typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1294 Exposure and Stealing, Breaking the Waves and Fighting Pirates!

.

July 28, afternoon. Jing Yayuan.

Even if the internal network is isolated from the Internet, it still cannot stop Shi Lei's invasion. It must be said that Shi Lei accepted the Xuanhuang Thieves Group before, which was definitely a very wise decision.

After easily obtaining AMIMON's WHDI technical information, Shi Lei did not intend to secretly apply it in VR game helmets, but logged into the official website of BBC TV.

Shi Lei hacked the official website of BBC TV station by controlling the web server, and then published an announcement on the homepage of the official website.

The title of the announcement is "WHDI.For.Free!", which means 'free WHDI technology'.

In the announcement, Shi Lei used English to reprimand the Israeli company AMIMON, accusing AMIMON of being a technology monopoly company that has obtained a large amount of monopoly benefits through WHDI technology.

Therefore, as an anonymous hacker, I have the responsibility to stop AMIMON’s ugly behavior and publish AMIMON’s WHDI technical information to the world.

In addition to the official website of BBC TV, Shi Lei also published the same announcement information on major social networking sites and news portals around the world, announcing WHDI technology to the world.

Because Shi Lei used an anonymous identity and Shi Lei's skills were very good, even experts at the same level did not know who leaked AMIMON's core confidential information.

After the WHDI technology was leaked, AMIMON responded quickly. They first asked the World Intellectual Property Organization for help, hoping that the technical information about WHDI would completely disappear from the Internet.

However, their wishes will certainly not come true.

WHDI technical information is widely circulated on the Internet and cannot be stopped by the World Intellectual Property Organization. Besides, a large number of netizens have downloaded WHDI technical information. So what if it is blocked on the Internet?

AMIMON launched an investigation into the leak of WHDI technology, but AMIMON knew very well that the server where they stored technical data was not connected to the Internet at all. For this reason, AMIMON's senior management was more interested in the possibility of internal crime.

After all, how can outsiders steal data from internal servers that are not connected to the Internet?

After launching an investigation, AMIMON quickly discovered that the surveillance records had been purged. This clue seemed to further point to the internal perpetrators. If it were not for the internal perpetrators, it would be difficult for outsiders to clear the records of the surveillance system.

The reason is that the monitoring system and the server that stores data belong to independent internal networks and are also isolated from the Internet. How can outsiders control two internal networks that are not connected to the Internet?

AMIMON Company mainly suspected the possibility of internal crime. This saved Shi Lei a lot of trouble.

However, making WHDI technology public to the world is only Shi Lei's first step. Due to patent restrictions and legal reasons, even if WHDI technology is leaked, Dream Entertainment cannot directly use WHDI technology.

In order to use WHDI technology openly, Shi Lei chose to start with two companies from the Southern Dynasty. The two companies from the Southern Dynasty were LG and Samsung.

LG and Samsung both have one technology. That is the wireless technology known as the most promising, 60GHz 'millimeter wave' technology. This technology, later known as WirelessHD technology, has just released a ten-meter range

Internal linking specifications.

In the future, this technology camp will be very strong. In addition to the two companies from the Southern Dynasty, there are also four companies from the Wasang Kingdom, namely NEC, Sony, Panasonic and Toshiba.

The six companies in this camp are all behemoths. The technology they jointly promote is indeed a very promising solution in the field of wireless display technology.

Shi Lei plans to steal WirelessHD technology and mix it with WHDI technology to form a brand new technical solution to avoid patent restrictions.

LG and Samsung, these two giant companies, have not disconnected their internal networks from the external Internet like AMIMON.

These two large group companies have R&D centers all over the world, and data between R&D centers needs to be exchanged. Except for absolutely confidential technology, which is stored in an environment isolated from the Internet, the rest of the data is placed on the internal network.

They are very confident in their network security!

Both LG and Samsung have the world's top hackers behind them. Even if the world's top hackers attack their internal networks, they are unlikely to succeed.

It's always easier to defend than to attack!

Unless, like Shi Lei, he has an unannounced vulnerability!

Shi Lei first chose LG as the invasion target. Compared with Samsung, Shi Lei subconsciously believed that LG was easier to deal with. In fact, this was indeed the case.

This is not because the world’s top hackers behind LG are weaker than Samsung’s backers; it’s because Samsung’s server computing resources exceed those of LG.

The competition between peak-level hackers and peak-level hackers is usually based on server computing resources. If the server computing resources are sufficient, even world-class hackers can defeat the world's top-level hackers.

