typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk301 was impersonated? (19/44)

. In the JFS internal network, Shi Lei came to the confidential information server again. This time, Shi Lei did not use the JFS internal network and the universal authentication identity to enter, but entered the account and password he had just obtained.

The mouse hovered over the confirm login button, but Shi Lei still didn't click it.

'Damn JFS, do all these embarrassing settings. Oh, just die, success or failure depends on this!' Shi Lei gritted his teeth and pressed the confirmation button.

Shi Lei vigilantly monitored the data exchange of the confidential information server to prevent it from suddenly sending out an alarm without him knowing it. However, everything seemed to be developing in a good direction. With the account and password he had just obtained, he successfully logged into the confidential information server.

Shi Lei gained permission!

After obtaining the authority, Shi Lei immediately started copying the SO plan!

The size of the SO plan is more than 500MB, which is almost 0.5GB.

Shi Lei controlled the download speed and transmitted the SO plan from the confidential information server back to a fixed enterprise-level broiler server.

With a volume of 0.5GB, Shi Lei did not intend to take the risk of sending it directly back to the No. 1 server, because this point-to-point transmission would directly expose Shi Lei's real IP address.

There are two important parameters for transmitting data on the network. The first is the source IP address of the data, which is the point from which the data is sent. The second is naturally the destination IP address, which is the end point of the data. There are also some other parameters.

,For example, this data has passed through which routing nodes and other information.

If Shi Lei directly sends the SO plan back to Server No. 1, if something unexpected happens midway, Server No. 1 will be exposed to JFS.

Although Jing Yayuan's broadband service is provided, Shi Lei has already modified the data in Telecom's server and virtually forged a piece of information.

But if JFS knows your real IP address, there is no guarantee that they will not come to your door!

So Shi Lei just transferred the SO plan to a fixed broiler server, and after the SO plan was transferred from the JFS confidential information server, Shi Lei retrieved the SO plan from his own broiler server.

In order not to be discovered, Shi Lei limited the download speed. This period of time was undoubtedly very difficult. Fortunately, the guys from the Dark Night Dynasty did a huge favor to Shi Lei. They attracted the power of JFS security experts and allowed JFS security experts to

to track them down.

I can only regret to say that the Dark Night Dynasty, a second-generation hacker organization, has been used as cannon fodder!

Shi Lei waited for the SO plan to be downloaded. He followed the JFS security experts and tracked the guys from the Dark Night Dynasty. But something unexpected happened to Shi Lei!

The International Intelligence Bureau of the Ministry of Foreign Affairs has twelve formal security expert teams, each with ten people. The lowest level of security experts has also reached a world-class level.

In addition to the formal security expert team, the International Intelligence Bureau of the Ministry of Foreign Affairs also has twenty-seven reserve teams. Each team also has ten people, and the lowest level is world-class.

However, such a powerful force failed to capture the Dark Night Dynasty!

This is so unscientific!

Even Shi Lei, when faced with the situation where the International Intelligence Bureau of the Ministry of Foreign Affairs was dispatched, could only retreat and did not dare to confront them head-on.

But the Dark Night Dynasty actually threw out a small supercomputer and used it as a base to confront the International Intelligence Bureau of the Ministry of Foreign Affairs. What made Shi Lei even more unbelievable was that the International Intelligence Bureau of the Ministry of Foreign Affairs was blocked by the Dark Night Dynasty!

Regardless of the risk of being discovered, Shi Lei sent a spy code to the Dark Night Dynasty's small supercomputer.

'Impossible! How could the Dark Night Dynasty be so powerful? In the previous life, even before the separation, the Dark Night Dynasty was still far behind the Hacker Alliance. How could they go head-to-head with the International Intelligence Agency of the Ministry of Foreign Affairs without falling behind?'

Shi Lei was simply puzzled!

‘Could it be that my rebirth caused some kind of butterfly effect? ​​But the effect caused by my little butterfly must have been too great!’ Shi Lei laughed at himself.

After spying on the Dark Night Dynasty's small supercomputer, Shi Lei found out that the computing speed of this small supercomputer could reach 2TFLop/s.

This speed is almost two-thirds of the 500th supercomputer this year, which can be considered a very powerful server.

While Shi Lei was paying attention to the battle between the Dark Night Dynasty and JFS, he also paid attention to the download progress of the SO plan. According to the current speed limit, it will take about ten minutes.

JFS's offensive team was led by Oda Shiharu. Oda Shiharu had discovered something unusual about his opponent. He originally guessed that his opponent was the Dark Night Dynasty who defeated Hokkaido Kelp.

At first, when Oda Shiharu discovered that someone was attacking JFS's web server, he was ready to show his opponent a little bit of strength. But as the battle progressed, Oda Shiharu began to doubt the opponent's identity.

The opponent's combat effectiveness is definitely not like that of the Dark Night Dynasty!

