typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk300 premeditated so plan

. The official website of JFS adopts a very extreme setting, that is, one-way link expansion technology and one-way data transmission. This has advantages, but the disadvantages are equally obvious.

The obvious shortcoming is that when a normal user browses the official website of JFS and wants to apply for any data, the web server does not have the authority to issue an application and can only passively wait for the internal data server to detect the application and then give a reply.

As a result, the browsing speed of JFS's official website is greatly reduced.

If it were any other website with such a slow browsing speed, it would definitely be crowded out by similar websites. But where does JFS come from?

If we have to talk about peers, maybe CNS and CIA can be considered their peers. However, JFS wants everyone to browse the official websites of CNS and CIA and cause confusion to them.

At this moment, the official website of JFS is under attack. And it is a very covert attack method. If Shi Lei was not very proficient in computer technology, he might not be able to discover it!

After discovering that someone was attacking JFS, Shi Lei did not act rashly, but followed secretly to observe to see what their purpose was.

It’s best to find something cheap!

Following the intruders, Shi Lei found that they had more than ten attack data streams in total. He secretly guessed in his heart, could these guys who invaded JFS be the Dark Night Dynasty?

Shi Lei selected one of the intruded data streams and tracked the other party's IP address in reverse. After breaking more than thirty broiler servers in a row, Shi Lei finally discovered the other party's real IP address.

It was the IP address of Xia Guo. Shi Lei did not check the corresponding real address. He only knew that it was in the capital!

It is rumored that An Ye, the boss of the Dark Night Dynasty, is from the capital.

Confirming his suspicion, Shi Lei became even more curious. Could it be that the Dark Night Dynasty dared to provoke JFS?

The power that JFS possesses can be described in a rough and simple way. They are about twenty times larger than the Hacker Alliance. If JFS wants to take down the Hacker Alliance, it is estimated that except for the core members of the Hacker Alliance, they can take down whoever they want.

Who will be next!

Even the core members are likely to be traced!

The Dark Night Dynasty and the Hacker Alliance are both second-generation hacker organizations. How dare they challenge JFS?

But now that they are invading JFS, it means that they naturally have something to rely on, otherwise they would not be able to come directly to die, right?

Shi Lei didn't know who the Dark Night Dynasty relied on, but since the other party was willing to distract JFS's firepower for him, Shi Lei was naturally very happy. Last time, Shi Lei deliberately moved a secret information server inside the International Intelligence Bureau of the Ministry of Foreign Affairs in order to frame Raphael.

A folder named 'SO Plan'.

Shi Lei was very interested in that SO plan!

After all, a Robot project has given Shi Lei an excellent foundation for his future development. If there are any good things to be found in the International Intelligence Bureau of the Ministry of Foreign Affairs, then Shi Lei will definitely not be polite.

The Dark Night Dynasty's attack has not yet been discovered by JFS. As a compatriot, Shi Lei is embarrassed to trick them. Anyway, there is a very hidden alarm mechanism in the JFS official website web server. They will definitely trigger that mechanism and attract the attention of JFS security experts.

.

Shi Lei only needed that time to secretly enter the JFS internal network based on the system backdoor left behind and find what he needed.

While monitoring the actions of the Dark Night Dynasty, Shi Lei accessed the internal data server of the Tokyo Earthquake Prediction Society.

In the earthquake prediction agency, the plug-in left by Shi Lei in the earthquake prediction software was still working normally. Through the records, Shi Lei discovered that the earthquake forecast for Kanagawa Prefecture had not yet appeared.

On the contrary, it prevented a felt earthquake and changed the data to a non-felt earthquake. The plug-in worked normally and everything was executed according to Shi Lei's script.

Just when Shi Lei felt bored and was about to tease Haneda Airport, on the JFS official website, the Dark Night Dynasty triggered and activated the alarm mechanism.

It is now 6:10 pm in Xia Kingdom time and 7:10 pm in Wosang Kingdom time. Due to the cyber war between the two countries, all JFS security experts did not take a break from get off work. Instead, they held their breath and called at any time. Prepare to rescue the online world of Wosang.

The security experts of JFS have been teased repeatedly by Mr.

When the Dark Night Dynasty triggered the alarm mechanism on the JFS official website, it was like poking a hornet's nest. Twelve formal security expert teams and twenty-seven reserve expert teams all came over to kill them.

Before the people of the Dark Night Dynasty could realize what was going on, they were bitten by JFS security experts, who desperately tracked their real IP addresses.

Shi Lei was waiting for this opportunity. Taking advantage of JFS's security experts to bully the Dark Night Dynasty, Shi Lei immediately secretly entered the JFS internal LAN.