Looking for teeth.

For example, if Shi Lei fights against Tao Wenxian, Tao Wenxian has the support of Yizuer, plus the IWN Secret Network and the supercomputer Lightning, but Shi Lei only has a laptop, so how can Shi Lei defeat Tao Wenxian?

Even when Tao Wenxian was eating potato chips and watching the show, Yi Zuer tortured Shi Lei into a dog!

This is the principle of defeating ten societies with one force!

With the assistance of Yi Zuer, Shi Lei carefully invaded the internal network of LG Company. As a global multinational enterprise, LG Company's internal network is very advanced, even more advanced than the networks of some government departments.

In LG's internal network, even Shi Lei, the world's top hacker, felt the crisis at every step. However, Shi Lei had the assistance of an advanced pseudo-artificial intelligence system, more than 1,300 tflops of loosely distributed computing resources, and

300tflops of intensive distributed computing resources.

Such powerful computing resources. Let alone LG, even the FBI, Shi Lei was confident of attacking their internal network.

In LG's internal network, Shi Lei ordered Yi Zuer to search for information with low permissions, while Shi Lei personally searched for information that required high permissions.

South Korea, LG Corporation Headquarters, Cybersecurity Department.

"Jin Zaixian. Check the status of server No. 4. The data fluctuation is a bit abnormal!" A middle-aged man gave the order.

Kim Jae-hyun is a security expert in LG's network security department and is one of the best in technology. "Minister Park, please wait a moment. I will check in detail immediately."

Server No. 4 is a high-level confidential server of LG. Although the information stored in it is not top secret, it is still some relatively important information.

Jin Zaixian carefully checked the status of the server. Shi Lei immediately discovered the status of the server. He paused the operation and cleared the temporarily generated data records.

About thirty seconds later, Kim Zai-hyun responded to Minister Park: "Minister Park, no problem was found on server No. 4, and the data flow is all normal!"

Although server No. 4 is connected to the Internet, due to data traffic restrictions, as long as there is a fluctuation in data replication, it will be discovered immediately. At the same time, the server's security defense mechanism can also instantly disconnect the transmitted data. With this set

Defense mechanism, even if it is connected to the Internet, it is relatively safe.

"Pay close attention to the security of the internal network!" Minister Park said seriously, "The core WHDI technology of Israel's AMIMON company has been leaked. I don't want our LG company to become the next joke!"

The security experts from the network security department all laughed. Jin Zaixian also laughed and said: "Minister Park, is it their internal personnel who committed the crime? After all, the internal network is isolated from the Internet, how can outsiders invade?"

Minister Park also laughed a few times and did not continue to speak.

Shi Lei found that the command to perform data checking disappeared in the server. He started to decrypt data and scan data again. High-level confidential data files were all encrypted.

Fortunately, most files do not have special encryption schemes. Ordinary encryption schemes cannot prevent Yizuer from decrypting them. Shi Lei and Yizuer searched files one by one, trying to find WirelessHD technical information.

It is not that Shi Lei has not considered that LG stores the data of WirelessHD technology in a top-secret server that is not connected to the Internet.

However, a top-secret server does not mean absolute security. A top-secret server can indeed effectively isolate the interference from the Internet. Even if it is placed in a safe room, it can also block theft problems in the real world.

Everything has advantages and disadvantages.

There are also disadvantages to a top-secret server that is isolated from the Internet. This disadvantage is the transfer of file data. As a top-secret server that is isolated from the Internet environment, its essential purpose is to isolate the feeling of external viruses and hacker methods.

However, when transferring stored data, there is a possibility of external attacks. No matter what storage medium is used to store data, transferring data from a top-secret server will inevitably come into contact with other storage media.

If there is a malicious computer virus in other storage media, it will be a huge tragedy for the top-secret server.

Therefore, generally unimportant information will not be placed in top-secret servers. According to Shi Lei's inference, LG will not put WirelessHD technology in top-secret servers.

Not only because LG doesn’t pay much attention to WirelessHD technology, but also because there are many companies that master this technology, LG doesn’t need to care too much.

At around eight o'clock in the evening, Shi Lei finally found the WirelssHD technology, and with the cooperation of Yi Zuer, opened the encryption lock of the file. However, how to transfer the files became a big problem!

Shi Lei has discovered LG's security mechanism in LG's internal server, which is a data flow restriction scheme. Once there is an abnormality in the data flow, the server will immediately terminate the corresponding process.

