HK1581 The peak is coming! [Smooth Chinese New Year!]
h2>.
CH recruited members of peripheral organizations, and the assessment server used indeed adopted a virtual server solution. Using the resources provided by the iwn secret network, Shi Lei constructed a virtual server, but this virtual server used Shi Lei's unique technology, even if it is of the same level
Hackers cannot be judged without spending a lot of time researching.
Shi Lei observed the contest between the mysterious hacker and the second assessment server. Just like the first assessment server, the second assessment server was trapped in the mysterious hacker's network from the very beginning.
The level targeted by the second assessment server is mainly the world's second-rate hackers, and the mysterious hacker's technology far exceeds this level. Therefore, the mysterious hacker can handle the defense system and counterattack system of the second assessment server with ease.
Shi Lei just quietly observed the mysterious hacker's intrusion method and had no intention of interfering. Even though the server in the second assessment was almost powerless to resist, Shi Lei did not take action personally.
In a mysterious room, a mysterious hacker was typing on the keyboard with gloved hands, unhurriedly, without increasing his typing speed.
This means that the mysterious hacker is so confident that he doesn't care about the defense system of the second assessment server or the counterattack system. He is absolutely sure to win!
"The defense strength has been greatly improved!" The mysterious hacker said to himself while dealing with the second assessment server.
Regarding the defense strength of the server, every hacker has his own weights and measures in his mind. The CH assessment system designed by Shi Lei basically combines the boundaries of the mainstream public as a reference.
The mysterious hacker suddenly stopped typing on the keyboard and deliberately let the second assessment server counterattack, as if he couldn't resist it. This was the mysterious hacker analyzing the second assessment server and the plan and strength of the counterattack.
'The defense strength and counterattack strength of the first server were slightly lower than the world's third-rate level. At the same time, the calculation speed of the assessment server was not very good. If the hackers participating in the assessment reached the world's third-rate level and had performance
A reliable computer has a great chance of breaking the first server.' The mysterious hacker thought secretly in his heart.
'As for the current server, the computing speed should have increased by more than ten times, and the defense system is better, almost close to the world's second-rate level. It seems that this CH organization does have some strength, at least the assessment system is doing very well.
Well!' The mysterious hacker couldn't tell whether he was praising or ridiculing him in his heart.
After all, the mysterious hacker almost ignored the second assessment server, and it was a completely one-sided battle. If it were not for the mysterious hacker, not only would he have to pass the test, but he would also have to restrain the second assessment server from transmitting information and prevent it from being discovered by CH.
I'm afraid the server for the second assessment has long been breached by him!
Even under such many restrictions, this mysterious hacker still showed shocking strength and quickly cracked the server's defense system in the second test.
In about ten minutes, all the defense systems of the second assessment server were broken through, all counterattack systems were restrained, and the mysterious hacker announced that the test of the second assessment server was completed.
Inside the second assessment server, the mysterious hacker did not spend even a minute and found the specific link address of the third assessment server.
"Private r, do you want to improve the security defense strategy of the third assessment server?" Yi Zuer observed the intrusion of mysterious hackers anytime and anywhere. Two consecutive tests were easily broken by the mysterious hacker. Yi Zuer judged based on conditioned reflexes and took the initiative to ask for help.
Shi Lei made suggestions.
But Shi Lei shook his head, the situation of the third test must not be changed!
If we upgrade the security defense strategy of the third test server, it is very likely that mysterious hackers will find flaws. After all, the members of the peripheral organizations selected for the third test are not real elites, so there is no need to spend a lot of effort.
Shi Lei plans to set up a strict security defense system inside the fourth assessment server to try to fight against this mysterious hacker.
After all, the announcement issued by CH made it very clear that once you complete the Le Legend level test, you will be eligible to become a formal member of CH, not just a peripheral member.
Under such circumstances, it is reasonable for the security defense strategy of the fourth assessment server to be stricter and will not arouse suspicion.
"Yizur!" Shi Lei shouted softly, "Isolate the second assessment server used by the mysterious hacker. Once the other party leaves the second assessment server, prepare to fully analyze the situation of the second assessment server!"
