HacKer

Hk056 The Return of Yan

The super-authorized user of the supercomputer Yan, who is independently protected by the chip, is indeed very difficult to handle!

It can even be said to be legal!

However, Shi Lei is the world's top hacker and once controlled the supercomputer Yan. As for Yan's situation, as well as for his own hands, he knows very well!

The developer of the independent protection chip is the famous ntel in the chip industry, and its quality is very reliable. Not only has an excellent hardware encryption system, but also has anti-static interference, current overload protection, etc., to ensure the safety of the chip itself!

However, it is precisely because of its thorough security that it provides a solution that can be exploited! [

In the previous life, Shi Lei was also blocked by this independent protection chip. In a fit of rage, Shi Lei mobilized the software inside the supercomputer to manage the power distribution, bombarded the independent protection chip with a huge current, instantly put the independent protection chip into current overload protection, and restarted the independent protection chip.

From the automatic shutdown of the current overload protection, to the restart of the independent protection chip, there is a gap of about three seconds. Within these three seconds, the super-authorized user is in a state of protection.

It is for this reason that the previous life and later supercomputers did not use independent protection chips. Set up current overload protection, easy to be restarted by overload attack. However, if the current overload protection is not set up, it will be directly burned by the current!

The current overload protection method is a good way to fight against independent protection chips. It's just that there should be only a few people who know this method now. Shi Lei also took advantage of the rebirth to know that this is not a loophole.

Every supercomputer is a behemoth. The mainframe of the supercomputer Yan covers an area of ​​200 square meters. The amount of electricity consumed by each supercomputer is absolutely a terrifying figure. Therefore, inside the supercomputer, there is an independent power management program that distributes the power consumption of each area. Shi Lei carefully entered the power management program of the supercomputer Yan, and retrieved the power management subroutine of the independent protection chip.

When he found it, Shi Lei immediately rejoiced!

Although the power management subroutine of the independent protection chip is locked, the entire power management program can be released through the first-level authority, thereby unlocking the power management subroutine of the independent protection chip.

Shi Lei used his first-level authority without hesitation to unlock the entire power management program, and then opened the power management subroutine that independently protected the chip.

After the preparations were completed, Shi Lei did not immediately bombard the independent protection chip. Because the overload protection of the independent protection chip is only three seconds. Shi Lei must upgrade the account he created to super authority within three seconds to prevent the independent protection chip from issuing an alarm message to the security guards. Otherwise, it will fall short, and it is very likely to be discovered!

In the previous life, when Shi Lei bombarded the independent protection chip, it was when the hackers of the Xia Kingdom invaded the Woosang Kingdom on a large scale. The supercomputer Yan is the object of special care. Although Shi Lei bombarded the independent protection chip, the alarm message was issued after the independent protection chip restarted. However, the security guards of the supercomputer Yan were nervously dealing with Xia Guo's hacking, and did not notice the alarm of the independent protection chip. Therefore, Shi Lei repeatedly bombarded the independent protection chip, and finally seized the highest authority of the supercomputer Yan, and manually cleared the alarm information of the independent protection chip.

In this life, Shi Lei doesn't have so many chances, he only has one chance!

Within three seconds, the super authority is seized, and the super authority is used to block the alarm information of the independent protection chip. All this must be done in three seconds!

Otherwise, everything will fail!

The reason why Shi Lei took so much trouble to obtain super permissions is not to directly graft the permission system inside the server system as he did with the ACCESS server group. That's because the system program used by ACCESS' server group is not complicated, and the supercomputer Yan's system is not only a professionally developed closed system, but also complicated to death. Shi Lei has no time at all. To graft the permission system. Even if there is time, Shi Lei can't guarantee success!

Therefore, Shi Lei did everything possible to obtain super permissions, and then use super permissions to modify the internal permission system of the system.

Inside the supercomputer Yan, Shi Lei began to write malicious programs. The first step was to intrude and escalate his privileges. He wrote his own first-level privileged user into the malicious intrusion program. After the program successfully invaded, he automatically elevated his privileges and became a super-privileged user. .

Then write a message interception program, access it into the malicious intrusion program, wait for the intrusion program to upgrade the first-level authority to super authority, then obtain the authorization of the super authority user, intercept the alarm information issued by the independent protection chip, and independently protect the The record of chip overload protection is deleted.

Finally, use the super-authorized users to retrieve the authority system within the system, and then change the authority system to hide your own super-authorized users!

After the two small programs are completed, Shi Lei connects them together, and then clicks on the power management subroutine that independently protects the chip. [

"In the future, whether to eat meat or drink the cold wind from the northwest, I will watch it all once!"

In the room, Shi Lei put his hands together, pretended to be a fake believer, and begged the gods and Buddhas in the sky.

The power management subroutine of the independent protection chip has been adjusted to five times the normal level. Once Shi Lei presses the confirmation button, the independent protection chip will fall into the current overload protection and restart.

