, and he had to maintain his concealment.

'Damn Futenma Base, actually adopted the method of changing passwords every day, I hate this kind of password method! ’

After complaining for a while, Shi Lei began to carefully check the file system of the main control computer of the Futianjian Base, and wanted to search for any clues from the file system.

However, Shi Lei found something that made him laugh and cry

(To be continued. Mobile users, please read.)

Chapter 445/1926
23.10%
HacKerCh.445/1926 [23.10%]