"Yes, private!" Yizuer responded to Shi Lei's instructions in the bone-conducting earphones of the lip lens information processor.
In the second assessment server, the mysterious hacker rebuilt the defense strategy just like the first assessment server and made some modifications.
In the first assessment server, the security policy modified by the mysterious hacker did not have any feedback results because the server was reset. This time, the mysterious hacker already had relevant countermeasures.
'I hope that the contents of the second assessment server will be reset directly after the use is completed! Huh, I don't believe that this CH organization has so many servers. It must be an assessment server constructed by a virtual server.' The corner of the mysterious hacker's mouth,
Showing a sinister smile.
The mysterious hacker confirmed the security defense strategy he had built himself in the second assessment server from start to finish. He finally nodded with satisfaction, then left the second assessment server and entered the third assessment server.
When facing the third assessment server, the mysterious hacker did not rush to attack, as if being blocked by the third assessment server, the two sides were in a stalemate.
But in fact, the mysterious hacker is paying close attention to the situation of the second assessment server!
Although he had lost his connection to the second assessment server after leaving the second assessment server, the mysterious hacker was waiting for his preset method to take effect.
"Private r, the mysterious hacker left the second assessment server. The system has isolated the second assessment server and has not merged into the iwn secret network for the time being." Yi Zuer issued a prompt.
Shi Lei nodded, "Comprehensively analyze the situation of the second assessment server, focusing on the changes in defense strategies!"
Yi Zuer executed the order and started the analysis. After waiting for a moment, dense data information was displayed on the virtual transparent screen of the lip lens information processor.
Shi Lei looked at the data information carefully and couldn't help but take a breath!
The mysterious hacker’s methods are very clever!
Shi Lei had to admit that the mysterious hacker's technology was very powerful. The other party almost completely rebuilt the defense system of the second assessment server and hid the code he needed to execute.
If it was just like this, Shi Lei would not be surprised at all. What really surprised Shi Lei was that the code that the mysterious hacker needed to execute was completely integrated into the defense strategy. If Yizuer's simple routine scan was not carried out,
With a full scan, it's definitely possible to miss this problem.
After all, the resources of the second assessment server are only very small. Under normal circumstances, Yizuer will not perform a comprehensive scan, but will simply reset the server, collect the server's resources, and return to the iwn secret network.
The first key piece of source code implanted by the mysterious hacker into the second assessment server is to prevent the server from resetting and send deceptive feedback information.
Once the feedback information deceives Yizuer, the second assessment server can join the iwn secret network intact. At this time, it is not the second assessment server, but a broiler server of the mysterious hacker.
The broiler server equivalent to the mysterious hacker is connected to the iwn secret network, and the mysterious hacker has the qualification to view the inw secret network.
What’s even more amazing is that through Yi Zuer’s simulation deduction, when the second assessment server enters the iwn secret network as the mysterious hacker’s broiler, it will release deceptive information again and integrate into the entire iwn secret network.
‘It turns out that this guy has already judged that the assessment server uses virtual server technology, and he actually wants to penetrate the entire iwn secret network, which is quite ambitious!’ Shi Lei snorted in his heart, but he had to admit that the mysterious hacker’s skills were very strong.
Until this moment, Shi Lei could basically tell that this mysterious hacker was indeed the world's top hacker!
However, the world's top hackers are also very rare in the world. To become the world's top hacker requires not only the support of technical knowledge, but also strong natural ability.
The top hackers are not given relevant technical information, and they can follow the technical information to reach the top step by step. If it were really that easy, the hackers of Lijian Kingdom would have dominated the world long ago, and the hackers of Xia Kingdom would have
A chance?
"Who is this world's top hacker?" Shi Lei thought about it in his mind. Having experienced another life journey, Shi Lei could express by patting his chest that he is more or less the world's top hacker around the world.
Have some understanding.
Even if he is an old monster who is advanced in Darpa, Shi Lei knows some things! After all, the circle of the world's top hackers is only so small.
Shi Lei once again looked at the virtual transparent screen of the lip lens information processor. Regarding the comprehensive analysis of the data on the second assessment server that tested the mysterious hacker, Shi Lei vaguely had an answer...