For example, for LG's Server 4, under normal circumstances, the data flow only fluctuates between 5KB and 8KB per second, but at a certain moment, the data flow suddenly rises to 20KB, and there is no relevant authorization. Then Server 4 will immediately end the corresponding process.

Data flow process.

The file size of WirelessHD technology exceeds 300MB. Shi Lei is quite sure that as long as he dares to remotely copy and download the WirelessHD technical data, the security personnel of Server 4 will definitely detect the abnormality immediately.

In order to successfully obtain WirelessHD technical information, Shi Lei must think of a safe and appropriate method.

‘Damn it. This traffic restriction defense mechanism is so annoying!’ Shi Lei cursed in his heart. LG’s traffic restriction defense mechanism is very advanced. It directly writes the traffic restriction defense mechanism into the underlying defense of the system, which is a core component of the system.

If Shi Lei attempts to end this process, the entire server 4 system will reject it. Forced termination will shut down the main system of server 4.

There was such a big movement, except for the security personnel of LG, who were all in the office playing a group unobstructed conference. I'm afraid there was no second situation that could have prevented them from discovering the movement on server 4, right?

‘Damn it! Do we have to enter the treasure mountain and come back empty-handed?’ Shi Lei was a little helpless. Hackers are called gods in the Internet world, but gods also have restricted areas. The internal network of a very large international company is one of the restricted areas.

Especially in restricted areas, when there are also gods, it is very difficult to obtain the necessary information without the gods noticing.

"Yes! I almost forgot about other methods!" A smile suddenly appeared on Shi Lei's face. He had been thinking about how to use hacker methods to obtain LG's WirelessHD technical information, but Shi Lei forgot that ordinary methods could also achieve the same purpose.

Stones from other mountains can attack jade!

"Yizur, start the image recognition engine, prepare for high-speed recognition, and identify all WirelessHD technical data through the camera once!" Shi Lei's idea was to use the image recognition engine to steal the data.

Shi Lei invaded LG's No. 4 server and obtained the necessary information. However, due to some technical problems, Shi Lei was unable to return the information.

Especially using the copied command can easily trigger the alarm of LG. Therefore, Shi Lei had to find another way to complete it.

The graphic recognition engine is a behavioral dynamic recognition engine, a text recognition engine, a human facial feature recognition engine, and a static image recognition engine, which are integrated image recognition technologies.

This technology has not yet been perfected, but there is no big problem in identifying WirelessHD technical data.

Since it is remotely connected to LG's Server 4, the WirelessHD technical information displayed on Server 1 requires remote transmission of images from LG's Server 4. In order to prevent traffic restrictions from being triggered, Shi Lei set up remote display

The image quality of the content and the display speed of switching data.

Under the premise of ensuring that WirelessHD technical information can be accurately identified, it doesn't matter even if the image quality transmitted remotely is poor. Because the Unreal Graphics Processing Engine can automatically repair the image, there is no fear of poor image quality.

As time passed by, Shi Lei looked at the percentage progress bar on the screen with sweat on his forehead. He had not been so nervous for a long time.

At 10:40 pm, Shi Lei finally let out a long breath!

WirelessHD technical information has finally been ‘downloaded’ from LG’s internal server.

"Yizur, quickly clean up the traces of the invasion and eliminate all traces!" Shi Lei gave the order. He stood up, twisted his waist, and moved his body.

"Sir, the traces are being cleaned up. In addition, the Wavebreaker will arrive at the scheduled destination in eleven minutes! The weather conditions at the target location are moderate, and the laser weapon onboard the Wavebreaker will be suppressed by the weather, and its power will be reduced by 2%.

Eleven." Yizuer reminded Shi Lei.

"Are we there yet?" Shi Lei frowned. As expected, the laser weapon was severely suppressed by the weather, and its power dropped by one-fifth and more than one percentage point. This was already a relatively miserable situation.

"Sir, we have completed the cleaning work of all traces of the invasion!" In less than thirty seconds, Yi Zuer has completed the cleanup work. In fact, Yi Zuer is doing this work at any time. When Shi Lei invaded, Yi Zuer

Zul will simultaneously complete the cleaning of system records.

Of course, this is the advantage of having the assistance of a pseudo-artificial intelligence system!

Without the assistance of the pseudo-artificial intelligence system, Shi Lei devoted himself wholeheartedly to the attack, how would he have time to complete the work of cleaning up the traces? This shows the benefits of having a pseudo-artificial intelligence system.

