typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk134 bad situation

When they arrived at the Film and Television Photography Company, the woman from Wosang at the front desk glared at Shi Lei and said, "We are not hiring here. Please leave, otherwise I will call the police!"

Shi Lei looked around and nodded, turned around and slowly walked out of Advent Film and Television Photography Company, observing the surroundings as he walked.

'There are four surveillance cameras in the lobby, no security personnel, open parking lot. Working hours are from 9 am to 5 pm, lunch should be takeout, and there are takeout garbage boxes in the trash can! I just don't know, the security monitoring system is connected

The Internet is gone!' Shi Lei was calculating in his mind as he walked out of Advent Film and Television Photography Company.

In the Arrival Film and Television Photography Company, Xiao Inu Ichiro walked to the lobby and looked at Shi Lei's leaving figure. He felt vaguely familiar, "Xingzi, who was that guy just now?"

The woman at the front desk named Kyoko looked at the short, fat and ugly woman in a flattering manner, "President Xiaoquan, that guy came to apply for the leading role, but I kicked him away!"

Koinu Ichiro was a little relieved. If he had come to apply for a job, he was definitely not that person!

Shi Lei observed around Advent Film and Television Photography Company, checking the specific terrain around it, and checking to see if there were any locations that could be used.

‘There is a camera on every courtyard wall. Is there any blind spot to monitor? It’s really troublesome!’ Shi Lei got into a taxi and returned to the hotel.

Ma Liang was monitoring Dog Ichiro, Zheng Sanpao was preparing plastic bombs, and Ye Feng was taking care of Deng Xiaoling in the hospital. Shi Lei was alone in the hotel room, looking at the surveillance map drawn by Ma Liang.

'Adventure Film and Television Photography Company is indeed the best place to start!' Shi Lei whispered in his heart, then turned on the computer in the hotel room and used the Internet search engine to search for information about Advent Film and Television Photography Company.

Arrival Film and Television Photography Company is actually quite famous in Tokyo!

And just as Shi Lei expected, this company is really a photography company that shoots love action art films!

Shi Lei opened the official homepage of Advent Film and Television Photography Company in his browser. The opening speed was very slow. Shi Lei narrowed his eyes slightly. On their official homepage, he browsed the covers of various love action art films and the trailers of new films.

‘With such poor access speed, could it be that the film and television photography company adopted a workstation-level server and put it in the company as a web server?’

Shi Lei secretly deduced, and then quickly used code injection to enter the other party's server backend from the official website, and easily broke through the web server's defense. After entering the web server, Shi Lei checked the server configuration, and just as he had deduced, he arrived

As expected, the film and television photography company only used a workstation-level server as its own official website web server.

Through this workstation-level web server, Shi Lei quickly browsed the internal LAN of the Advent Film and Television Photography Company, trying to find the computer that controlled the security monitoring system.

Unfortunately, Shi Lei explored all internal LANs and found no trace of the security monitoring system. From this point of view, the security monitoring system of Advent Film and Television Photography Company should be independent of the Internet.

Security monitoring systems are generally divided into two types. The first one is like that of Advent Film and Television Photography Company, which is independent from the Internet. Although it is relatively safe, it has a fatal weakness, that is, it cannot be remotely monitored and requires security personnel to monitor at all times.

The other is a security monitoring system connected to the Internet. This security monitoring system can use any computer device to obtain surveillance images anytime and anywhere through the Internet. Because of this convenience, this type of security monitoring system is used in many situations.

'Trouble! Damn it! They didn't connect the security monitoring system to the Internet. They obviously don't have security personnel, so why do they still have an independent security monitoring system!' Shi Lei thought with some distress.

A security monitoring system that is not connected to the Internet is separated from the physical connection of the Internet. Even God cannot hack this system without a physical connection to the Internet through the Internet!

Isolating physical connections can be a very effective defense against hacker intrusions!

Shi Lei logged out from the web server of Advent Film and Television Photography Company, then cleaned up the traces of intrusion on the hotel computer, and then studied the map. He found a viaduct on the map, and then used the search engine on the computer to search for the name Friendship Bridge.

place.

The Friendship Bridge is a 16-meter-high viaduct that spans two main roads and has an underground passage. This is the place where Inu Ichiro must pass when driving!

Shi Lei constructed a plan in his mind and immediately prepared to implement it. He first searched for information about the three bars on the search engine, hoping that the security monitoring system of one of the bars could be connected to the Internet and be controlled remotely. But the result was that

Shi Lei was disappointed. The three bars had no official websites at all, and their IP information could not be found. How could they talk about intrusion?

Shi Lei carefully searched the Internet for information about Bar C, which had relatively good geographical conditions. Bar C was called Peach Bar. Shi Lei planned to investigate and find the IP address of Peach Bar first.

