The Strongest Hacker

Chapter 135 Hacker War (Part 1)

After quickly going around the major websites, Zhang Yang returned directly to Tencent's server. Although Tencent has just been listed, it is far less powerful than Zhang Yang's last life, but even now, Tencent's registered users have exceeded 100 million As mentioned above, if such a huge user data is cleaned up, it will not only be a loss for Tencent.

This is basically a slap in the face, the face of the entire Chinese hacker community, or the face of the entire China! Zhang Yang can't afford to lose this person, but the opponent is a large-scale invasion, Zhang Yang's power alone is extremely limited, and now he needs the cooperation of some experts, such as GD.

Zhang Yang didn't need to think about where GD would definitely attack at this time, but if he didn't cooperate well, it would be like fighting a war. Chapter 135: The Hacking War (Part 1) is easy to be defeated by the opponent one by one.

After scanning Tencent's server and looking at dozens of other data streams, Zhang Yang didn't care about these hackers. Anyway, they are probably just some domestic hackers. Soon Zhang Yang discovered the abnormality. Zhang Yang had checked the entire Tencent server, but some of the previous ports had been closed.

Moreover, the data streams of the attacks just now were quickly traced by the other party. Obviously, these people also regarded Tencent's server as the main battlefield. After hesitating for a while, Zhang Yang started to do it directly. Now he has no time to contact those people in ing. There are still some hackers who are launching flood attacks on Tencent servers, that is, water attacks, but Tencent has a lot of servers. Powerful, if you can't find a sufficient number of supersuits

If the server is used to attack collectively, there will be no task effect at all.

If you want to achieve such an effect, I am afraid that you will need server resources around a large data center. Not even the flamboyant Satellite 1 could do it.

Tencent's server uses the uni system, produced by IB Chapter 135: Hacker Wars (Part 1), IB Blue Giant's server capability is beyond doubt, its system is not bad, and has its own strengths from the linu system. After scanning, Zhang Yang quickly found the leaks. Although these hackers are very powerful, they have covered almost all the leaks in the uni system, but it is a pity that the leaks in Zhang Yang's hands are not only the latest ones, but also many years later. only to find the leak

Zhang Yang doesn’t know if anyone has discovered these loopholes, but he found that at least three loopholes in this system have not been hit. Zhang Yang’s intrusion ability is different from the past. It directly broke through the enemy's first layer of firewall.

Just after breaking through the fifth-layer firewall, Zhang Yang discovered more than a dozen active data streams in the server. Only three data streams were clearly defended by the enemy, while the rest were offensive data streams, which seemed to be domestic hackers. them. A system that seals all ports and leaks is not invulnerable, it just reduces the chance of intrusion.

Just like the first-layer firewall just now, even if there is no leak, there are six or seven ways to break through its peripheral firewall. Although these hackers invaded Tencent's server, the firewall is still Tencent's own firewall. They just patched it and closed it. Just some ports.

However, as one of the largest Internet service providers in China, Tencent's firewall cannot be too strict. Some of them are not system leaks, but hackers can take advantage of them. Many normal access requests can be used by hackers.

Zhang Yang did not immediately launch an attack on the second-layer firewall. He paid a little attention to the dozens of spiritual streams of domestic hackers. Zhang Yang quickly discovered that four of these data streams were obviously the same. They are quite tacit, and two of the opponent's three data streams are dealing with the attack of these four data streams.

Although there is no blood to be seen between the hackers, the intensity is definitely not inferior to the real battlefield. Unlike the modern battlefield, this place is more like the ancient battlefield. The two sides are like two cavalry. Together, and the countless codes entered by their keyboards are their weapons, and it depends on who can deliver a fatal blow to the opponent.

"Shenyue Killer! You bastard, are you two okay? The other party is very strong, probably at least in the top 20 on nubi's world rankings! The four of us can't win this server." Lan Mo said The voice rang quickly in a chat room.

All the members of the entire pomegranate skirt are listed, they don't have time to type and chat, and there are countless codes waiting for them to type.

"Big sister, wait a minute, it's not that easy. Although they don't have anyone defending here, we are fighting fires everywhere!" Shenyue Killer's hasty voice also rang out.