The system backdoor written in assembly language is sunk into the bottom layer of the system. It is indeed very powerful. Many security experts at JFS have not discovered the existence of the system backdoor.

After Shi Lei entered JFS's internal LAN, he quickly searched for their confidential information server. He had already found the confidential information server last time, and this time Shi Lei found the confidential information server without spending much effort.

After entering the confidential server, Shi Lei felt something was wrong. Because he came in too easily, as if he had no defense at all?

Inside the secret server, Shi Lei first discovered the SO plan, as well as various other confidential information. For example: the South Vietnam Forest Plan, the Indonesian Island Plan, the Nanyang Plan, etc.

Shi Lei did not open any data rashly, but first analyzed the file system.

The first one to analyze is the SO plan. Nothing useful can be analyzed from the name of this plan. Unlike other plans, it can more or less analyze some information.

For example, the South Vietnam Forest Plan can be analyzed and found to be related to South Vietnam and its forest plan. South Vietnam has very rich forest resources, and perhaps the Wasang Kingdom is paying attention to this aspect.

Shi Lei had read a report before. There were many forests in the Wosang Kingdom, but they did not develop their own forest resources. Instead, they imported timber from the Xia Kingdom. This behavior not only satisfied the timber needs of the Wosang Kingdom, but also affected the Xia Kingdom.

The country's forest resources have been severely damaged.

However, some people in the Xia Kingdom could not see the facts clearly and tried every means to sell the wood to the Wosang Kingdom.

Returning to the topic, Shi Lei analyzed the file system of the SO plan and found that it was subject to various restrictions of the file system. It could not be opened directly, deleted, moved, or copied. In short, nothing could be done!

Shi Lei was very distressed about this kind of document!

It is bound by the file system and the server's permissions. If you want to obtain permissions, you must invade the server's permission group.

If it were an ordinary server, Shi Lei would kill all the privileged users in the permission group in minutes and become the only member of the permission group. But this is the International Intelligence Bureau of the Ministry of Foreign Affairs, a confidential information server!

Shi Lei didn't need to think too much to know that the confidential information server was definitely connected to the JFS supercomputer.

If you want to gain access to the confidential information server, you may have to deal with the JFS supercomputer.

The JFS supercomputer is very powerful, and its performance is not much different from the supercomputer Yan. Although Shi Lei controls the supercomputer Yan, Shi Lei does not dare to compete head-on with the JFS supercomputer.

Shi Lei does control the super computer Yan, but Shi Lei can only borrow part of the performance of the super computer Yan. After all, the system of the super computer Yan is responsible for various large-scale tasks. If Shi Lei does not impose restrictions and messes with the super computer Yan at will, he will definitely be super

Computer Yan's security staff found out.

For this reason, Shi Lei did not dare to compete head-on with the JFS supercomputer and could only think of other ways.

Looking at the SO plan, Shi Lei carefully inquired about the users of the confidential information server permission group.

From the permission group of the confidential information server, Shi Lei found that only three users had permission to mobilize the SO plan.

After finding these three user names, Shi Lei investigated everyone's account information in the Network Security Department within the JFS internal network.

If you want to investigate their account information, the best way is to hack into the other party's computer and look for relevant information on the other party's computer.

If you want to invade the computers of JFS security experts from the external network, although you can do it, it will be quite difficult without being discovered by them.

It's just that Shi Lei is currently on the JFS internal network. It is not that difficult to enter the computers of security experts from the internal network, and it is not easy to be discovered.

Controlling the supercomputer Yan, he found the connection information of the security experts in the internal network. After entering the computers of the security experts, he first retrieved the names of their computers.

Many people like to change the computer to their own username. Sure enough, among the computer names of the Network Security Department, Shi Lei found a username that was the same as the permission group of the confidential information server.

Shi Lei carefully checked the computer and successfully extracted the computer login password from the computer's configuration file record.

After having this password, Shi Lei now needs to take a gamble!

I bet the password of this username can be used universally in the confidential information server. If the password is universal, Shi Lei can naturally enter the confidential information server and take away the SO plan.

If the password is not universal, according to the security level of JFS, it should trigger an alarm on the confidential information server. If the operation to steal the SO plan fails, Shi Lei should rub oil on his feet and run away quickly!

Normally, Shi Lei would not be willing to gamble like this. But if he didn't take the gamble, he would have to face the JFS supercomputer. Shi Lei was not sure that he could kill the supercomputer in a short period of time without attracting attention.

The only solution for now is to give it a try!

Success or failure depends on this

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next