HacKer

Chapter 300: premeditated so plan

The official website of JFS has adopted a very extreme setting, which is the extension technology of one-way links, one-way data transmission. The advantages of doing this are, but the disadvantages are equally obvious.

The obvious shortcoming is that normal users browse the official website of JFS. If they want to apply for any data, the web server does not have permission to issue an application. It can only passively wait for the internal data server to find out the application and then reply.

As a result, the official website of JFS has greatly reduced the browsing speed.

If it is another website, the browsing speed is so slow, it must be run by similar websites. But where does JFS come from?

If you have to say your peers, maybe CNS and CIA are their peers. However, JFS can't wait for everyone to browse the official websites of CNS and CIA, and cause confusion to them.

At the moment, the official website of JFS is being attacked. Moreover, it is a very hidden attack method. If Shi Lei is not very proficient in computer technology, he may not find it!

After discovering that someone attacked JFS, Shi Lei did not act rashly, but sneaked behind to observe and see what purpose they had.

It is best to have something cheap to pick up!

Following the intruders, Shi Lei found that they had more than a dozen offensive data streams. He secretly guessed in his heart, these guys who invaded JFS, is it the dark night dynasty?

Shi Lei selected one of the intruded data streams and backtracked the IP address of the other party. After breaking more than 30 broiler servers in a row, Shi Lei finally found the real IP address of the other party.

It is the IP address of Xia Guo, the corresponding real address, Shi Lei did not scrutinize, only know in the capital!

It is rumored that the night of the dark night dynasty is the capital.

It confirms the conjecture in the heart, Shi Lei is more curious, the dark night dynasty is not eating the bear heart leopard gallbladder, actually dare to provoke JFS?

The power of JFS, roughly and simply described, is about twenty times larger than the hacker league. If JFS wants to win the hacker league, it is estimated that in the hacker league, in addition to the core members escape, whoever wants to win will win!

Even core members have a considerable chance of being tracked!

The night dynasty and the hacker alliance, the second generation of hacker organizations, how dare they challenge JFS?

But now that they are invading JFS, it means that they naturally have to rely on it, otherwise it is impossible to send it directly to death?

Shi Lei did not know the cuddling of the dark night dynasty, but since the other party was willing to disperse the firepower of JFS for him, Shi Lei was naturally very happy. Last time in the Ministry of Foreign Affairs' International Intelligence Agency, in the confidential information server, Shi Lei deliberately moved a folder called ‘SO Plan’ in order to frame Rafael.

That SO plan makes Shi Lei very interested!

After all, a Robot project has brought an excellent foundation for the future development of Shi Lei. If you can find something good in the International Intelligence Agency of the Ministry of Foreign Affairs, then Shi Lei will definitely not be polite.

The attack of the night dynasty, JFS has not been discovered. As fellow citizens, Shi Lei is also embarrassed to pit them. Anyway, the JFS official website web server has a very hidden alarm mechanism, they will definitely trigger that mechanism, causing the attention of JFS security experts.

Shi Lei only needs that time, sneaking according to the back door of the system that he left behind, and enters the JFS internal network to find what he needs.

Shi Lei, while monitoring the actions of the Dark Night Dynasty, accessed the internal data server of the Tokyo Earthquake Prediction Agency.

In the earthquake prediction agency, Shi Lei’s plug-ins left in the earthquake prediction software are still working normally. Through the records, Shi Lei discovered that the earthquake prediction in Kanagawa Prefecture has not yet appeared.

Instead, it prevented an earthquake that changed the data and changed the data into a shockless earthquake. The plugin works fine and everything is executed according to Shi Lei's script.

Just as Shi Lei felt bored and prepared to play around Haneda Airport, on the JFS official website, the night dynasty triggered the activation of the alarm mechanism.

Xia Guo time, now is 6:10 pm, Worth Country time is 7:10, due to the network war between the two countries, JFS security experts, all did not get off work, but a sigh of relief, at any time Prepare to rescue the online world of Vossan.

JFS security experts, Mr. M has repeatedly played a game, has long been a whim, nowhere to vent.

When the night dynasty triggered the activation of the alarm mechanism of the JFS official website, it was like a horse cell, and twelve official security expert groups and twenty-seven preparatory expert groups all killed.

The people of the night dynasty, who have not responded to what happened, were bitten by JFS security experts and desperately tracked their real IP addresses.

