typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 124 Two Lucky Hackers

Chapter 124 Two Lucky Hackers (1st update)

Author: Qingshan Chuzui

Chapter 124 Two Lucky Hackers (1st update)

In Lu Zhixing's virtual space, two black shadows appeared.

Just like the hackers Lu Zhixing had seen before, the appearance of these two people seemed to be constantly changing, as if they were mosaic, or as if their bodies were covered with countless small mirrors, which scatteredly reflected the surrounding scenes.

.

The first time they appeared in the virtual space, they began to operate skillfully.

The taller hacker on the left squatted down, opened the suitcase he was carrying, and tried to fumble around inside.

This suitcase looks similar to them, like a pile of data between reality and virtuality. It can be seen as a toolbox for hackers to invade the virtual space, and it is not limited to certain specific tools.

What can be taken out depends on the underlying rules of this virtual space.

After groping around inside, the tall hacker frowned slightly: "Pavel, this virtual space seems to have the strictest underlying rules.

"In terms of force, the most we can do is use this kind of primary weapon."

As he spoke, he took out a pistol from his suitcase.

The man he called Pavel had a medium build. From the outline, you could vaguely see a high nose bridge and deep eye sockets. He had certain Western characteristics. His chin was unnaturally swollen outwards, and it seemed that he had a left

Bearded.

Pavel also took out a pistol from the suitcase and checked the magazine with one hand with some disgust.

"I haven't used this kind of antique for a long time. It's really hard to imagine why, after so many years of development of deep virtual reality technology, some people would still set such strict restrictions in the virtual space," Pavel complained.

The tall hacker from before also looked at the surrounding space: "This is normal. After all, it is the leftover leftovers of VRNO. If it is really easy to steal the virtual space, it will not be left to us ATE."

On the dark web, some virtual space information is being sold all the time.

There is varying amounts of information, some even detail who the owner is, and some only have one location coordinate.

This is somewhat similar to selling personal information online in the traditional Internet era: after you have used up the information, in order to extract the remaining value as much as possible, you will often choose to resell the information.

The same goes for hackers who invade virtual space.

Organizations large and small, if they fail to successfully steal a virtual space due to various reasons, will often leave a location coordinate to facilitate their second invasion, or simply sell the location to make money.

Some weak hacker organizations will purchase the coordinate information of these virtual spaces on the dark web and eat the leftovers of large organizations.

Generally speaking, this kind of virtual space often has some problems, such as it is more troublesome to steal, or it is of little value.

It is also commonly known as dirty work.

The hacker group that Pavel and Bob belong to is called ATE, which is the type that eats leftovers.

VRNO, which sells information, is a well-known hacker organization and even has official background abroad.

VRNO often releases similar virtual space coordinates, and there are dozens or hundreds of copies at a time. With VRNO’s strength, generally speaking, it’s not that it can’t take these virtual spaces, but that some virtual spaces are of low value, don’t make much money, and are too lazy to do it themselves.

So sell it to small hacker groups.

Of course, there are rare cases where the virtual space is too difficult to conquer and VRNO is helpless.

But Pavel and Bob felt that the probability of the latter happening was comparable to winning five million in a lottery ticket, and it was unlikely that it would fall on them.

Pavel checked the equipment on his body. Soon, his body flowed like ripples, and light and flexible tights, hooks and special climbing equipment appeared. Of course, there were still only mosaic shadows.

"Bob, check the other underlying rules again."

The tall hacker Bob looked around the virtual space.

Many green data flow characters vaguely appeared in the position of his eye sockets, and soon, he "saw" a large amount of information.

“Improved physical fitness in moving and jumping.

"Significantly reduced damage caused when falling from heights.

“The vitality has been greatly enhanced, and you will not be kicked out of the virtual space even if you are seriously injured.

"The entire virtual space seems to be a huge maze, and there are also powerful hostile monsters active.

