Supercomputer Yan's super privileged user has an independent protection chip, which is indeed very difficult to deal with!
It can even be said that it is impossible to handle!
However, Shi Lei is the world's top hacker and once controlled the supercomputer Yan. He knows the situation of Yan as well as he knows his own hands!
The developer of the independent protection chip is Intel, a well-known leader in the chip industry. Its quality is very reliable. It not only has an excellent hardware encryption system, but also has anti-static interference, current overload protection, etc., ensuring the safety of the chip itself!
However, precisely because of its thorough security, it provides a solution that can be exploited!
In his previous life, Shi Lei was also blocked by this independent protection chip. In a fit of anger, Shi Lei mobilized the software inside the supercomputer to manage power distribution and bombarded the independent protection chip with a huge current. In an instant, the independent protection chip entered the current overload protection and disabled the independent protection chip.
The chip restarts.
There is a gap of about three seconds from the automatic shutdown of the current overload protection to the restart of the independent protection chip. During these three seconds, the super-privileged user is in an unprotected state.
In previous generations, later supercomputers did not use independent protection chips for this reason. If current overload protection is set up, it is easy to be restarted by overload attacks. However, if current overload protection is not set up, it will be directly burned by the current!
The current overload protection method is a good way to fight against independent protection chips. However, there should be only a few people who know this method now. Shi Lei also took advantage of his rebirth to know that this loophole is not a loophole.
Every supercomputer is a behemoth. The mainframe of the supercomputer occupies an area of two hundred square meters. The power consumed by each supercomputer is definitely a terrifying number. Therefore, inside the supercomputer, there is an independent
The power management program distributes the power consumption of each area. Shi Lei carefully entered the power management program of supercomputer Yan and retrieved the power management subroutine of the independent protection chip.
When he found it, Shi Lei immediately became happy!
Although the power management subroutine of the independent protection chip is locked, the entire power management program can be released through first-level authority, thereby unlocking the power management subroutine of the independent protection chip.
Shi Lei used his first-level authority without hesitation to unlock the entire power management program, and then opened the power management subroutine of the independent protection chip.
After finishing the preparations, Shi Lei did not immediately bombard the independent protection chip. This is because the independent protection chip overload protection only lasts for three seconds. Shi Lei must upgrade the account he created to super privileges within three seconds to prevent
The independent protection chip sends an alarm message to the security personnel on duty. Otherwise, the success will be in vain and it is very likely to be discovered!
In his previous life, when Shi Lei bombarded the independent protection chip, it was at the time when hackers from the Xia Kingdom were invading the Wosang Kingdom on a large scale. The supercomputer Yan was the target of special care. Although Shi Lei bombarded the independent protection chip, the independent protection chip would not work after it was restarted.
An alarm message was sent out. However, the security personnel of Super Computer Yan were busy dealing with Xia Guo's hacker intrusion and did not notice the alarm of the independent protection chip. So, Shi Lei repeatedly bombarded the independent protection chip and finally captured Super Computer Yan.
the highest authority, and manually clear the alarm information of the independent protection chip.
In this life, Shi Lei doesn't have so many opportunities, he only has one chance!
Within three seconds, seize the super authority and use the super authority to block the alarm message of the independent protection chip. All this must be completed within three seconds!
Otherwise, everything will fail!
The reason why Shi Lei took so much trouble to obtain super permissions instead of directly grafting the permission system inside the server system like he did with ACCESS Company's server group is because the system programs used by ACCESS Company's server group are not
It's not complicated, and Super Computer Yan's system is not only a professionally developed closed system, but also extremely complicated. Shi Lei doesn't have time to graft the permission system. Even if he has time, Shi Lei can't guarantee success!
Therefore, Shi Lei tried every means to obtain super permissions, and then used super permissions to modify the permission system within the system.
Shi Lei began to write malicious programs inside the supercomputer Yan. First, he intruded to elevate the privileges. He wrote his own first-level privilege user into the malicious intrusion program, so that after the program successfully invaded, it would automatically escalate privileges and become a super privileged user.
.
Then I wrote a message interception program and connected it to the malicious intrusion program. After the intrusion program upgraded its level of authority to super authority, it obtained the authorization of the super authority user, intercepted the alarm information issued by the independent protection chip, and added independent protection to the program.
Record deletion of chip overload protection.
Finally, use the super-privileged user to retrieve the permission system within the system, and then change the permission system to hide your super-privileged user!
After the two small programs were completed, Shi Lei connected them together, and then clicked on the power management subroutine of the independent protection chip.
"From now on, whether you eat a lot of meat or drink the cold northwest wind, it all depends on you!"
In the room, Shi Lei put his hands together, pretended to be a false believer, and prayed to gods and Buddhas all over the sky.
The power management subroutine of the independent protection chip has been adjusted to five times the normal level. Once Shi Lei presses the confirmation button, the independent protection chip will fall into current overload protection and restart.
