typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1391 Hacker's war, never far away!

It's almost eight o'clock in the evening.

Tao Wenxian followed Shi Lei's instructions and hacked into the FBI's internal network, successfully containing the network defense forces of the FBI and CIA.

Shi Lei did not follow him into the FBI's internal network, but took advantage of the CIA to support the FBI and killed him!

Shi Lei had a good understanding of the CIA. He knew that the CIA's network security force usually had an action notice when it acted.

This action notification usually explains the reason for the action and the goal of the action. Of course, this action notification is an automatically deleted information. It will be automatically deleted after being read or the preset storage time is completed.

Shi Lei is preparing to invade the CIA's internal network to restore relevant notification information in the CIA's notification system data server.

As for whether it can succeed, Shi Lei doesn't know yet.

After all, the CIA's notification system data server, in addition to having strict defense strategies, also uses storage media that are not ordinary mechanical hard drives.

Under normal circumstances, the data information is first stored in the memory and then written to the storage medium. However, the notification system of the CIA needs to process a lot of data every day and needs to be highly confidential. Therefore, the CIA uses

nandssd storage technology.

This storage technology far exceeds the read and write speed of mechanical hard disk storage technology. It is the next generation of storage technology and will be widely used in the future.

Compared with the HDD mechanical hard drive technology, nandssd has many advantages, but for Shi Lei, this technology seems to be extremely cheating under the current situation.

Because Shi Lei wanted to recover data and read the notice information from the CIA. The technology to recover data is very convenient to put on HDD mechanical hard drive. Even data from ten years ago can be read out.

But nandssd technology is different, and the theory of storing data is different!

It was very difficult to recover data from the nandssd hard drive. Shi Lei could only hope to obtain the relevant data information by relying on the Central Intelligence Agency's notification system data server. The data cleaning operation had not yet been performed.

Otherwise, it is really impossible to recover deleted data from nandssd hard drive.

After Shi Lei ordered Yizuer to prepare the computing resources, he did not immediately invade the CIA's internal network. Instead, he was looking for a better way to invade.

"Yizur, catch a CIA that invaded Dreamer's online payment system and used the broiler server." Shi Lei thought of a good way.

According to Shi Lei's past habits, he likes to start directly from the official website of the CIA and forcefully invade from the official website to break through the defense of the internal network.

This method seems stupid. It makes it appear aboveboard and very easy to be discovered. In fact, it is not the case. As long as it is slightly disguised, the security experts of the CIA will only think that this kind of intrusion is a test by an unknown hacker.

without attracting attention.

Although the direct intrusion method is very safe, Shi Lei does not want to do it. Because that method of intrusion has the highest probability of failure, and once it is discovered, CIA security experts will definitely track it down, which will cause more troublesome reactions.

Track issues.

Therefore, Shi Lei chose a more covert anti-tracing plan, directly from the CIA's broiler server, along the CIA's intrusion route, reverse tracking, and entered the CIA's computer that sent the intrusion.

This solution is more subtle, but also more dangerous!

Because the ultimate source of the intrusion must be the CIA security experts who are using and operating the computer to invade the Dreamer Online Payment System of Dream Entertainment Company. If it is not handled properly in the slightest, it will be stolen by the security experts of the CIA.

Experts discovered.

Or should I not say CIA security experts!

Because, this group of personnel, like the mysterious temporary workers of Xia Kingdom, do not have a CIA establishment, nor do they have any identity records.

Even if Shi Lei accurately tracked their location information, there was no way to label them as CIA employees.

So when facing these guys who were considered temporary workers, Shi Lei really had no choice but to confront them head-on, instead of preserving relevant evidence, which caused a huge fuss.

Yi Zuer followed Shi Lei's instructions and quickly grabbed an unimportant broiler server. This broiler server did not transfer many data flows. Shi Lei successfully tracked the data flow and traced the source upstream.

About two minutes later, Shi Lei directly penetrated into the opponent's computer without arousing the opponent's alert, and then used the opponent's computer as a springboard to naturally enter the CIA's internal network.

