HacKer

Hk948 Deep Invasion!

June 4th, past midnight; South Vietnam State, National Security Agency, internal network.

Shi Lei used the method of 'surrounding Wei and saving Zhao' to attack the internal network of the National Security Agency of Nanyue, and attracted all the power of the network security of Nanyue, which was originally attacking the origin of the main server supercomputer of Dream Entertainment.

The original main server of Dream Entertainment, the origin of the supercomputer, has endured a computing resource attack of almost 500 tflops. This level of attack has put a lot of pressure on the wn secret network.

Fortunately, such massive attacks are also provided by distributed computing resources. Otherwise, the wn secret network will definitely not be able to stop it!

Shi Lei hacked the official website of the National Security Agency of South Vietnam with one person, and put on a stance to try to attack the internal network of the National Security Agency.

After the cybersecurity personnel from the Nanyue Kingdom returned, Shi Lei still had no intention of letting it go. Even if many cybersecurity experts from the Nanyue Kingdom returned, Shi Lei was not at all afraid.

Cybersecurity experts from the South Vietnamese country did return home to protect the NSA's internal network. As a result, the internal network of the National Security Agency has been greatly improved in defense, and Shi Lei has to face more security defense forces. It seems that it is more difficult for Shi Lei to invade the internal network of the National Security Agency.

In fact, this kind of trade-off also exists for Shi Lei. Looking at the problem from Shi Lei's point of view, the cybersecurity experts from Nanyue Kingdom returned to the internal network of the National Security Agency, and the pressure on the origin of the supercomputer, the main server of Dream Entertainment, was relieved. As a result, the computing resources of the wn secret network are freed, and Shi Lei can call the computing resources of the wn secret network. Attack the internal network of the National Security Agency of South Vietnam. [

In general, Dream Entertainment and Nanyue State cybersecurity experts are basically at the same starting point, but Shi Lei rescued the origin of supercomputers!

Jingya Garden.

Shi Lei put his hands on the keyboard and quickly typed in the source code line by line. Shi Lei was analyzing the loopholes in the internal network of the South Vietnam National Security Agency. Yizuer currently controls the security of the entire Mi Rui technology system, and the wn secret network is running at a high speed, temporarily providing Shi Lei with more help. Izull still needs to adjust for a while. Only then can the resources of the wn secret network be integrated.

Izull's "performance" was limited by the "performance" of hardware, and the origin of supercomputers was only a mere 10tflops of computing speed. If company M's latest "gift" to Dream Entertainment's supercomputer with a theoretical computing speed of 320tflops is completed and handed over to Izuer's control, then Shi Lei doesn't have to worry about any main server being attacked by Nanyue Kingdom!

It's just a pity that a supercomputer with a design theoretical calculation speed of 320tflops cannot be put into service temporarily. According to the company's estimate, this supercomputer will take June 20 to be assembled at the earliest.

The assembly location Shi Lei chose was Lijianguo. And it is located in the headquarters of m company. The 300tflops computing speed seems to be a lot at present, but Shi Lei knows the future development. This computing speed will not matter in the future.

Furthermore, Shi Lei tried to do it this way. Show an attitude to the senior officials of Xia Guo, that is, if Xia Guo does anything unfair to Dream Entertainment and Mirui Technology, Mirui Technology will not hang on the tree of Xia Guo!

"Yizure, how is the occupancy of the wn secret network?" Shi Lei asked Yizuer while typing in the source code information. Information about the wn secret network.

Izuer quickly replied to Shi Lei, "The sr.wn secret network has been integrated. The idle computing resources have a total of 980tflops, and the system can be called at any time."

Shi Lei showed a cold smile, "Yizul, prepare all the idle computing resources of the wn secret network, and raise the security level of the defense system to the highest level. We have to have a good time with the National Security Agency of Nanyue!"

"Yes, sr!" Izuer responded to Shi Lei.

Shi Lei picked up the coffee cup on the computer table with his right hand, took a big sip, and then said to himself, "Nanyue Kingdom, I don't believe it, you have no secrets!"

The National Security Agency of South Vietnam, as a national intelligence agency, Shi Lei was sure that there must be some classified information in their internal network. Shi Lei wanted to use the power of the wn secret network to let Yizuer cooperate with him to break through the internal network defense of the South Vietnam National Security Agency, so as to find the required information in it.

At present, the network security experts of the South Vietnam country are fully protecting the South Vietnam National Security Agency. It is somewhat difficult for Shi Lei to break through the defense.

"Yizul, gather the computing resources of the wn secret network and send decoy information to the South Vietnam National Security Agency." Shi Lei ordered Yizuer. The so-called decoy information is that wn secret network pretends to be a normal random network scan test. Although this is also a malicious query, most defense systems will not pay attention to random network scan test. [

According to Shi Lei's order, Izull began to send random network scans to the internal network of the South Vietnam National Security Agency. As Shi Lei predicted, the South Vietnam National Security Agency's internal network defense system did not respond to random network scans at all.

"Very good!" Shi Lei saw Izuer's test feedback. He immediately controlled the computing resources of the wn secret network, and conducted a large-scale test and scan of the Nanyue National Security Agency's internal network.

