I’m Really a Superstar

Chapter 433 [Those who violate my China, although far away must...

(www.du full text without pop-up window)

start

buddy here

Zhang Ye finally adjusted the device and changed a few parameters. Immediately, his hands flew over the keyboard and went straight to the official website of the Korean government. Why choose here? Because those South Korean hackers had hacked into their republic's national website before, Zhang Ye would of course have to fight back in his own way. Moreover, the Korean government website was an extremely important place. Zhang Ye was going to play a big game.

Find a way first.

He sent a disguised email, but it fell into disrepair and was blocked.

Zhang Ye thought about it for a while, and then sent out another tentative data packet. This data was systematically deceptive. He tried to trick the machine into sending an inducement signal to obtain a pass, but it still failed. The Korean government website can be described as an agency Heavy, high safety protection.

once.

twice.

three times.

All in vain.

Zhang Ye was not surprised. He knew it wouldn't be so easy. He thought of a few ways to invade from the outside, but he still didn't implement it because he felt it was too inefficient. , and open the translation software at any time to simply translate the above words, it will not be too detailed, and there are many mistakes in the translation, but it is enough to translate it roughly. Um? Private Mailbox? This is an email address hung on the secondary page, and I don't know if it is for a report letter or a letter of advice.

have

just you

The current Zhang Ye is no longer the Zhang Ye of the past. He calculated the time a little, and immediately sent the title of the report letter with an English name. In order to attract attention, he sent a report on the president. take a look? But there is a program in it.

Wait.

A few minutes passed.

Suddenly, the email over there was opened by someone

Zhang Ye seized the opportunity immediately, and through that short period of deception, he tapped a dozen commands, first passed through the port, then bypassed the server, and finally came back. The "broiler", firstly, is to add an insurance to his own safety, and secondly, Zhang Ye needs this "broiler" to help him disguise, but just after the success, the previous backdoor applet was discovered by the firewall

Zhang Ye was well prepared. He typed in a few commands in a hurry. He didn't hide or retreat. Instead, he used the "broiler" he controlled to operate quickly. When the firewall was about to call the police, he would That small backdoor program was actively deleted.

no alarm

Firewall lost its target

Zhang Ye managed to get in successfully this time. Then, he started internal search, local area network search, and finally found the administrator's account.

data induction

Soon, the administrator password was tricked over

For the information induction inside the LAN, the function of the firewall is compromised, so Zhang Ye succeeded at once. Sometimes machines are machines, not people. They only accept instructions and do not have their own thoughts. Zhang Ye just posted In this world, the decoy data called 106 is actually taking advantage of the loophole to make the computer mistakenly think that it has administrator rights, but forgot the password, so that the password and account number are easily obtained by means of a loophole in the computer, and it is unknown. do not feel.

very good

ready to operate

Zhang Ye mastered the administrator information and immediately logged in. The first thing was to change the password. This also required a very deep technical level, because some websites with relatively high protection measures, the change of the management password and the abnormal response, They would call the police, and they could easily be listed as a "target to hunt" by the firewall. Zhang Ye couldn't be discovered yet, otherwise, all his efforts would be forfeited. A few more security experts and programmers would come over to make trouble with him and hunt him down. Zhang Ye thought about it. Everything was tied up, so he typed in more than two dozen commands, which took him two minutes to type.

Firewall doesn't notice

The password has not been changed

But in fact, the password is different. The first-level password is still recognized by the firewall at the beginning, so the data has not changed abnormally, and the internal alarm has not sounded. However, Zhang Ye opened an additional password in the background. It is a second-level program. That is to say, if others want to obtain the highest level of authorization management, they must have a second-level password before they can come in. For example, if there is an alarm lock on a bicycle, you want to open and change the lock, the alarm will sound, and the police will come, but if you don't ride the bike away, you just lock it again, and the police will not. It will sound, and the owner of the car wants to ride away, but he can't ride it, and he can only stare at it - that's probably what it means.

Ready

He's getting down to business

On the other side.

The fighting has intensified, and China and South Korea have become jealous

"If you push harder, they won't be able to hold on anymore"

59: "I can see that we have to take a break from shifts, and it will consume them to death. Everyone goes together. They are few and they are dying."

"kill"

"Hahaha"

"I took another site"

The net supervisor really couldn't take it anymore.

