typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk948 Deep Invasion!

. June 4th, after midnight; South Vietnam, National Security Agency, internal network.

Shi Lei adopted the method of "encircling Wei and rescuing Zhao", attacking the internal network of the National Security Bureau of South Vietnam, and attracted back all the network security forces of South Vietnam that were originally attacking the origin of the Dream Entertainment main server supercomputer.

The original main server of Dream Entertainment, a supercomputer origin, withstood an attack of almost 500tflops of computing resources. This level of attack put even the IWN secret network under great pressure.

Fortunately, such a huge amount of attacks are also provided by distributed computing resources. Otherwise, the IWN secret network will definitely not be able to stop it!

Shi Lei single-handedly hacked the official website of the National Security Bureau of South Vietnam, and made a pretense of tentatively attacking the National Security Bureau's internal network.

After the cyber security personnel from South Vietnam returned, Shi Lei still had no intention of giving up. Even though many cyber security experts from South Vietnam returned, Shi Lei was not afraid at all.

The cyber security experts from South Vietnam have indeed returned to the country and devoted their efforts to protecting the National Security Agency's internal network. As a result, the defense capabilities of the National Security Agency's internal network have been greatly improved, and Shi Lei has to face more security defense forces.

, it seems that it would be more difficult for Shi Lei to invade the internal network of the National Security Agency.

In fact, this situation of ebb and flow also exists for Shi Lei. Looking at the problem from Shi Lei's perspective, the network security experts of South Vietnam returned to the internal network of the National Security Agency, and the origin of Dream Entertainment's main server supercomputer

The pressure was relieved, thus freeing up the computing resources of the IWN secret network, and Shi Lei could use the computing resources of the IWN secret network to attack the internal network of the South Vietnam National Security Bureau.

Generally speaking, Dream Entertainment and the network security experts of South Vietnam are basically at the same starting point, but Shi Lei saved the origin of the supercomputer!

Jing Ya Yuan.

Shi Lei put his hands on the keyboard and typed lines of source code quickly. Shi Lei was analyzing the vulnerabilities of the internal network of the South Vietnam National Security Agency. Yizuer currently controls the security of the entire MiRui technology system. The IWN secret network is running at high speed and is temporarily unable to

Provide more help to Shi Lei. Yi Zuer still needs to adjust for a period of time before the resources of the IWN secret network can be integrated.

Yizuer's performance is limited by hardware performance. The original supercomputer only has a computing speed of 10tflops. If AMD's latest 'gift' to Dream Entertainment is completed, the supercomputer with a theoretical computing speed of 320tflops will be assembled.

If Yizuer controls it, then Shi Lei doesn't have to worry about the main server being attacked by South Vietnam!

It's just a pity that the supercomputer with a theoretical calculation speed of 320tflops cannot be put into service for the time being. According to AMD's estimates, this supercomputer will not be assembled until June 20 at the earliest.

The assembly location chosen by Shi Lei is located in Lijian Country, and it is located at AMD's headquarters. The computing speed of 300tflops seems to be a lot at present, but Shi Lei knows the future development. This computing speed will be nothing in the future.

Li Jianguo's territory doesn't matter either.

Furthermore, Shi Lei tried to use this method to express an attitude to the top management of Xia State, that is, if Xia State was unfair to Dream Entertainment and Mirui Technology, Mirui Technology would not hang themselves on the tree of Xia State.

!

"Yizur, how is the occupancy status of the IWN secret network?" Shi Lei asked Yizuer about the IWN secret network while typing in the source code information.

Yi Zuer quickly replied to Shi Lei, "Sir, the IWN secret network has been integrated. The free computing resources have a total of 980tflops, and the system can be called at any time."

Shi Lei showed a cold smile, "Yizur, prepare all the idle computing resources of the IWN secret network and raise the security level of the endless defense system to the highest level. We are going to have fun with the National Security Agency of South Vietnam!"

"Yes, Sir!" Yizuer responded to Shi Lei.

Shi Lei picked up the coffee cup on the computer table with his right hand, took a big sip, and then said to himself: "South Vietnam, I don't believe that you don't have any secrets!"

The National Security Bureau of South Vietnam, as a country's intelligence agency, Shi Lei is sure that there must be some confidential information in their internal network. Shi Lei wants to use the power of the IWN secret network to let Yizuer cooperate with him to break through the national security of South Vietnam.

The bureau's internal network defense to find the required information.

Currently, the network security experts of South Vietnam are fully protecting the National Security Agency of South Vietnam. It is more or less difficult for Shi Lei to break through the defense.

"Yizur, gather the computing resources of the IWN secret network and send deception information to the National Security Agency of South Vietnam." Shi Lei ordered Yizuer. The so-called deception information is the IWN secret network pretending to be a normal random network scanning test. Although

This is also a malicious query, but most defense systems will not pay attention to random network scanning tests.

Following Shi Lei's order, Yizuer began to send random network scanning probes to the internal network of the South Vietnam National Security Bureau. As Shi Lei predicted, the internal network defense system of the South Vietnam National Security Bureau did not make any response to the random network scans.

respond.