"GD, have you found the other party?" Lan Mo asked again hastily.

"After scanning, the other party's IP is available all over the world. Currently, all I can find is thirteen people, and everyone's strength is almost the same as ours. We only have seven people, including the two people in Guoan. , there are only nine of us in total, not enough to stop the opponent, and I have a hunch that the opponent still has a killer weapon, don't forget, we haven't completely solved the assassin virus at present." GD said in a slightly deep voice, Min quickly Speak out your own analysis.

"Forget about this, GD, come here to help, let's get Tencent's server back first, no matter what, we can't let the other party steal all Tencent's user information, and then publish it?" Lan Mo quickly said Said.

"I see, give me 1 minute." GD said quickly.

Zhang Yang didn't know that these four people were Lan Mo, Chengè Nianhua, and the two brothers Cumin Yang and Roasted Quan Yang, while Shenyue Sha and Guzhu Canmeng were in charge of other household websites. Bring it back to the website.

Zhang Yang didn't take the initiative to attack. He was analyzing the actions of these people to find the best opportunity. Zhang Yang has already analyzed the second layer of firewall. There are not only firewalls, but also many honeypots and traps. If it is not handled properly Otherwise, I am afraid that the other party will directly bite your own tail. If you can't get rid of the other party's tracking, you can only withdraw from this battle, let alone attack the other party.

But now, Zhang Yang has no time to analyze these honeypots. After thinking about it, Zhang Yang quickly copied his firewall to several springboards of his own, and turned on all the functions of the firewall, especially in terms of anti-tracking. Turn on the two tracking viruses embedded in the firewall to the maximum, if anyone still dares to track, then come and try.

Zhang Yang is not going to care about those honeypots anymore, he is going to "break in" directly. As for those honeypots, just track them. Zhang Yang has confidence in his firewall. Just in case, Zhang Yang copied the brood to the first On the second-floor springboard, if the opponent breaks through the most outward turn, then the honeypots they planted on the second floor will not be able to escape the killing of the brood.

All this only took Zhang Yang more than 20 seconds. Just after all this was done, the four data streams under Zhang Yang's monitoring suddenly started to attack a leak in conjunction with a sudden and rapidly increasing attack, causing the two defenders to fight together. Busy Zhang Yang's eyes lit up, he almost didn't think about it, his hands quickly flowed on the keyboard in an instant, and countless codes began to swipe the screen almost instantly.

The moment Zhang Yang launched an access request to the system, Zhang Yang directly opened a port through an internal leak, and then he directly used this port as a springboard to enter the second-layer firewall in an instant. The second layer of firewall is completely broken.

Almost after Zhang Yang had used that port, the warmth of the four streams of data was captured, and almost followed Zhang Yang's heels to get in.

"Wow! GD, you are so brave, I love you so much." In the chat room, Lan Mo cheered fiercely.

"What's wrong?" GD's strange voice suddenly rang out.

"What's the matter? You have broken through the second layer of the firewall. When did you become so powerful? The timing is so accurate." Lan Mo said quickly.

"Wait, you broke through the second layer of firewall? I didn't do it, I was just about to do it. Didn't I say I need a minute?" GD was stunned for a moment, and immediately spoke.

"It's not you? Who is that? This person is also very powerful. We all know anyone in China who can do this." Cumin Yang realized what GD meant, and asked immediately.

"It's gd!" After being stunned for a moment, GD and Lan Mo shouted out in unison. Among the people they know, there is gd, a newcomer who should have this ability, and no one has ever invaded before. The gd of any website has finally made a move, and it was so sharp when he made a move.

"Lan Mo, your vision has always been very accurate, let's analyze it, how is GD's strength? Especially in the red field?" GD asked quickly.

"It's very powerful. I thought it was you who did it. The other party didn't contact us at all. He should have been hiding by the side. The moment we just attacked, he directly captured our sudden increase in data flow and launched an attack directly. And it seems that he had a systematic leak and opened a very threatening port without any effort, and then directly got into the second-layer firewall. A lot of honeypots and traps triggered almost all of these things, which saved us a lot of trouble." Lan Mo paused, and then gave his own opinion. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like