In the CIA's internal network, Shi Lei scanned the notification information, but since the CIA dared to release the notification information so boldly, and also explained the reasons and targets in detail, it proved that they had great confidence in the notification system.

Shi Lei didn't find any notification information!

Fortunately, Shi Lei did not expect to get the information directly at first. He entered a string of codes on the keyboard with both hands, and Yizuer immediately scanned the data server of the CIA notification system.

This special data server indeed uses nandssd hard disk storage technology. In just ten seconds, given the excellent performance of nandssd hard disk, Yizuer has already scanned the entire disk.

However, there is still no residual information found in the notification message!

Shi Lei personally scanned it and found no relevant information. From this point of view, the system's data server should be notified and let nandssd execute the command, which is the secure erase command.

This command is a special command for nandssd hard disk. It can clean the data residue of SSD very cleanly. It will not be like ordinary HDD mechanical hard disk. Even the data ten years ago can be retained.

Shi Lei frowned and looked at the information displayed on the screen of Server No. 1. If he could not obtain information from the CIA's notification system, could he only openly break up with the CIA?

This is a situation Shi Lei doesn't want to do!

‘By the way, there is another way!’ Shi Lei suddenly thought of a way, not for nandssd hard drive, but a different way of thinking.

Being a world-class hacker requires not only excellent skills, but also a quick-thinking mind. Since information cannot be obtained from the CIA's notification system data server, why not obtain notifications from the computers of relevant security personnel?

How to get the information you need?

Shi Lei smiled and returned the security expert's computer that was connected to the broiler server before. In the era of 2008, although nandssd technology was mature and put into use, the cost was still very high and it was not installed on ordinary computers.

This security expert still uses ordinary mechanical hard drives. This is not because he cannot afford the cost of nandssd hard drives, but it is completely unnecessary.

If the notification information issued by the Central Intelligence Agency of the CIA remains in the internal system of the Central Intelligence Agency of the CIA and the relevant information is intercepted by hackers, it will indeed be big news.

But when this piece of information was leaked to the outside, it was nothing at all!

Can one piece of information prove the CIA's guilt? That's simply ridiculous! If it were such a simple thing, Shi Lei could forge a hundred pieces of relevant information every day to slander the CIA.

Although he found clues and determined the feasibility, Shi Lei suppressed his excitement and carefully scanned the security expert's computer.

Because this computer has been used by security experts, if there is any abnormality or the security trap set by the other party is triggered, Shi Lei will declare the operation failed.

Ordinary HDD mechanical hard drives have a big drawback, that is, whether data is being read or written, the hard drive light will always be on.

Shi Lei first needed to hack into the computer's motherboard and the OS system, and change the programs fixed inside the OS system so that the hard drive light would not stay on when the hard drive was reading and writing.

This is not an easy job!

It would be too simple to just turn off the hard disk light. But this security expert is using a computer. If the hard disk light goes off and he is writing or reading data, doesn't it mean there is a problem?

Shi Lei carefully modified the information of the OS system. It took about ten minutes to finally complete the modification of the program that controls the hard disk light.

"Let me see what the reason is!" Shi Lei scanned the security expert's computer hard drive. The scanning speed was very slow because he was afraid of arousing the security expert's alert.

After waiting for almost half an hour, Yizuer finally completed the scan and recovered the information that was deleted today. At the same time, he used 'Dream Entertainment', 'Xia Guo', 'Mirui Technology', etc. as keywords to match the deleted information.

information.

After less than half a minute of screening, Yizuer displayed a message on the virtual transparent screen of the lip lens information processor.

Shi Lei also finally knew why the CIA was ruthlessly biting the Dream Entertainment online payment system!

'According to the latest information received, the Dreamer Online Payment System of Dream Entertainment Company will provide convenient money laundering services for some criminals in our country. This information comes from the well-known hacker Rafael and has high credibility. To perform the task,

Invade Dreamer's online payment system and confirm the source of funds and related trader information for each transaction.'

Shi Lei's expression was startled, Raphael?

.(To be continued..)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next