typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk434 The power of hackers!

ps: Are there any ‘likes’? The positive rating is so low it’s hurtful. I sincerely ask for your support!

The country of Wosang is a country that is both powerful and weak. Visit and download the txt novel

The technological level of Wosang Kingdom is very advanced, especially in electronic IT products, which account for almost half of Xia Kingdom's market, making Xia Kingdom's local electronic IT companies unable to hold their heads up.

Not only electronic IT products, but also various industrial equipment, automobiles, and even home appliances, also made Xia Guo's local products vulnerable to them.

It is such a powerful Wosang country, but when facing the Lijian country, it bows and kneels like a slave. Many areas in Wosang are occupied by the Lijian country, and military bases have been established, which is equivalent to concessions.

Same.

For example, take the Futenma Marine Base in Okinawa Prefecture. At the Futenma base, the Rika nation has deployed nearly a hundred armed helicopters and even the most secret weapons.

Futenma Base is located in the center of Ginowan City, occupying 25% of the entire urban area. It has been severely protested by local residents, but the government of Wasang Country has been able to...

Originally, at the end of 2006, the government of the Wosang Kingdom and the government of the Liken State had reached an agreement to completely withdraw the Futenma base from Ginowan City in 2014, but until Shi Lei was reborn, no action was seen from the Liken State.

Perhaps the governments of the two countries have long known that the so-called final agreement is just a cover for relaxation.

Because Futenjian Base, Wosang Kingdom and Lijian Kingdom are full of overt or covert struggles, that's why Shi Lei went to Futenjian Base to attack!

At this sensitive time, when the troop withdrawal agreement was signed at the end of last year, Futenma Base was the most capable of stirring up trouble!

In Jing Yayuan, Shi Lei wore a wired headset and maintained communication with Yizuer. Looking at the data on the monitor, he put his hands on the keyboard and made final preparations.

"Yizur, copy the ZD defense system to the supercomputer Lei. Once Lei can no longer withstand it, activate the ZD defense system immediately. Use Lei's sa super administrator privileges to obtain all of Lei's computing resources and provide full support for the ZD defense system.

"Shi Lei first considered the worst plan. If the supercomputer Lei Tie was discovered in the military network, it would be impossible to save it. So it would be better to hold on for the last moment and let Yizuer clean up the connection records to protect his true identity.

ip address.

This is also the reason why Shi Lei wants to gain access to another supercomputer. He can't lose Yan, right?

"Sir, the exhaust defense system has been installed. You can activate the exhaust defense system for Lei at any time." Yizuer responded.

"Then, let's get started!" Shi Lei took a deep breath and tapped quickly with his fingers on the keyboard, typing line by line of code.

The time in Wosang Kingdom is only one hour later than that of Xia Kingdom. It is currently around nine o'clock in Xia Kingdom. It is more than ten o'clock in Wosang Kingdom. The time difference between the two sides is not big. It is still in the middle of the night. Futenma Base

The main control computer should have security personnel on duty, so Shi Lei had to be very careful.

Shi Lei was the main attacker, while Yizuer was detecting and defending. As time passed, the firewall of Futenma's main control computer blocked Shi Lei's entry.

Since he was in a military network, Shi Lei couldn't force an attack to avoid triggering firewall alerts, so he could only keep looking for loopholes in the system.

At nearly eleven o'clock in the evening, Xia Kingdom time, Shi Lei finally discovered a system vulnerability in the Futenma main control computer and successfully entered the Futenma main control computer.

Inside the Futianjian main control computer, Shi Lei kept testing the permission groups, hoping to obtain the corresponding information from the permission groups.

After some hard work, Shi Lei obtained some basic information.

Futenma Base, as an overseas base, has great autonomy. After all, if an emergency occurs and the war situation changes rapidly, you can't just ask the Ministry of Defense of the Republic of Korea for instructions on everything, right?

Although the information from Futenma Base is also in the military network and can be transmitted to the Ministry of National Defense at any time, it is impossible for the Ministry of National Defense to respond to information anytime and anywhere.

Therefore, the highest authority of the Futenma base's main control computer has considerable autonomy. Especially in terms of automated weapons, the highest authority of the Futenma main control computer can be directly finalized without being confirmed by an order from the Ministry of National Defense.

Shi Lei found out this information and became excited. His choice was indeed right. As long as he obtained the highest authority of the main control computer of Futenma Base, then

How powerful are hackers?

For ordinary people, most hackers are very powerful, especially for broadband access users. Because IP addresses are dynamically assigned, hackers with slightly inferior skills cannot do anything to ordinary users. However, hackers with advanced skills can't do anything to ordinary users.

Unless you are too idle, you will not attack ordinary users.

But for business users, having a fixed official website and a fixed server address is extremely vulnerable to attacks by hackers. Hackers are simply a disaster for business users.