"...Sure enough, it's a bit weird. Wouldn't the owner of this virtual space find it troublesome?"

As hackers, this is obviously not the first time they have done this kind of intrusion into virtual space, but they rarely encounter this kind of situation.

Generally speaking, virtual space owners do not set too many restrictions on their own virtual space.

Because these underlying restrictions will also limit himself.

Who doesn’t want to fly in the virtual space and be omnipotent? It’s tiring enough to have to abide by the rules of reality all the time in reality, but in the end, after finally obtaining the virtual space, you still have to abide by the rules of reality?

Isn't this pure masochism?

Even those who regard virtual space as an online office will remove various restrictions and allow employees to play as they please in the virtual space.

And if you want to put hostile monsters in the virtual space, you will usually give yourself powerful weapons in the underlying rules.

On the other hand, in this virtual space, apart from greatly reducing fall damage and slightly improving athletic ability, there is no change in the restrictions on force value.

Of course, the more restricted a virtual space is, the harder it will be for hackers to tamper with and crack it.

But doesn’t the owner of this virtual space find it troublesome?

After all, hackers only come occasionally, but the owner of this virtual space uses it every day.

For the sake of security, the owner of the virtual space can indeed formulate a very strict underlying rule and then hide the key in a deep place.

In this way, it is indeed very troublesome for hackers to find the key, but it will also be very troublesome for the owner to enter next time and want to use the secret key to modify the underlying rules.

Even if this rule is too strict, even the owner may not be able to get the key, and then he will have to find the official to reset the virtual space, which is very troublesome.

This would be a bit of a waste of food due to choking.

Therefore, most of the spaces invaded by these two hackers either have loose underlying rules, or have strict underlying rules but have backdoors in the key locations, both of which can be easily obtained.

And this virtual space... is vaguely evil.

But Pavel and Bob didn't think too much. After all, this is just a private virtual space, and there shouldn't be any complicated internal mechanisms.

"Let's get to work.

"The technology of these Easterners is still too backward, and they have not been able to completely clear the coordinate positioning left by VRNO in this virtual space. Although it took us some trouble to find this place, it is not a big problem.

"Be quick with your hands and feet and win the battle quickly."

Bob reminded: "The owner of this virtual space seems to have filled the entire space."

Pavel smiled and shook his head, very confident: "For hackers, pure copying and filling is the most meaningless thing."

They obviously didn't realize the seriousness of the problem. They just followed the conventional method to find the location of the key, and then started to crack it.

In Pavel's field of vision, various data streams flashed past, and he began to quickly analyze the theoretically feasible paths around him.

Then, a huge maze composed of countless lines appeared in his field of vision, and even his own actions had some lag effects.

"The amount of calculation is so large?"

Pavel was also surprised.

If it is just a simple pile of materials, then the analyzed routes should only be a few simple ones, which can be completed at the speed of light.

But this maze is obviously quite complicated, because there are so many possible paths, and the different plates change randomly.

In order not to attract the attention of the official security mechanism for this invasion, they used limited computing power, so they analyzed several theoretically optimal routes, and they were still changing in real time.

Pavel felt a little bit in trouble.

However, he doesn't really need to climb the entire route like an ordinary person. After all, this area is 27 cubic kilometers. If he really wants to climb, he will have to climb to the end of the world.

A hacker can exploit loopholes and jump between sections directly through certain rules. As long as he completes one of the sections, the cracking speed of similar sections should also increase significantly.

Under normal circumstances, the speed of cracking will continue to accelerate, and it should not take too long to solve these puzzles.

Therefore, the small problems we have seen so far are not enough to persuade them to stop.

Pavel and Bob jumped lightly and climbed up the wall next to them. At the same time, they automatically drilled holes and adjusted their physical fitness to the highest level allowed by the underlying rules of this virtual space.

Then, they quickly moved along the "seen" path in the direction of the key.

(End of chapter)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next