Shi Lei connected two malicious programs to ACCESS's server group and used this server group to fight against supercomputer Yan. Capturing supercomputer Yan requires a server with excellent performance as a backing. It is precisely because of this step
!Once the backing server does not have enough computing power to invade the super privilege group and elevate user privileges within three seconds, everything will be over!
"It must succeed!" Shi Lei muttered quietly, and with a nervous heart, he pressed Enter to confirm!
In the first second, a large amount of data flashed across the computer screen and kept refreshing the screen.
In the second second, a large amount of data was still flooding the screen. Cold sweat broke out on Shi Lei's forehead. He prayed in his heart that ACCESS's server must be powerful!
In the third second, all data flows stopped, and two English words appeared at the bottom of the screen!
Privilege.Escalation!
Privileges elevated!
Seeing these two words, even Shi Lei couldn't help but cheer!
Privilege escalation means that first-level privileges are upgraded to super privileges!
Capturing the supercomputer Yan was 99% successful!
As long as Shi Lei didn't suddenly become brain-dead, or take the wrong medicine, the supercomputer Yan would soon return to Shi Lei's arms!
After obtaining super privileges, the message interception program successfully prevented the independent protection chip from issuing a current overload alarm and deleted this record.
Shi Lei first used a super-privileged user to clean up the traces of his operations in the system logs. Whether it was increasing ACCESS's permissions, creating his own new account, or unlocking the power management program, all these operation records were deleted.
After deleting all traces, Shi Lei did not relax his vigilance. Instead, he began to use a super-privileged user to enter the system source code core, and then switched to system engineering mode to retrieve the system's permission system.
Having super authority in hand is indeed a very refreshing thing. The computing speed of super computer Yan finally allowed Shi Lei to regain a little bit of the feeling of the world's top hacker.
The system permission system is extracted by super-privileged users in engineering mode.
Shi Lei was very familiar with it. Just like modifying the server permission system of ACCESS, he modified the permission system of Super Computer Yan, completely hiding his own super user, so that Super Computer Yan's original super user could not discover it.
Then, a system backdoor was opened so that Shi Lei could freely enter and exit the supercomputer Yan. Even after the computing tasks of ACCESS Company were completed, Shi Lei could freely enter and exit at any time.
After typing the code with a smile on his face, he established a new permission system for Super Computer Yan and created multiple system backdoors. Shi Lei finally breathed a sigh of relief. After executing this step, Super Computer Yan was 99.9%
, belongs to Shi Lei!
The last 0.1% left is the log in the system log in engineering mode.
This log belongs to a special protection mechanism of a supercomputer and is also protected by independent hardware. It cannot be modified even by a super-privileged user!
However, that is only for ordinary people. Users with super privileges cannot delete logs in engineering mode. But Shi Lei now controls the supercomputer and is truly the world's top hacker!
Controlling Super Computer Yan, Shi Lei directly used Super Computer Yan to use the current overload protection routine again, trapping the hardware that protected the engineering mode log into self-protection from current overload, and then quickly deleted the record of his modification of the system permission system.
At the same time, the hardware record protecting the engineering mode log has been deleted.
When the last record was deleted by Shi Lei, he typed in the code and asked Super Computer Yan to list the permissioned user groups. His own super permission user was no longer displayed, and he could use Super Computer Yan's
Super administrative rights. This means that super computer Yan was successfully captured by Shi Lei!
In 2006, the ninth-ranked supercomputer in the world, the pride of Wosang Country, and the pride of Tokyo Institute of Technology, was successfully acquired by Shi Lei!
Thanks to Wosang Country and Tokyo Institute of Technology for helping Shi Lei take care of the supercomputer Yan, so that Shi Lei can use the ninth-ranked supercomputer in the world without paying a penny!
After capturing Super Computer Yan, Shi Lei cleared Super Computer Yan and the internal application records of ACCESS Company one by one. Then he returned to ACCESS Company and also cleared the internal records of their servers. However, Shi Lei did not put them away.
Through the server group of ACCESS.
After all, this is a server group that is comparable to a small supercomputer, so how could it be given up?
How can you eat something in your mouth and then spit it out?
After cutting off the network link with Wosang Country, Shi Lei returned to Server 1. He clicked on the music player with a smile on his face. Sweet music came out of the speakers again.
"For whom do the flowers bloom? Spring comes and goes every year. The flowers say they are waiting for one person."
"There is no choice but the flowers fall away, and the familiar swallows return..."
————————————————————————————————————
Friendly recommendation: Became An Yehou and Zhao Jin!
[bookid=2703696,bookname="Hunyuan Empire"]
PS: The recommendation ticket task is still a bit short ~ but everyone can definitely achieve it! Please recommend, collect, and click!
Are there any rewards or reviews?
The second phase of the small event, I don’t know why, the post was locked and failed to pass the review, please wait for the review!
——
[Thank you for the reward] The big shop owner of the Chamber of Commerce, rewarded 200. Fat fish is very fat. Friendly reward