typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1580 Mysterious Hackers! 【Spring Festival Wishes!】

The assessment mechanism designed by h is divided into four levels!

To break through the first assessment server, one needs to reach the world's third-rate level, not only in terms of attack, but also in terms of defense.

If the defense does not reach the world's third-rate level, it is possible that the assessment server will counterattack, clear out the assessment server, and be eliminated.

After completing the first step of the test, and finding the link address of the second assessment server in the assessment server, trying to invade the second assessment server requires at least a second-rate level in the world, which is also a second-rate level in the world with a balance of offense and defense, and

Not second-rate in one aspect.

The third assessment server corresponds to world-class and world-quasi-super-class, while the fourth assessment server needs to completely reach the world-super-class level before it can break through and enter.

The hacker who enters the fourth assessment server is truly recognized by h as a member, and can also be said to be a formal member!

If you want to get a subsidy of 100,000 US dollars per month, you definitely need to know the identity information unilaterally. Otherwise, are you really treating H and Shi Lei as being taken advantage of?

In h's inspection mechanism, the first assessment server is the easiest to break through, but Shi Lei is currently observing a hacker who participated in the first assessment.

This hacker is competing with the first assessment server. If we only look at the macro analysis, the hacker's attack and the server's defense strategy are almost evenly matched.

But in fact, Shi Lei discovered something abnormal!

This hacker seems to have poor skills and can reach the world's third-rate level. Maybe he is very powerful. Because, this hacker's attack data does not choose to bypass the defense strategy of the assessment server, but cracks it head-on!

Not only that, this hacker’s cracking method is very clever. It will hardly trigger the defense strategy alarm system of the assessment server.

If Shi Lei hadn't happened to discover the existence of this hacker, he wouldn't have known about this hacker. But now Shi Lei accidentally discovered the hacker's intrusion, and Shi Lei quietly observed this hacker.

'Hey, this method is...' A familiar feeling flashed through Shi Lei's mind, but Shi Lei couldn't remember what specific information it was.

In desperation, Shi Lei continued to observe the hacker's intrusion.

The battle between this hacker and the first assessment server is still going on. If I had to use one word to describe it, it would be like boiling a frog in warm water!

That’s right!

This hacker dealt with the first assessment server as if he was boiling a frog in warm water!

He is dismantling the defense strategy of the first assessment server bit by bit. It seems evenly matched, and there is even a faint feeling of being unable to do what he wants, but it is all an illusion!

This hacker showed great strength, restrained the first assessment server, and slowly caused the first assessment server to slowly fall.

Even the information collector that Shi Lei set up inside the assessment server, which was a small measure to collect hacker intrusion plans and defense plans, was also blocked by this hacker.

Shi Lei took a breath of cold air. A chill arose in his heart!

'Damn it, who is this guy? He is so powerful!' Shi Lei thought to himself that the other party could actually stop the information collector. He was definitely not an ordinary person, at least not the so-called third-rate player in the world!

Shi Lei did not immediately alert the mysterious hacker, but prepared to continue observing to see what the hacker's purpose was.

Are you trying to blend into h? Or try to test the mechanism and track h’s related server information to collect useful intelligence information.

"Yizur, display all the hacker information that passed the first assessment server. Arrange them in ascending order according to the time of invasion breakthrough!" Shi Lei ordered Yizuer.

"Yes, private!" Yizuer immediately put all the hacker information that passed the first assessment server into the virtual transparent screen of the lip lens information processor.

In the virtual transparent screen, Shi Lei checked the relevant situation. Through the fastest hacker, it only took forty-seven seconds to break the first assessment server!

Shi Lei checked the relevant information of the first place in particular. The information collector of the first assessment server collected relevant information of this hacker.

After analyzing this information, Shi Lei showed a disdainful smile. This hacker with the fastest passing speed was not a threat. Because although this hacker did have skills, he used nearly 3tflops of computing resources to get through.

In such a short period of time, the first assessment server was completed.

The first game tested the computing speed of the server. Attacking with nearly 30 times the resources was already considered as using force to overcome skill.

