typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

Chapter 0053 The Fifth Master Badge (Part 1)

 For Zhou Yan, it is a good thing that his roommates have become more familiar with each other: finally he no longer has to pretend "I am not familiar with you" in front of acquaintances!

After the roadblocks between a group of people were removed, although the six of them still played by themselves most of the time, they were finally able to exchange opinions boldly and deeply.

Most of the time, Zhou Yan is not here.

Even though Zhou Yan's brain has been enlightened by the fake "Foundation Building Pill", most economics books need to be digested while chewing.

While digesting knowledge, Zhou Yan also needs to review and preview his homework. In his spare time, Zhou Yan also has to send "blackmail" emails to make money.

"Dear colleagues at Microsoft,

I accidentally discovered some small loopholes when using your company's products. In your opinion, they may be insignificant, but after all, the existence of such flaws has a great impact on your company's image.

The details of one of the vulnerabilities are as follows...

In addition, I have been living in poverty recently, and I hope someone can help me with my account number in a Swiss bank..."

Signed as "a big fan of windowing systems".

A loyal fan of God!

After seeing this email that was almost blackmail, many senior officials of Microsoft were furious: How could they have a Swiss bank account if they live in poverty?

But these senior officials have no other choice: the vulnerability is real, and it can be used to escalate privileges.

In the end, Zhou Yan successfully received $100,000 in "living expenses."

After receiving the payment notification, Zhou Yan copied the subject of the email he sent, modified the description of the vulnerability, and sent it again...

Is it over yet?

Is this using Microsoft as a cash machine?

If the tiger doesn't show off its power, you think I'm hallo kitty!

As soon as the boss gave the order, the network security officers raised by Microsoft rushed out and chased after him while talking about the direction of the email.

Network security officers quickly locked onto a suspicious server, but after intrusion, they found that it was just a springboard.

Keep following.

Microsoft's network security personnel followed the clues layer by layer.

After chasing more than a dozen servers, the network security officer suddenly showed a look of frustration on his face: "Give up tracking!"

"Why?"

The network security officers who had been chasing for a long time but couldn't find it were a little angry.

The chief officer smiled helplessly: "Look at the network address of this server!"

At this time, someone finally discovered that this server was the one they initially tracked.

A group of network security officers looked ashen: after such a long period of tracking, even if the other party left any clues, they would have been cleaned up by the server long ago...

Then, Zhou Yan received his second "vulnerability mining fee", and a certain progress bar in his head was also moving towards 100% at a slow speed.

What Zhou Yan didn't know was that after two successful "blackmails", he also had a nickname given by Microsoft's network security staff, called Mobius Magic Ring.

Of course, those who play technology are a bit arrogant. Although Zhou Yan was "lucky" to escape twice, it does not mean that Microsoft's network security officers will be willing to be fooled.

At the same time that Zhou Yan's third "blackmail" email arrived in the mailbox of Microsoft executives, Microsoft's network security officers, who were waiting in full swing, began a new round of pursuit.

In order to ensure that no clues were missed, network security officers carefully searched Zhou Yan's last springboard.

For investigation work, being meticulous is a good thing, but when the network security officer followed the traces to the second springboard, the clues suddenly stopped.

At this time, this group of people realized a problem: too much time was left when tracking the first springboard, so that the traces on the second springboard were cleared...

Zhou Yan accepted the "filial piety" money from Microsoft with a smile, copied and pasted the email, modified it, and sent it out again.

This time, Zhou Yan did not use the server as a springboard, but disguised the email as a p2p point-to-point data packet, sent it to a specific server, and then forwarded it to Microsoft.

Microsoft's network security officers are still on the alert. Before starting the tracking, they have been divided into groups, one group is tracking clues, and the other is searching the server.

It's just a pity that Zhou Yan changed his routine this time.

Network security officers quickly traced the first computer used for p2p peer-to-peer transmission.

This is an ordinary home computer, but what makes a group of network security officers troublesome is that there are too many p2p point-to-point data packets used on this computer.

But for the purpose of tracking, a group of network security officers did not care so much, and split up to track the source...

Then, a group of people tracked down a server that stored dozens of t*****.

Then, a group of network security officers were all dumbfounded.

"How could this be?"

On the other side of the earth, Zhou Yan, who received the "filial piety" money again, was not as happy as the previous times: his network security skills had been sharpened to lv6 by Microsoft's network security officers.
p>

"Congratulations to the host for being upgraded to a network security master. The network security master badge task is now released.

Badge Task 1: Place a flag and leave a name on the official website of a white house that was once burned to black. The time and specific method are not limited.

Badge mission two: eliminate a virus that does evil in the name of a national treasure.

Badge task three, crack the software within two months, matlab, ansys, abaqus, sol, choose one or two...

Mission reward one, a mysterious gift package.

Mission reward two, fourteen thousand points."

After seeing the mission briefing, Zhou Yan was stunned for a while. After coming back to his senses, he was happy: This system is a bit tricky.

The white house that was burned black refers to the fact that the White House was burned black by the Maple Leaf Country militia; and the virus that used the orders of the national treasure to do evil is naturally the panda burning incense that raged around 2007.

However, after watching the first two tasks, Zhou Yan couldn't laugh anymore.

The four software listed in the system are all top-notch research and analysis software developed by foreign countries. A few years ago before Zhou Yan came back, news, newspapers, and websites had revealed that some military schools in China purchased

The matlab software is disabled remotely.

As soon as the third mission came out, Zhou Yan immediately lost interest in the mysterious electronic gift package at the end.

"Let's finish the task first!"

Breaking into the White House website is not a problem for Zhou Yan, who has Han Shangyan's network attack and defense skills. Especially many of Han Shangyan's technologies are enough to become black technologies at the moment.

Zhou Yan spent a few minutes to break into the White House website and put some wonderful little things in it...

In Washington, D.C., at eight o'clock in the morning local time, the staff of the "Once Blackened White House" clicked on the homepage of the White House as usual.

But as soon as I opened the web page, the staff was scared to drop the coffee in their hands...

"Pa..."

The crisp sound woke up many drowsy staff members. After a brief period of confusion, someone finally realized: The White House webpage has been hacked!

That morning, many newspapers on Wall Street, not far from Washington, D.C., had their front-page headlines changed.

"Fort De Crete, the destruction of the world starts from here!"

"The mysterious hacker Jupiter reveals the inside story of the Bald Eagle Army Biochemical Laboratory..."


This chapter has been completed!
Previous Bookshelf directory Bookmark Next