"Very good!" Shi Lei saw Yi Zuer's test feedback. He immediately controlled the computing resources of the IWN secret network and conducted a large-scale test scan of the internal network of the South Vietnam National Security Agency.

As Shi Lei's scanning progressed, the internal network of the South Vietnam National Security Agency became slow. Its defense system began to automatically search for the reasons for the system's slowness.

The security experts of the South Vietnam State who retreated from Xia Kingdom cautiously discovered that the random network scan was abnormal. Under normal circumstances, the frequency of random network scans is very low. After all, the entire Internet is so big. Where is the internal network of the South Vietnam National Security Agency?

Might it be scanned frequently?

The network security experts of South Vietnam began to investigate the abnormal random network scanning frequency. They quickly determined that the internal network of the National Security Bureau of South Vietnam was being invaded. Therefore, the network security experts of South Vietnam began to wait and see seriously.

Waiting for Shi Lei to invade.

"Sir, the random network scan has been discovered by the other party." Yizuer reminded Shi Lei.

Shi Lei put his fingers on the keyboard and entered the last line of source code, then pressed the Enter key and handed the source code he just wrote to Yizuer for verification. Yizuer quickly completed the verification and gave Shi Lei feedback.

.

"Sir, the source code verification is completed, do you want to execute the source code?" Yizuer asked Shi Lei's final order.

Shi Lei nodded with a smile, "Execute the source code!"

Regarding worms, Big Pineapple, the leader of Annan Star, the second-generation hacker organization in South Vietnam, is a world-class expert, but Shi Lei is not bad either! Shi Lei also has in-depth research on worms, and may not have reached the top level in the world.

The level is definitely not bad.

Big Pineapple can create a worm to deal with the Xia Kingdom's Internet. Shi Lei can naturally also create a worm. The worm made by Shi Lei is not much inferior to the Diablo created by Big Pineapple.

The only pity is that there is no company like Big Penguin in South Vietnam. If he wants to quickly expand the worm virus, Shi Lei cannot learn from Big Pineapple's plan.

Fortunately, the worm virus created by Shi Lei is not intended to be expanded on a large scale, but only targets the South Vietnam National Security Agency. The worm virus is not only highly contagious, but also highly penetrable.

The worm named 'Poison Stinger' by Shi Lei has very high penetrability. Shi Lei spent a lot of time to create 'Poison Stinger' so that it can be used to penetrate highly defensive internal networks and destroy them.

Internal network information.

"Worm viruses are not my strong point, but they are definitely not my weakness!" Shi Lei looked at the screen of Server 1, where Yi Zuer was injecting source code into the internal network of the South Vietnam National Security Agency.

The stinger eroded the internal network of the South Vietnam National Security Agency, but it was not successful for the time being. The opponent's internal network defense was too high. Shi Lei was creating conditions for the stinger. He tore open the internal network defense of the South Vietnam National Security Agency.

Although it is only a small gap, it is enough for the stinger to enter.

Stinger also lived up to expectations and entered the internal network of the South Vietnamese National Security Agency!

South Vietnam, National Security Agency. Location, confidential.

In a mysterious underground base, South Vietnam's network security experts are dealing with Shi Lei's attack. One of them is a middle-aged man with a bald head and glasses, and his bald forehead is covered with cold sweat.

This middle-aged man with bald head and glasses is named Chen Guang. He is the chief technician of the National Security Agency of South Vietnam and one of the few first-generation hackers in South Vietnam who has just transformed into a security expert.

Chen Guang is forty-seven years old this year. His baldness is caused by premature aging due to overwork!

At this moment, Chen Guang was looking at the computer screen nervously, and a voice shouted from beside him: "Manager Chen, the pressure we are under continues to increase, and we have reached a computational attack of 300tflops."

Chen Guang is the chief technician of the National Security Bureau of South Vietnam, and because he is forty-seven years old and not yet married, he is jokingly called Mr. Chen by his colleagues in the National Security Bureau, which means the eunuch in charge of the palace.

Chen Guang was not angry at this kind of ridicule. Chen Guang was known for his good temper, but he was not popular with women. Perhaps it was because Chen Guang put too much experience into hacker attack and defense knowledge, which made Chen Guang

Ignoring other things. It is precisely for this reason that Chen Guang's technology has reached world-class status!

"Manager Chen, the other party's defense is still improving. We are tracking the source of the other party's attacks, but we can't find any IP addresses for the time being. The other party's connection IP address has also been protected!"

The director of the National Security Bureau of South Vietnam, named Nguyen Kang, is also a first-generation hacker, but his technology is a bit weaker, only to a level that is almost superb. Ruan Kang is not as good as Chen Guang in terms of hacking skills, but Nguyen Kang is better than One thing Chen Guang did better was that Ruan Kang was good at using people.

It's definitely not difficult to do something you don't know. As long as you can find someone who knows it and make good use of this person, you can solve the problem!

"Old Chen, is the current situation beneficial to us?" Ruan Kang asked quietly.

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next