Shi Lei and so on is this opportunity, taking advantage of JFS security experts, bullying the dark night dynasty, Shi Lei immediately sneak into the JFS internal local area network.

The back door of the system written in assembly language, sinking into the bottom layer of the system, is really very powerful. Many security experts of JFS have not found the existence of the back door of the system.

After Shi Lei entered the internal LAN of JFS, he quickly searched for their confidential information server. The last time I found a confidential information server, this time Shi Lei did not take much effort to find a confidential information server.

When I entered the confidential server, Shi Lei’s heart was somewhat faint. Because it is too easy to come in, like no defense at all?

Inside the confidential server, Shi Lei first discovered the SO plan and other various confidential information. For example: South Vietnam Forest Project, Indonesia Island Project, Nanyang Plan, etc.

Shi Lei did not rush to open any information, but first analyzed the file system.

The first analysis is the SO plan, and no useful things can be analyzed from the name of the plan. It is not like other plans, more or less can analyze some information.

For example, the South Vietnam Forest Project can be analyzed, it is related to the South Vietnamese country, and it is related to the forest plan. The forest resources of the South Vietnamese country are very rich, and perhaps the Vasang State is paying attention to this aspect.

Shi Lei has read a report before. There are many forests in the country of Wassang, but they do not develop their own forest resources, but import timber in Xiaguo. This kind of behavior not only satisfies the timber demand of the Wozang country, but also causes considerable damage to the forest resources of Xiaguo.

Some people in the Xia Xia country could not see the facts and tried to sell the timber to the Vasang State.

Returning to the theme, Shi Lei analyzed the file system of the SO plan and found that it was limited by the file system. It could not be opened directly, could not be deleted, could not be moved, and could not be copied. In short, that is nothing!

Shi Lei is very upset about this kind of file!

It is bound by the file system and the permissions of the server. To gain access, you need to invade the server's permission group.

In the case of a normal server, Shi Lei kills all privileged users of the privilege group in minutes and becomes the only privilege group member. But here is the International Intelligence Agency of the Ministry of Foreign Affairs, a confidential information server!

Shi Lei didn't have to think about it, he knew that the confidential information server was absolutely connected with the JFS supercomputer.

I want to get access to a confidential information server, I am afraid to deal with JFS supercomputer.

JFS's supercomputer is very powerful, and its performance is not much worse than that of supercomputer Yan. Although Shi Lei holds the super computer Yan, Shi Lei can't dare to fight with the JFS supercomputer.

Shi Lei does control the super computer Yan, but Shi Lei can only borrow a part of the performance of the super computer Yan. After all, Super Computer Yan's system is responsible for a variety of large tasks. If Shi Lei does not limit it, casually engage in super computer Yan, and it will be discovered by the security personnel of Super Computer Yan.

For this reason, Shi Lei did not dare to fight hard with the JFS supercomputer, only to think of other methods.

Looking at the SO plan, Shi Lei carefully asked the users of the confidential information server permission group.

From the permission group of the confidential information server, Shi Lei found that there are only three users with the authority to mobilize the SO plan.

After finding these three usernames, Shi Lei surveyed the network security department and the account information of each person in the JFS internal network.

The best way to investigate their account information is to hack into each other's computer and find relevant information on the other's computer.

If you want to invade the JFS security expert's computer from the external network, although it can be done, but not discovered by them, it is quite difficult.

However, Shi Lei is now in the JFS internal network, entering the security experts' computers from the internal network, the difficulty is not so high, and it is not easy to be discovered.

Control Supercomputer Yan, find the connection information of security experts in the internal network. After entering the security experts' computers, first retrieve the names of their computers.

Many people like to change their computers to their own usernames. Sure enough, in the computer security department's computer name, Shi Lei found a user name that is the same as the confidential information server permission group.

Shi Lei carefully checked the computer and successfully extracted the computer login password in the configuration file of the computer.

With this password, Shi Lei now needs to gamble!

The password for this username is equally common in the confidential information server. If the password is common, Shi Lei can naturally enter the confidential information server and take the SO plan.

If the password is not universal, it should be triggered by the confidentiality information server according to the security level of JFS. Then the action of stealing the SO plan failed, Shi Lei still smeared on the soles of his feet, hurry up and go!

Such gambling behavior, Shi Lei is generally not willing. But if you don't gamble, you have to face the JFS supercomputer. Shi Lei is not sure that he will kill the supercomputer in a short period of time without paying attention.

For the sake of the present, only let go!

Success or failure

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like