Chapter 27 Carrying out the main mission: stealing the system
In fact, after Xie Yuancong unlocked the entire CTOs system, he was able to connect to the entire system and complete one of the most important main tasks - downloading the CTOs1.0 system, but he has never done so.
Because he still wants to learn more knowledge, this is a relatively quiet and good place, and he doesn’t know what world he will be born into next, so it would be good to enjoy more tranquility.
So far, his computer proficiency has met the requirements of a general information engineer, but compared to the comprehensive information engineer, he is better at writing firewalls and virus programs. System assessment level: Hacker lv.3 (junior elite)
This level is not comparable to Bad Boy 17's lv.4 and Damian's lv.5, but with the help of versatile tools, he can be infinitely comparable to lv.6 advanced hackers.
Unfortunately, he estimated that after completing this mission, the system would not give him an excellent score, so he would have no other benefits or rewards except a series of skill improvements.
Although he can continue to study, Xie Yuan has begun to get tired of the dullness of this world, so this level is almost the same.
Since there is no profit, it is meaningless no matter how peaceful the world is. It is better to finish it as soon as possible and leave as soon as possible.
"It is detected that the system focuses on the target: ctos system 1.0. Do you want to execute the copy transfer task?"
A prompt came from the retina screen in front of him. This was not the first time it had been sent. The first time Xie Yuan chose to veto it, but this time it was better to confirm it.
"Receive the selection and confirm the execution. The universal tool will complete the transmission in 30 minutes. After completion, the system tasks will be automatically updated."
After receiving the confirmation, Xie Yuan simply sat on the ground, took out his mobile phone and pistol and prepared to encounter the enemy.
The only disadvantage of downloading from the console with the lowest encryption density in the CTOS system is that it is slow, because this is an area deliberately undefended by Bloom Company. There is no confidential information, and layers of barriers are set up to disconnect from the host at any time.
.
Even with the computing speed of 1 z flops of the universal tool, it is necessary to continue to brute force and hard crack each divided area. If the consoles in various places are not unlocked, it will take a whole day.
But now, with the unlock codes of each area as a guide, the system card intrusion program in the universal tool can continuously travel between various areas at the fastest speed to disrupt the sight of the Bloom security department.
However, this is not the end of the story. The system brand program is now building a mirror program in each area. As soon as the creation is completed, the invasion will begin.
Now all Xie Yuan had to do was wait. After the Bloom Company network security department discovered that the infection in the system could not be defeated online, they had only one last resort: powering off the CTOS system.
But disconnecting a huge system covering the entire city cannot be done by just setting a button. This will only bring fatal flaws to ctos.
Therefore, they will set up one or several so-called nodes. Once these nodes are released from control, they can completely control the switches of the entire system to determine the life and death of CTOs.
And Xie Yuan's job is to stop them.
…
Once the system is set up, the first step will be to launch a full-scale attack. It is precisely estimated that the entire ctos system will be captured in 6000 seconds, which is 10 minutes. The reason why it takes 10 minutes is that it needs to completely bypass the firewall system without being triggered.
alarm.
After completion, the second step is for the system to scan the entire CTOS system. The scanning time is expected to be 3000 seconds, which is 5 minutes to complete the scan. This step will not bypass the alarm, but it is of no avail.
The third step is to make a full copy of ctos. The time given by our own system is 15 minutes. The last step is also the most troublesome step.
Within 15 minutes, it is necessary to prevent the power-off procedures of three nodes installed in different areas from starting. The system will automatically locate the location where the hacker can be hacked. Once invaded, the control program can be changed and control rights can be seized.
But in addition to capturing the first node, which can catch Broome Company and the city's security forces off guard, the difficulty of the second and third nodes will increase exponentially. This can only depend on whether Xie Yuan's own skills are good.
After "Upload Completed" was displayed on the universal tool, Xie Yuan immediately left the area. He would wear the thickest armor, bring the most powerful weapons, ride on the fastest vehicle, and take the most vicious beatings.
Already.
…
Thirteen minutes later, in Broome’s network security hall, a heartbreaking alarm suddenly sounded!
"Ma'am, our system is being scanned!" A female clerk broke into the vice president's office in panic and reported to Bloom's vice president Charlotte Gardner.
"What?" Charlotte stood up immediately with a look of disbelief on her face, "Are you sure it was our system that was scanned and not our system that was attacked?"
"Yes," there was a tremor in the clerk's voice, and she seemed to realize that she was involved in a troublesome matter, "the security director confirmed that our system's firewall system has been completely bypassed by a super virus program without being discovered.
The entire system is now being scanned, and most of the process has been completed."
"Did these geeks grow up eating shit? How can they be so incompetent!" The sudden bad news made Charlotte curse without caring about her face. "They also said how superb and awesome their skills were. How come they didn't find out until today that the system was completely compromised?
!I’m going to fire them! Fire them all!!”
By the time Charlotte rushed to the security hall angrily, the lights here had been completely shrouded in red light. Everyone was lying in front of the computer desk and using their keyboards to launch a counterattack against the virus program, but this little power could not compete with the ability to evolve infinite clones.
The virus army contends.
They could only watch as the red area continued to expand like a zombie virus invading the human body, and then slowly covered the entire area, but they could not stop it.
"I need an explanation. Please start your performance." Charlotte stood in front of a man in a fine suit wearing glasses and asked expressionlessly.
But the man in the suit unambiguously handed a piece of A4 printing paper with dense data to Charlotte.
"What is this? Resignation? Do you think that apart from such a big thing, resignation can calm things down?" Charlotte tried hard to suppress her overwhelming anger, but her words could no longer be restrained.
"If you could be a little calmer, you would know that what I handed you was not a resignation." The man in the suit faced Charlotte without fear, "At first, I thought it was the legendary hacker T-Bone using it again.
He used the virus program that caused blackouts in the United States and Canada in 2003, and carried numerous backdoors he set up in the CTOS system to hijack our system."
After that, the man in the suit explained arrogantly, "If this is the case, the firewall of the CTOS system will respond immediately.
During the period when they actually hacked into the three major nodes, we can transfer 90% of the confidential information, leaving an empty shell or a framework of the CTOs system for anyone to live for a few days and become addicted to the city controller.
, and then counterattack him or them, especially those pretentious dedsec, hum!
Even if he is a saint and is unwilling to manipulate the system and plans to close CTOs, it is just closing a shell. CTOs can still be launched on other frameworks. After optimization, we can also upgrade to 2.0. But no matter what, we will keep the core.
.”
But as soon as the words changed, the man in the suit became exhausted and explained the contents of the printed paper helplessly: "Then I found out that I was wrong. This virus program is not like this. It first established a mirror in each area.
program, and then after infecting the entire area, it directly penetrates into the firewall system, pay attention to penetration!"
The man in the suit focused on the word "penetration": "He made the firewall system think it was harmless data, so he let it in and out at will. As a result, as more data entered, the scope and ability of the virus program became larger and larger.
, like cancer cells that are constantly eroding the entire system.”
He looked at Charlotte who was confused and handed out the critical illness notice with a sad face:
"Our CTOS system is now terminally ill with cancer!"