Chapter 160 : New prey!

“Xu, you should really thank her this time. After your accident, she was very anxious. She was busy with your affairs for a long time. She even quit her job. Now she may be looking for a job. Half of it is so good, then I am willing to die!”

“I see, I will thank her well.”

In the past few days, Chu Hao hasn’t gone out, because this matter is still hot, he doesn’t want others to shift the focus to himself, he still waits for the wind to pass before talking.

What exactly is Shen Liwen developing? Why did he return to China? Chu Hao now wants to know the ins and outs of the whole thing.

So, he began to investigate in detail the information of Professor Shen Liwen.

The method of investigation was naturally by invading the database of the Central Intelligence Agency of the M Empire. There must be a record of Professor Shen Liwen in that database.


Chu Hao has hacked this database before, but when he hacked again this time, he found that the method used last time was no longer working. The other party noticed this system defect and had already applied the patch.

So Chu Hao switched to another method, but found that it didn’t work. Chu Hao was surprised to find that the safety performance of this system was greatly improved.

A spokesperson for the Ministry of Government of the M Empire State Department said that this time, a hacker completely controlled the network system of the Ministry of State Affairs and also carried out sabotage, saying that this invasion may be the most completely controlled by hackers in the history of this system. Chu Hao saw something from this information.

That is to cooperate with Professor Shen’s escape, more than one highly skilled hacker secretly assisted.

Are those hackers from the celestial dynasty? Chu Hao is not sure.

There is always a way, as the so-called “all roads lead to the road” ~ horses”, there is more than one way to obtain system root privileges. Chu Hao quickly fixed the network system that was reinforced again, and he successfully found it. The database, but this database is a peripheral database.

The data inside is actually semi-public, which means that outsiders can connect to this database to query information.

Chu Hao used Professor Shen’s English name to look up, but couldn’t find any useful information. It only briefly introduced Professor Shen’s life and some basic information about his teaching at MIT. This information is basically open to the public.

What Chu Hao has to do now is to sit back and wait, that is, wait for the user to log in to the system, and then follow his connection to invade his personal computer to see if he is on the internal network of the Ministry of State, if it is, then he It’s Chu Hao’s prey.

Because it is necessary to enter the password several times in succession to log in to the internal database system, and the length of each password cannot be less than eight digits and is different, many people find it very troublesome.


Under normal circumstances, they all choose to look up the external database directly, and only when they can’t find the relevant information will they log in to the system.

Chu Hao has already figured this out. He hacked a machine before, and that person directly saved his password (Qian Wang Zhao) in a txt file, and copied and pasted it directly when using it, and even entered it. Saved.

After waiting intermittently for two days, Chu Hao finally waited for such a qualified person.

Chu Hao controlled his system, then monitored his desktop and keyboard, slowly observing him for a long time.



Chu Hao discovered that this person seems to be a person in charge of intelligence sorting. He needs to log in to the system several times a day, and then sort, add and delete the information inside. .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like