Eleven minutes later, the Breaker arrived at its scheduled location in the Bermuda Triangle.

"Sir, the shipborne radar of the Breaking Waves has not found any ship targets in the surrounding waters. Since the height of the waves exceeds 30 centimeters, it greatly affects the work of the shipborne radar. Whether it is centered on the target location and in a clockwise direction.

The center point searches outward for possible targets?" Yi Zuer asked Shi Lei.

The hull height of the Breaker is only 220mm, and the shipborne radar is also at this height, emitting electromagnetic waves outward. Although the electromagnetic waves of the radar are radiated outward in all directions, a large part of them will be blocked by the waves, causing detection errors.

"Yes! Search clockwise!" Shi Lei agreed with the plan proposed by Yizuer. This is not Yizuer's innovative ability, but a fixed solution. In Yizuer's autonomous inductive learning judgment module, early

Similar plans are stored.

The speed of the Breaking Waves armed unmanned patrol boat reached 700 kilometers per hour. Even if the height of the waves reached 300mm, exceeding the height of the Breaking Waves' hull, it still did not affect the speed of the Breaking Waves.

Shi Lei checked the WirelessHD technical information he had just stolen while paying attention to the situation of the armed unmanned patrol boats. It was close to 12 o'clock in the night, and it was past 12 noon on the Bermuda side, and the gap between the two sides was thirteen hours.

In the Bermuda Triangle area, the weather was a bit hazy at this time, and the Breaking Waves armed unmanned patrol boat, as its name suggests, was sailing quickly on the sea.

At this time, the straight-line distance between the Breaking Waves and the sea area where N235 metal is located has exceeded 40 kilometers. The Breaking Waves sailed clockwise, following the shape of mosquito coils, and the actual sailing distance was almost two hundred kilometers.

"Sir, we found three targets, about fifteen kilometers away from the Wavebreaker. Do you want to investigate?" Yizuer asked.

Sometimes Shi Lei feels that Yi Zuer is very idiotic. In this case, shouldn't he still go and investigate?

"Go!" Shi Lei's tone did not fluctuate much. He knew that Yizuer did not have human emotions. Even if he smashed the No. 1 server, Yizuer would not have any emotion at all.

The distance of fifteen kilometers only takes less than two minutes for the Breaker, which travels at seven hundred kilometers per hour!

However, the Wavebreaker was not prepared to engage in close combat. Yizuer controlled the Wavebreaker and stopped three kilometers away from the target, letting the target enter the Wavebreaker's optical observation system and feeding the image back to Shi Lei.

Shi Lei looked at the feedback images. These three ships were ships of the British Empire, which was not beyond Shi Lei's expectation. Two of them were actually warships, while the other one looked like a scientific research ship.

Shi Lei, who discovered the warship, had to say that the British Empire was a bit overbearing. The warships were coming. What kind of rhythm is this?

But, Shi Lei doesn't care about your situation!

Shi Lei just wants to keep the secret of N235 metal. If he wants to keep the secret, he needs to destroy these three British Empire ships without anyone noticing.

"Yizur, has the other party discovered the Wavebreaker?" Shi Lei asked.

The small hull of the Breaker should not be easy to detect when the waves exceed 30 centimeters. Even if it is scanned by radar, it will not be thought to be a ship, but only a wave.

"Sir, the armed unmanned patrol boat Breaking Waves has not been discovered yet!" Yi Zuer fed back what Shi Lei had guessed.

Shi Lei was thinking about how to destroy the three ships smoothly. Although using ruby ​​laser cannons could destroy them, it was impossible to destroy them silently.

The sea area where the N235 metal is located is far enough away from the land that even laser weapons are not easily discovered by people on land. The key issue now is that the ruby ​​laser cannon cannot destroy three ships in an instant.

But once the ruby ​​laser cannon launches an attack, the other party will be able to discover the Breaking Waves armed unmanned patrol boat and successfully deliver the message. Even if the Breaking Waves eventually destroys three ships of the British Empire, the information has been passed on, and the message has been passed on.

What's the use?

For now, the best way is to block radio communications near the three ships.

It is a pity that the radio jamming equipment of the armed unmanned patrol boat of the Breaking Waves is too small to interfere with the three ships of the British Empire.

Shi Lei had no choice but to think of another way!

.

PS: No one should guess how to get Brother Shitou!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next