typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk258 Catch broilers, loopholes!

. In 2006, Xia State had a total of two cyber wars against Wosang State. Wosang State retaliated once, but retreated in a hurry.

This is because without Shi Lei's knowledge, CNS intervened, and their formal security expert team tracked the members of the Sakura Group, leaving the Wosang Kingdom hackers without their leader, so the Wosang Kingdom hackers retreated after a short attack.

Pink Sakura's initial public opinion attack was too sharp and pointed directly at the social problems existing in the Xia Kingdom, which made the leaders of the Xia Kingdom very unhappy.

Fortunately, Pink Sakura ran fast, and CNS only dispatched an official team to pursue her. If Pink Sakura was still in the Xia Kingdom's network, there is no guarantee that the twelve expert teams of CNS would collectively attack Pink Sakura.

That pink cherry blossom will definitely kneel down!

In the online world of Wosang Country, Raphael provoked Mr. M, Shi Lei's vest. Shi Lei successfully got through the endless defense of the anti-virus firewall. Now that he had the prerequisites to protect himself, he was a little ready to take action.

Although Shi Lei participated in the previous two wars between the Xia Kingdom and the Wosang Kingdom, he was either fueling the flames or working behind the scenes. He never fought head-on!

This time, the moon virus was raging in Wosang Country, and Raphael was provoking him, so Shi Lei decided to bully Raphael!

If you want to bully someone, you must first make perfect preparations, such as catching a chicken.

There are only two fixed broilers in Shi Lei's hands. The first one is the core broiler supercomputer Yan. Yan is the absolute trump card in Shi Lei's hands. With the supercomputer Yan in hand and endless defense, Shi Lei is not afraid of anyone at all!

Of course, not being afraid of anyone does not mean that you can mess with anyone. For example, the CNS of the Xia Kingdom, the International Intelligence Bureau of the Ministry of Foreign Affairs of the Wasang Kingdom, and the CIA and FBI of the Lijian Kingdom, etc.

Super Computer Yan, combined with Endless Defense, can indeed resist them, but doing so will undoubtedly expose Super Computer Yan.

If the supercomputer Yan is lost, Shi Lei's strength in the Internet will be reduced by at least half!

Shi Lei's other broiler is the public server of Shuangqing University. This broiler is very weak and can only be said to be Shi Lei's little toy. He can use it to perform daily tasks. He wants to borrow the public server of Shuangqing University at a critical moment.

, not much possibility at all.

During the second cyber war between the Xia Kingdom and the Wosang Kingdom, Shi Lei abandoned ACCESS's first-class broiler and the Rock Firewall just to protect the supercomputer Yan. That lesson was still deeply remembered by Shi Lei.

So before bullying Raphael, Shi Lei planned to catch a few more chickens and be fully prepared.

Using the supercomputer Yan, he scanned the Internet world of the Wosang Kingdom. Shi Lei himself also used the search engine of the Wosang Kingdom to check the official websites of some high-tech companies to look for opportunities.

After searching on the search engine, no suitable match was found. Shi Lei touched his stomach, stayed up all night, and slept all day, he was indeed a little hungry now.

After taking a look at the scanning progress of supercomputer Yan, Shi Lei stood up and found some food in the refrigerator, such as bread and milk.

He heated the bread and milk in the microwave. Although it was not delicious, Shi Lei's own cooking skills were even worse. He missed Ouyang Xiang's cooking skills!

After reluctantly finishing the bread and milk, Shi Lei washed his hands and sat back in front of Server No. 1.

Supercomputer Yan's scan has returned good news. Supercomputers are rented to external parties, and some companies that need supercomputers have purchased Supercomputer Yan's computing services.

Most of these companies that need supercomputers are high-tech companies, and their own servers are also quite powerful. With the help of Super Computer Yan, Shi Lei has the authority to connect to the servers of those high-tech companies, and reversely traces Super Computer Yan to several high-tech companies.

.

Among these high-tech companies, Shi Lei selected two companies with superior server performance and low server usage.

These two companies, like the original ACCESS, rented the supercomputer Yan just to enhance the company's reputation rather than actually using the supercomputer Yan.

Shi Lei first attacked a company called Leyu Company through the authority of supercomputer Yan. This company mainly provides computer service support to other companies.

Their servers adopt cluster mode. The so-called cluster mode is a cluster server. To simply describe a cluster server, it means that multiple servers can work like one server.

For example, the cluster server of Leyu Company has a total of eight independent servers. They improve stability and computing power through the cluster system.