Oda Shiharu is very clear about the strength of the Xia Kingdom's second-generation hacker organization, the Dark Night Dynasty. According to JFS's intelligence data, the Dark Night Dynasty is not as powerful as the Hacker Alliance.

Therefore, Oda Shiharu suspected that his opponent was not the Dark Night Dynasty, but a master wearing the Dark Night Dynasty's vest!

Inside the small supercomputer, there are more than a dozen data streams that jointly protect the security of the small supercomputer. These experts are all gathered in the voice communication channel of the Dark Night Dynasty.

In the voice communication channel of the Dark Night Dynasty, An Ye, as the boss, said with a polite tone: "Mr. D, what should we do now?"

A man named Mr. D, in a very strange accent, said in the voice communication channel: "JFS can't break through our defenses, don't worry!" His voice had obviously been processed by electronic software, so

It seems so weird.

Another voice processed using electronic software to change the voice also sounded in the voice communication channel, "D, can you, alone, with the Dark Night Dynasty, stop JFS's attack?"

"Y, what are you going to do?" the man code-named D asked the man code-named Y. No emotion could be heard in the voice that had been changed by the electronic voice-changing software.

"D, although JFS can't attack, it's not easy for us to get rid of them. Although you and I are not in danger, the Dark Night Dynasty may suffer." The man code-named Y explained, "I will go to Haneda Airport and pretend to be that

The mysterious M, let him take the blame for us!"

The man codenamed D burst out laughing, "Y, please go faster, I can only resist for three minutes at most!"

"No problem!" The man codenamed Y said, temporarily exiting the defense sequence and disconnecting from the small supercomputer.

After the man code-named Y escaped from trouble, he immediately invaded the official website of Haneda Airport in Tokyo, entered the web server from their official website, jumped to the data server using a classic web server, and then hacked into the internal system of Haneda Airport.

In the internal system of Haneda Airport, the man code-named Y was much more scheming than Shi Lei. He controlled the display equipment and broadcasting system inside Haneda Airport.

First, a red warning sign and an explosion sign are displayed on the display device. Then an alarm prompt is played on the broadcast system.

'Warning, a large number of bombs were found inside Haneda Airport. Passengers stranded at Haneda Airport are asked to evacuate Haneda Airport as quickly as possible!'

This warning message is broadcast continuously in multiple languages ​​​​such as Japanese, English, and Chinese.

Haneda Airport officials haven't figured out what's going on, and the entire Haneda Airport fell into extreme chaos in an instant!

Haneda Airport is trying to notify all passengers through the public address system to calm them down. The news just now is not official.

But they were surprised to find that they had no control over the broadcast system!

The facilities at Haneda Airport are very advanced, which brings high-tech convenience, but also brings high-tech disadvantages, making it susceptible to external control.

After the man code-named Y published information that there were a large number of bombs at Haneda Airport, he continued to publish false news that all flights parked at the airport had been planted with bombs.

Although Haneda Airport knows that the news is false, they have to check. Because if by chance, there is really a bomb on a certain flight, and they fail to carry out the inspection, the damage to Haneda Airport's reputation will be fatal!

There was chaos at Haneda Airport, and the airport's senior management immediately contacted JFS and asked for JFS's support.

After finishing the vote, the man codenamed Y followed Shi Lei's example and directly hacked the official website of NHK TV station and posted a message on it.

'You dogs of the Foreign Ministry's International Intelligence Bureau, you still haven't learned your lesson! The defense of Haneda Airport is so fragile, why don't you go to the rescue? If you don't go to the rescue, I will hack into the aviation control tower and direct the landing of the plane indiscriminately!'

——Mr. M

Kurai Nitomo from the Cyber ​​Security Department received the request for help from Haneda Airport and immediately issued an order to Oda Shiharu to go to Haneda Airport to rescue him first.

When Kurai Erbo discovered the news on the official website of NHK TV station, he clenched his right fist, slammed it on the table, and shouted angrily: "Mr. M, good! Very good! Oda is right, you are doing harm.

It’s too big, it seems like you should apply and let Baqi sanction you.”

Shi Lei was observing the small supercomputer of the Dark Night Dynasty. After the man named Y left, the attack by the International Intelligence Bureau of the Ministry of Foreign Affairs immediately became much more effective.

Shi Lei was wondering if the other party had any conspiracy, when he suddenly discovered that the JFS experts who were attacking the Dark Night Dynasty had evacuated on a large scale!

"Uh, what kind of rhythm is this?" Shi Lei quickly searched for relevant news on the Internet.

The security experts of JFS were originally going to round up the members of the Dark Night Dynasty. They could not retreat without any reason. The only possibility for them to retreat was if something big happened and they had to leave!

Shi Lei likes to watch news on the official website of NHK TV station the most. Although they always go astray and talk nonsense, their news updates are the fastest!

Just after entering the official website of NHK TV station, Shi Lei immediately discovered the news that he was being impersonated!

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next