Fang Xiaoshui's eyes are sore, "Give me another cup of coffee"

Meng Yi's eyes were also red, like an eagle's eyes, "I want a cup of paralysis to fight with them, I don't believe that I can't beat them"

And Fan Yingyun still maintains a good mental state. After all, Lao Fan didn't work all morning and took a nap in the afternoon.

Twenty people have already arrived at one place.

The other two places are also working overtime. From time to time, you can hear someone shouting and scolding in the office area next to you. Everyone is fighting.

Dong Zhiqiang also went into battle in person, his level of network technology is almost a little bit, but he can still be considered a strength. "Everyone has resisted for me. The leaders have already gone to other places to ask for help from the country - there are many people in the military department. Technicians will be able to join the war soon.”

Fan Yingyun said coldly, "When they come, the day lily will be frozen."

Dong Zhiqiang said: "The people on the military side have to apply for approval, and it takes some time to go through the procedures."

Zhang Er exclaimed, "It's not good that South Korea has another master, Sister Fan. I can't stand him."

Fang Xiaoshui panted and said, "I can't do it anymore, I entered several wrong instructions, this website can't be recovered, and the number of hackers on the other side is estimated to be two or three hundred.

"Sister Fan"

"Sister Fan, I need help here"

Fan Yingyun shouted: "Don't call me, I'm still too fucking busy here, it's all my own."

More and more websites have been compromised in their republic, and the situation has become more and more unfavorable. Many websites that have been hacked can no longer be recaptured in a few minutes as before.

five

ten lj

twenty

The website is down on a large scale, it's a disaster

Fang Xiaoshui said anxiously: "Why hasn't anyone come to help? Those people are watching the fun? I don't believe that there are no other masters in our republic."

A female Internet policeman shouted: "The stick is too much to deceive people"

The old programmers of several antivirus companies in the Republic are also dead.

Suddenly, a young Internet policeman in the first place was stunned, "I'm relying on our people to take action. Look, look at the Korean government website."

Fang Xiaoshui ran over, "What's the situation?"

Meng Yi also suddenly discovered that the attack of the hackers in the stick was getting smaller and smaller. It seemed that many people had stopped attacking, and they didn't know what it was.

"Korean government website?"

"How do you know it's ours?"

"It's written in Chinese."

Many people on the Internet monitor hurriedly look over

The Korean side also discovered this amazing fact

"Who is this bastard?"

59: "What does this mean, come and translate"

A Korean hacker said: "It's Chinese, it's..."

Some of the world's top hackers have also withdrawn their attention from the China-Korea hacker theater of the Republic, and all moved to South Korea, the Korean government website.

(US): "Someone shot"

(English): "I'll go in and have a look."

Fujiwara (Japanese): "The red letter looks scary. It's in Chinese, but I don't understand it very well. Who can translate it for you? What does it mean?"

Ruyev (Russian): "This time, it was a lot of fun. The hackers on the Republic side finally stood up. There is suspense about the outcome. All defenses will never win. Regardless of the master of the attack, this person can invade the Korean government website without any movement, indicating that the level is okay, it should not be a role of a small fish, it is worth watching, are you back?"

(English): "I'm back."

Ruyev (Russian): "How is this person's strength?"

(English): "I got the management password, but I don't know why, I can't get in, I don't even see his people, how can I know his strength"

(US): "Second-layer password?"

(English): "Maybe, I'm not good at this field and can't crack it."

Ruyev (Russian): "It doesn't seem like an ordinary person, but why haven't I heard of this person? In addition to those known hackers, the Republic has so many powerful characters? Like that pan and this one, The second-layer password is not a simple technology. If we change a few of us, the success rate may not exceed 30%. The difficulty lies in how to deceive the h-layer ring of the firewall and add a new layer of password. Otherwise, once the firewall is touched , Layer 2 passwords cannot be superimposed. Compared with this, it is faster to change the password first and then use Trojans or other means to block the firewall. But then again, if the Layer 2 password does not touch the firewall stack, then others If you want to take back the management rights, it will increase the difficulty of several layers, and the internal firewall and security system will even apply for him, but instead become a powerful barrier for him, this is undoubtedly a master, there is no doubt."

(US): "I asked a friend of the Republic, and this is translated"

The world's top hackers, famous security companies on all continents, the Korean government and people from all walks of life, and many ordinary people in the Republic are all looking at the words written in blood-red handwriting on the homepage of the Korean government website. Sentences not seen

Ultimatum:

Those who violate China will be punished even if they are far away

--"2".

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like