There are many benefits of using a cluster server. For example, when upgrading a server, the old server cannot just be discarded, and service continuity must also be considered. At this time, if a cluster server is used, the new server can be directly connected.

Form a cluster server to directly improve performance.

Another benefit of the cluster server is that if there is a problem with an independent server in the cluster server, other servers can take on fault-tolerance tasks and isolate the faulty server from the cluster system through special software, and the remaining servers can

The load transfer mechanism between them re-realizes load balancing. At the same time, security personnel are given a reminder of the existence of the faulty server.

Leyu Company's cluster system uses a Unix system that can accommodate up to eight independent servers. They have also configured eight independent servers, reaching the limit.

Shi Lei knew of another cluster system that could support 96 independent servers, and that was Compaq's OpenVMS!

However, as early as 2002, Compaq had been acquired by HP, which resulted in HP's servers becoming increasingly powerful.

The Unix cluster system used by Leyu Company is equipped with eight independent servers with a computing speed of 0.2TFLop/s. The combined cluster servers have a computing power that is about 60 times more powerful than the server group of ACCESS.

With the help of the supercomputer Yan, Shi Lei successfully invaded Leyu Company's cluster server and began to execute his own invasion plan.

The advantages of cluster servers are obvious, but they also have disadvantages.

Since cluster servers have fault-tolerance tasks for each other, when an application running on an independent server fails, or an independent server fails, other servers will open the application again due to fault-tolerance tasks and take over the applications located on the shared disk cabinet.

data area, thereby allowing the faulty application to re-run.

This mechanism is very good and is one of the advantages of cluster servers, but it is also one of the disadvantages of cluster servers.

The process of application takeover generally requires three steps.

The first step is to detect the fault tolerance task and determine whether the fault really exists. The second step is to restart a certain server in the cluster server to restart the faulty application. The last step is to take over the data area of ​​the shared disk cabinet.

If an application on an independent server fails, it will take a certain amount of time for other servers in the cluster to take over the application. And this time depends on the size of the application in question. The larger the application, the more time it takes!

In view of this mechanism, which has both advantages and disadvantages, Shi Lei found a large-scale application running in the cluster server of Leyu Company.

After forcibly stopping this large application and isolating this independent server, Leyu's cluster server started the application from another independent server under the management of the fault-tolerant task mechanism, and then the load transfer mechanism began to adjust the remaining seven servers.

Load balancing.

During the load balancing deployment, the cluster system has the highest system resource usage and the weakest system defense. With this moment and the power of supercomputer Yan, Shi Lei invaded the core of the cluster system and gained super privileges!

Obtaining the super authority of the cluster system, that is to say, mastering the cluster server of Leyu Company, turned him into his own chicken!

Shi Lei chuckled and numbered the newly acquired Leyu Company broiler as server number 2 to facilitate his memory.

After securing Leyu Company, Shi Lei did not stop and continued to move towards the second goal.

The second target, called Pukong Technology, is a scientific research company, and their servers are also cluster servers.

However, Pukong Technology's cluster server is different from Leyu Company's. Leyu Company's cluster server consists of eight independent servers working together under the Unix cluster system to form a whole. Pukong Technology's cluster server is just a simple server.

It is simply composed of two servers, one main server and one backup server.

This architecture is another form of cluster server. The main server assumes all services. Only when the main server fails, the backup server takes over all tasks of the main server.

Shi Lei checked that the performance of the main server reached 1TFLop/s, and that of the backup server also reached 0.5TFLOp/s. The two servers combined were also more powerful than the core server group of ACCESS!

For this kind of cluster server, Shi Lei is very handy!

Shi Lei hacked into the main server's periphery, wrote a message simulating a problem with the main server, and passed it to the backup server. The backup server immediately began to take over the tasks of the main server, and the two servers would activate the priority of the cluster system at the moment of taking over.

Judgment procedure.

The main server has not failed and needs to execute all applications; while the backup server needs to take over all tasks because it has received failure information from the main server.

When a conflict occurs between the main server and the backup server, the cluster system will activate the priority judgment program to verify whether the main server is normal.

This conflict time and verification time are very short, but it is enough for Shi Lei, the world's top hacker, to break into Pukong's cluster system.

After successfully entering the system, Shi Lei tried to obtain super permissions, and he actually discovered a classic vulnerability!

Pukong's cluster system is also a Unix system. Shi Lei only analyzed it for a moment before laughing out loud.

"What an idiot! He made such a big mistake!".

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next