Since there is no official website, we cannot get IP intrusion from the official website. We can only start with the real address of Peach Bar, and then search for the IP address corresponding to this address in the user database of the Internet service provider. This process is equivalent to

The method of tracing the network to the IP address and then finding the actual address based on the IP address is reversed.

Shi Lei used the Internet search engine to find the phone numbers of many Internet service providers in the area where Peach Bar is located. Then he smiled, took out a prepaid anonymous mobile phone that he just bought, and selected one according to the number on the screen.

In the past, Shi Lei was ready to determine which Internet service provider the Peach Bar was from and which broadband service he had purchased so that he could respond to the invasion.

"Hello, So-net Network, how can I serve you?" A sweet voice came from the phone receiver. So-net is one of the network service providers in Tokyo and is affiliated with Sony Corporation.

.

Shi Lei responded in standard Japanese with Osaka accent: "Hello, I would like to apply for a broadband line."

So-net's customer service lady replied: "Sir, where are you located? How much bandwidth do you need to apply for broadband service?"

Shi Lei said seriously: "I'm at No. 27, 6-chome, Sumida-ku, Tokyo!"

The customer service lady inquired and replied strangely: "Sir, are you a customer of Taose Bar? You have already applied for a broadband line. Do you plan to apply for another one? Or are you planning to increase the speed?"

"Oh? Really? I'm sorry, I'm a newly recruited employee of Peach Bar. I may have misunderstood the leader's order. I'm really sorry for disturbing you!" Shi Lei apologized sincerely, but he was sneering in his heart. He finally confirmed Peach Bar.

Internet service provider, then you can start looking for their IP address!

"It's okay! So-net Network, I wish you a happy life, goodbye!" The customer service lady hung up the phone.

Shi Lei used the hotel's computer to connect to ACCESS's first-class broiler, and then invaded So-net's official server through ACCESS's first-class broiler. Without alerting So-net's technical staff, Shi Lei easily found Tao Se.

The IP address of the bar, then cleaned up all traces of intrusion, and left calmly!

The whole process took no more than three minutes!

Obtaining the IP address of Taose Bar, Shi Lei controlled the first-level broiler of ACCESS and successfully entered the computer connected to the Internet. Using this computer, Shi Lei first searched all the connections of the internal LAN and found that Taose

In the bar, there are only three devices in total connected to the Internet.

Two of them are ordinary personal computers, and the other device is an audio player, which controls the music on-demand system of the entire Peach Bar.

Shi Lei didn't find any particularly useful information on the two personal computers, and the other party's security monitoring system was not connected to the Internet as expected, which made Shi Lei very depressed!

After leaving Peach Bar, Shi Lei once again used the little trick just now, under the guise of installing broadband, to find the IP addresses of the other two bars, and then checked their situations. The security monitoring systems of the other two bars are also independent of the Internet.

, and there is only one personal computer connected to the Internet, which makes Shi Lei quite embarrassed!

In industries like bars that are very little dependent on the Internet, the role of hackers is not obvious.

Shi Lei once again entered the Peach Bar's internal network and spied on the audio player. Currently, it was the only thing that could be used.

After carefully checking the information in the two personal computers, Shi Lei discovered a very interesting piece of news. The seller of the audio player actually went bankrupt!

In other words, if the audio player is damaged, Peach Bar will have to pay for repairs out of its own pocket!

Seeing this news, Shi Lei suddenly laughed!

Because, he finally found a way to deal with Ichiro Kogu without leaving any evidence!

Shi Lei controlled the first-level broiler of Aixin Company, implanted a timer virus in the audio player, and then added a professional maintenance service to the various contact lists stored internally on one of the personal computers in Peach Bar.

Contact numbers for various audio players!

Seeing that the timed virus in the audio player would erupt at seven o'clock tonight, Shi Lei neatly cleaned up the traces of the invasion, then lay on the bed comfortably and rested.

At noon, Shi Lei casually ate some ramen in the hotel, then checked the Tokyo city's road surveillance system, and made several tentative attacks.

Tokyo's road surveillance system has a very strong defense, at least with the hotel's computer, it is absolutely impossible to break into it! Shi Lei just tried it out and quietly retreated.

In the afternoon, Shi Lei bought two portable wireless network cards at the electronic market outside and returned to the hotel.

At nearly six o'clock, Zheng Sanpao came to Shi Lei's room carrying a suitcase. He whispered: "Boss, we got a plastic bomb!"

Shi Lei clapped his hands and said: "Just in time, I also thought of a perfect plan!" (To be continued. If you like this work, you are welcome to register as a Piaotian Literature member to recommend this work. Your support is my biggest motivation.

)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next