As for the general public, before December 20, 2006, hackers were just a term for them, representing network instability elements with powerful computer technology.

But on December 20, 2006, the earthquake hacker eq explained to everyone in the world how powerful hackers are!

Through hacking technology, earthquake hacker eq, the loss of Wosang country is unprecedentedly powerful!

Because of the earthquake hacker eq, ordinary people around the world know what kind of destructive power a top hacker, especially a crazy top hacker, can cause in this society called technology!

Now, Shi Lei is ready to let the general public around the world know what else hackers can do and how powerful hackers are!

Shi Lei's hands were tapping rapidly on the keyboard, starting from the main computer operating system of Futenma Base, and slowly eroding the authority of the operating system.

Although the operating system of Futenma Base is very powerful, Shi Lei is not only the world's top hacker, but also has the computer technology for the next six years.

Even though Shi Lei became a monk halfway and learned most of his skills from the pseudo-artificial intelligence Abertil of the Angel Council, Shi Lei is still quite powerful!

"Sir, abnormal data scanning has been detected and is tracking us!" When Shi Lei was cracking the Futianjian operating system, Yizuer suddenly sent out a warning message.

Shi Lei's heart tightened. He quickly began to enter the code to disguise his data flow.

A moment later, a data scan passed through Futianjian's internal network, and no disguised Shi Lei was found. Shi Lei breathed a sigh of relief, as long as he was not discovered, that would be fine.

"Yizur, continue to monitor the entire internal network. If there is any situation, report it in time!" Shi Lei ordered and continued to crack the Futenma base's operating system.

'Nah, I've obviously got the description information of the permissions. Why can't I enter the permission group?' Shi Lei thought to himself, and suddenly he had a flash of inspiration.

After typing in a string of codes, and when Shi Lei pressed the enter key, the Futenma Base main control computer immediately expanded the access permissions for the permission group.

'As expected! It's actually a dual-system operating system, with both Linux and Windows. It's really too dangerous!' Shi Lei secretly despised it.

The scope of application of dual systems is very narrow. The main reason is that it is very troublesome to combine dual systems. And the degree of confidentiality is not better than that of closed systems. Therefore, dual systems are gradually being eliminated by closed systems.

After entering the authority group of Futenma Base's main control computer, Shi Lei first began to secretly search for all user information in the authority group. Shi Lei would not tamper with any information in the authority group without knowing the situation.

After all, we don’t know the protection status of the permission group. What if the information is tampered with and triggers a police report?

When searching for the permission group, Shi Lei had blocked no less than ten alarms. From this, it can be seen how strict the security settings of the main control computer of Futenma Base are. It is just a user who searches for the permission group.

More than ten alarms were triggered.

Once we actually attack the authority group, how many reports will be triggered?

After a few minutes, Shi Lei finally retrieved all the users in the permission group. In order to prevent the existence of hidden users, Shi Lei checked three times to confirm that there were no other hidden permission users before starting to analyze each permission user.

On the main control computer of Futenma Base, Shi Lei simply analyzed each authorized user and checked the corresponding permissions. Since this was a military network, Shi Lei did not use his own password dictionary to analyze the password of each authorized user.

The password dictionary analysis method is to test possible passwords multiple times. If the password test is incorrect multiple times, it is very likely to cause an alarm from the main control computer.

After analyzing the corresponding permissions of each authorized user, Shi Lei finally chose the highest-authorized user. Only the highest-authorized user can call all automated weapons in Futenma Base.

In order to obtain the highest authority user, Shi Lei began to think about what should be done to obtain the highest authority. Based on the analysis of the corresponding code of the authority group, Shi Lei got a piece of information.

The highest authority user of Futenma's main control computer has great authority and can directly use all Futenma's automated weapons without going through the Ministry of National Defense of Japan.

Therefore, the password for the highest-authority account of the main control computer at Futenma Base changes every day. For example, if today's password is abc, then tomorrow's password will definitely not be abc, but may be abd, or CBD.

The password will change again the day after tomorrow!

The passwords are different every day!

Since a password is adopted every day, the security of the password is ensured to a great extent and prevented from being stolen by hackers.

In fact, the plan of changing a password every day is indeed very effective in preventing hackers. After Shi Lei learned this information, he was also quite distressed.

Even if he wants to obtain the password, it will take a lot of effort. Moreover, there is a certain chance of being discovered. The internal network of Futenma Base is included in the Lijian military network. Shi Lei cannot be in the military network

To operate recklessly, one must maintain one's concealment.

'Damn Futenma Base, they actually change their passwords every day. I hate this password method!'

After complaining, Shi Lei began to carefully check the file system of Futenma Base's main control computer, trying to search for any clues from the file system.

However, Shi Lei discovered something that made him dumbfounded

To be continued. Mobile phone users please read here.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next