Compared with the hackers Shi Lei was observing, this cracking method was completely inferior!

The hacker who ranks first in passing time is like a gorilla with a brain full of muscles, while the hacker Shi Lei is observing is like a wise man, weaving an unbreakable dragnet and wiping out the first assessment server step by step

, and no message will be sent, and his existence will not be exposed.

‘Who is this guy? It has been more than five minutes now, and this mysterious guy is still fighting against the first assessment server. What does he want to do?’ Shi Lei guessed while observing.

With the invasion of the mysterious hacker, Shi Lei gradually discovered what this mysterious hacker was doing. This mysterious hacker was not only cracking the first assessment server, but also analyzing the defense mechanism of the first assessment server.

To make matters worse, this mysterious hacker was silently destroying the defense mechanism of the first assessment server, and at the same time rebuilding the defense mechanism through analysis.

Of course, the defense mechanism rebuilt by the mysterious hacker is definitely not the original defense mechanism, and it definitely contains intrusion code belonging to the mysterious hacker.

"Damn this guy, has he actually reached such a level?" Shi Lei paid great attention to it. From the performance of this mysterious hacker, it seems that this guy has at least reached the world level, or even the world's peak level.

Without this level, it would be impossible to conceal the information collector of the first assessment server and rebuild the defense mechanism of the first assessment server.

'When this guy passes the first assessment server and enters the second assessment server, we can probably judge what level this guy has reached!' Shi Lei thought secretly in his heart.

As Shi Lei quietly observed, more than three minutes passed by. This mysterious hacker finally completed the first assessment and found the link address of the second assessment server in the assessment server.

.

According to h's assessment settings, once a hacker participating in the assessment leaves the first assessment server, the connection to the first assessment server will be automatically disconnected.

The mysterious hacker knew this rule and entered the second assessment server without any hesitation.

Somewhere in a mysterious place, in the dark shadows, a guy whose gender is unclear is typing on the keyboard. Even through the light of the screen, it is impossible to see what the hands typing on the keyboard look like, because this

The hands are actually wearing gloves!

"What happened to the server in the first assessment? Let me see what the background of this H is!" The guy hidden in the shadows said to himself. Judging from the voice, it should be

He is a middle-aged man.

This man hiding in the shadows was the mysterious hacker Shi Lei observed. He rebuilt the defense strategy of the first assessment server, and just as Shi Lei predicted, he added his own source code to the defense strategy.

That was a piece of tracking and positioning code. This mysterious man hiding in the shadows was trying to determine h's internal network through the first assessment server.

If Shi Lei hadn't been very lucky and happened to discover the situation of this mysterious hacker, I'm afraid this mysterious hacker might really succeed.

After all, according to Shi Lei's design plan, once the first assessment server is passed, it will indeed return to the sequence of the iwn secret network.

The mysterious hacker's intrusion method was very wonderful. He blocked the information collector, rebuilt the defense strategy, and hid the positioning and tracking code in the defense strategy. When the first assessment server returned to the iwn secret network, the tracking and positioning program

It will start and send the relevant information to the mysterious hacker.

The mysterious hacker can also know the existence of the iwn secret network and further investigate the information of the iwn secret network.

However, luckily, Shi Lei discovered this mysterious hacker and knew that this guy had rebuilt the defense strategy in the first assessment server.

Therefore, Shi Lei ordered Yizuer to conduct a thorough scan of the first assessment server that tested the mysterious hacker, and reset it.

When Yi Zuer carried out Shi Lei's order, the mysterious hacker actually chuckled, "Reset the server? Well, that's interesting! It seems that all these assessment servers belong to h? Or does h use a virtual server?

technology?”

Since the first assessment server has been reset, this mysterious hacker has lost the channel to obtain more information. He can only continue to invade the second assessment server.

Shi Lei also has more opportunities to observe this mysterious hacker and determine the identity of this mysterious hacker...

.(To be continued)

ps: Thank you for your support, thank you all, and wish all my friends a good harvest in love and career in the new year!

...


This chapter has been completed!
Previous Bookshelf directory Bookmark Next