As Shi Lei's scan progressed, the internal network of the South Vietnamese National Security Agency became slow. Its defenses began to automatically retrieve the reasons for the system's slowness.

The South Vietnamese security experts who had returned from the Xia Kingdom cautiously discovered that the random network scan was abnormal. Under normal circumstances, the frequency of being scanned by random networks is very low. After all, the entire Internet is so large, where is the internal network of the South Vietnam National Security Agency likely to be frequently scanned?

Cybersecurity experts in the South Vietnamese country began to investigate the unusual frequency of random web scans. They were quickly determined. The internal network of the National Security Agency of South Vietnam, which was being hacked. then. The cyber security experts in Nanyue Kingdom are eagerly waiting for Shi Lei to invade.

"Sr, the random network scan has been discovered by the other party." Yizuer reminded Shi Lei.

Shi Lei put his ten fingers on the keyboard, entered the last line of source code, then pressed the enter key, and handed over the source code he just wrote to Izuer for verification. Izuer completed the verification quickly and gave Shi Lei feedback.

"sr. The source code is verified, do you want to execute the source code?" Izuer asked Shi Lei's final order.

Shi Lei nodded with a smile, "Execute the source code!"

Regarding worms, the second-generation hacker organization of Nanyue Kingdom, the leader of the Star of Annan, Da Pineapple, is a world-class expert, but Shi Lei is not bad! Shi Lei also has a very deep research on worms, and may not have reached the world's top level. But absolutely not bad.

Big Pineapple can create a worm to deal with Xia Guo's Internet. Shi Lei can also create worms. The worms made by Shi Lei are not much inferior to the blos made by Big Pineapple.

The only pity is that there is no big penguin-like company in Nanyue, and they want to quickly expand the worm. Shi Lei couldn't learn from Big Pineapple's plan.

Fortunately, the worm created by Shi Lei is not ready to expand on a large scale, but only targets the South Vietnam National Security Agency. Worms are not only highly infectious, but also highly penetrating.

A worm named "Stinger" by Shi Lei. With very high penetration, Shi Lei spent a lot of time. 'Stingers' were created to penetrate high-defense internal networks and destroy internal network data.

'Worms are not my forte, but definitely not my weakness! ’ Shi Lei looked at the screen of the No. 1 server, Izur was injecting the source code into the internal network of the South Vietnam National Security Agency.

The stinger eroded the internal network of the South Vietnam National Security Agency, but it failed temporarily. The opponent's internal network defense was too high. Shi Lei created conditions for the stinger. He tore open the internal network defense of the South Vietnam National Security Agency. Although it is only a small gap, it is enough for the stinger to enter.

Stinger also lived up to expectations and entered the internal network of the South Vietnam National Security Agency!

South Vietnam, National Security Agency. location, confidential.

Inside a mysterious underground base, cyber security experts from Nanyue Kingdom are dealing with Shi Lei's attack. One of them was a middle-aged man with bald glasses, and his bald forehead was covered in cold sweat.

The middle-aged man with bald glasses, named Chen Guang, is the chief technician of the National Security Agency of South Vietnam and one of the few first-generation hackers in South Vietnam, but he has just turned into a security expert.

Chen Guang is forty-seven years old this year, and his bald head is just because he is too tired to cause premature aging!

At this moment, Chen Guang was looking at the computer screen nervously, and a shout came from the side: "Mr. Chen, the pressure we are under continues to increase, and it has reached a computational attack of 300tflops."

Chen Guang is the chief technician of the National Security Agency of South Vietnam, and because he is forty-seven years old, he is not married yet. Therefore, by the colleagues of the National Security Agency, he was nicknamed Director Chen, which means the eunuch in charge of the court.

For this kind of ridicule, Chen Guang was not angry either. Chen Guang's temper is notoriously good, but he has no female predestined relationship. Perhaps it is because Chen Guang put too much experience on the knowledge of attack and defense of hackers, making Chen Guang ignore other things. It is precisely because of this reason that Chen Guang's technology has reached world-class!

"Manager Chen, the other party's defense is still improving. We are tracking the source of the other party's attack, but we can't find any p-address for the time being. The other party's connection p-address has also been protected!"

The director of the South Vietnam National Security Agency, named Nguyen Kang, is also a first-generation hacker, but his technology is a little weaker, and he is only quasi-superior. In terms of hacking technology, Ruan Kang is not as good as Chen Guang, but Ruan Kang has one thing better than Chen Guang, that is, Ruan Kang is good at employing people.

It's definitely not difficult to do something you can't do yourself. As long as you can find someone who will meet and make good use of this person, you can solve the problem!

"Old Chen, is the current situation beneficial to us?" Ruan Kang asked quietly.

(To be continued. If you like this work, you are welcome to come to the starting point to vote and monthly pass. Your support is my biggest motivation. Mobile users, please go to m to read.)

ps: ps: Yesterday's automatic update was invalid. Today, a chapter missing from yesterday will be added, and it will be delivered later, opening an interval.

〖∷Update fast∷∷Plain text∷〗

Chapter 960/1926
49.84%
HacKerCh.960/1926 [49.84%]