Shi Lei connected two malicious programs to the server group of ACCESS, and used this server group to fight against the supercomputer Yan. Capturing the supercomputer Yan requires a high-performance server as the backing, precisely because of this step! Once the backing server has insufficient computing power, within three seconds, he can invade the super-privilege group and increase user privileges, and then everything is over!

"It must be successful!" Shi Lei muttered in a low voice, with an uneasy heart, he pressed enter to confirm!

In the first second, a large amount of data flashed wildly on the computer screen, and the screen kept swiping.

In the second second, a large amount of data was still swiping on the screen. Cold sweat broke out on Shi Lei's forehead.

In the third second, all data streams stopped, and at the bottom of the screen, two English words appeared!

!

Privilege escalation!

Seeing these two words, even Shi Lei couldn't help cheering!

Privilege escalation means first-level privileges, elevated to super privileges!

99% success in capturing the supercomputer Yan!

As long as Shi Lei wasn't suddenly brain-dead, or he took the wrong medicine, then the supercomputer Yan would soon return to Shi Lei's arms!

After obtaining the super permission, the message blocking program successfully blocked the independent protection chip from issuing a current overload alarm, and deleted this record.

Shi Lei first used the super-privileged user to clean up the traces of his operations in the system log. Whether it is to upgrade ACCESS permissions, create your own new account, or unlock the power management program, all these operation records are deleted.

After deleting all traces, Shi Lei did not relax his vigilance, but began to use the super-privileged user to enter the core of the system source code, and then switch the system engineering mode to retrieve the system's permission system.

With super authority in hand, it is really a very refreshing thing. The supercomputer Yan's computing speed makes Shi Lei finally get back a little bit of the feeling of a world-class hacker.

The system authority system, in the engineering mode, is extracted by the super authority user.

Shi Lei was very familiar with it. He modified the permission system of the supercomputer Yan, just like modifying the server permission system of Axios, and completely hidden his own super-authorized users, so that the original super-users of the supercomputer Yan could not be discovered.

Then, open the system backdoor so that Shi Lei can freely enter and exit the supercomputer Yan. Even after ACCESS's computing task is completed, Shi Lei can come and go freely at any time.

After typing the code with a smile on his face, he established a new permission system for supercomputer Yan, and created multiple system backdoors. Shi Lei finally let out a sigh of relief. At this point, the supercomputer Yan, already 99.9%, belongs to Shi Lei! [

The last 0.1% is the system log, the log in engineering mode.

This log belongs to the special protection mechanism of supercomputers and is also protected by independent hardware. Even if a super-authorized user is used, it cannot be modified!

However, that is only for ordinary people, and users with super privileges cannot delete logs in engineering mode. But Shi Lei is now in control of the supercomputer, a veritable world-class hacker!

Controlling the supercomputer Yan, Shi Lei directly used the supercomputer Yan to use the current overload protection routine again to trap the hardware protecting the engineering mode log into the self-protection of the current overload, and then quickly deleted the record of his modification of the system permission system. Also removed the hardware record protecting the engineering mode log.

When the last record was deleted by Shi Lei. He tapped the code and asked the supercomputer Yan to list the authorized user groups, but his own super-authorized users were no longer displayed, and he could use the super-administrative authority of the supercomputer Yan. This means that the supercomputer Yan was successfully captured by Shi Lei!

In 2006, the world's ninth-ranked supercomputer, the pride of Wo Sang and the pride of Tokyo Institute of Technology, was successfully captured by Shi Lei!

Thank you Wo Sangguo and Tokyo Institute of Technology for helping Shi Lei take care of the supercomputer Yan, so that Shi Lei can use the ninth-ranked supercomputer in the world without paying a penny!

After capturing the supercomputer Yan, Shi Lei cleared the supercomputer Yan and the internal ACCESS application records one by one, and then returned to ACCESS to clear the internal records of their server as well. It's just that Shi Lei didn't let Axios' server group go.

After all, this is a server group comparable to a small supercomputer, how can it be given up?

How can there be a reason to eat it in your mouth and spit it out?

After cutting off the network link with Wo Sang Country, Shi Lei returned to the No. 1 server, and he turned on the music player with a smile on his face. In the speakers, pleasant music came out again.

'Who are the flowers blooming for? One spring goes and spring comes again, and the flowers say that it waits for a person. ’

"How can the flowers fall, it seems that Yan has returned"

ps: The ticket task is still a little short~ but everyone can achieve it! Ask, collect, click!

Are there any rewards and evaluations?

The second phase of the small event, I don't know why, the post has been locked, and the review has not passed, waiting for the review!

[Thanks for the reward] The big shopkeeper of the Chamber of Commerce, rewarding 200 fat fish is very fat and friendly.

Chapter 56/1926
2.91%
HacKerCh.56/1926 [2.91%]