HacKer

Chapter 1581: The peak is coming! [New Year is smooth! 】

H2>.

The recruitment of peripheral organization members, the use of the assessment server, does use the virtual server solution, through the resources provided by iwn secret network, Shi Lei constructed a virtual server, but this virtual server uses Shi Lei's unique technology, even the same level The hacker can't judge it if he doesn't spend a lot of time researching.

Shi Lei observed the contest between the mysterious hacker and the second assessment server. Like the first assessment server, the second assessment server was in the middle of the mysterious hacker.

The level of the second assessment server is mainly the second-rate hackers in the world. The technology of mysterious hackers far exceeds this level. Therefore, the mysterious hacker handles the defense system and counterattack system of the second assessment server with ease.

Shi Lei only quietly observed the invasion mode of mysterious hackers. He did not intervene. Even the second evaluation server, almost no resistance, Shi Lei did not personally.

In a mysterious room, the mysterious hacker with his hands on his gloves, hitting on the keyboard without rushing, did not improve the speed of the keyboard.

This means that the mysterious hacker is full of confidence, does not care about the defense system of the second assessment server, nor does it care about counterattacking the system. He has absolute confidence to win!

"The strength of defense has increased a lot!" The mysterious hacker talked to himself while he was dealing with the second assessment server.

For the strength of the server's defense, every hacker's mind has its own weights and measures. The evaluation system designed by Shi Lei is basically a comprehensive reference to the mainstream of the public.

The mysterious hacker suddenly stopped tapping the keyboard and deliberately let the second evaluation server counterattack, as if he could not resist it. This is the scheme and intensity of the mysterious hacker analyzing the second evaluation server.

‘Before the first server’s defense strength and counterattack strength, it was almost slightly lower than the world’s third-rate. At the same time, the calculation speed of the assessment server is not good. If the hackers involved in the assessment reach the level of the world's third-rate and have reliable computers, the chances of breaking the first server are great. The mysterious hacker secretly thought in his heart.

'As for this server, the computing speed should be increased by ten times, and the defense system is better, almost close to the level of the world's second-rate. It seems that this ch organization has some strength, at least the evaluation system is doing very well. Well! ‘The mysterious hacker is in the heart, can’t say whether it’s praise or ridicule.

After all, mysterious hackers almost ignored the second assessment server, which was a one-sided battle. If it is not a mysterious hacker, not only must pass the test, but also the second assessment server will not pass the information out, and prevent the discovery of the ch, I am afraid that the second evaluation server has been attacked by him!

Even with so many restrictions, this mysterious hacker still shows a shocking strength, and the fast **** secondly evaluates the server's defense system.

In about ten minutes, all the defense systems of the second assessment server were broken, all counterattack systems were restrained, and the mysterious hackers announced the completion of the second assessment server test.

In the second evaluation server, the mysterious hacker did not spend a minute, and has found the specific link address of the third assessment server.

"Private r, is it to improve the security defense strategy of the third assessment server?" Yizher observed the invasion of mysterious hackers anytime and anywhere, and the two consecutive tests were easily broken by mysterious hackers. Shi Lei made a suggestion.

But Shi Lei shook his head, and the situation in the third test could not be changed!

If you upgrade the security defense strategy of the third assessment server, it is very likely that the mystery hacker will find the flaw. After all, the members of the peripheral organization selected in the third test are not really elite, and there is no need to pay much attention.

Shi Lei intends to set up a strict security defense system inside the fourth assessment server, trying to confront this mysterious hacker.

After all, the announcement issued by ch is very clear. Once the legendary level test is completed, it is eligible to become a full member of ch, not just a peripheral member.

Under such circumstances, the security defense strategy of the fourth assessment server is strict and reasonable, and will not cause doubt.

“Shi Yier!” Shi Lei whispered, “Isolation of the second assessment server used by mysterious hackers. Once the other party leaves the second assessment server, it is ready to fully analyze the situation of the second assessment server!”

"yes, private r!" In the bone-transmitting earphones of the lip-lens information processor, the clothes responded to Shi Lei’s instructions.

In the second assessment server, the mysterious hacker, like the first assessment server, rebuilt the defense strategy and made a certain degree of modification.

In the first assessment server, the security policy modified by the mysterious hacker, because the server was reset, did not have any feedback results. This time, mysterious hackers have already had relevant countermeasures.

‘I hope that the second assessment server will be reset directly after the end of use! Hey, I don't believe this ch organization, there are so many servers, it must be the evaluation server of the virtual server structure. The corner of the mysterious hacker reveals a sinister smile.

The mysterious hacker confirmed the first time in the second evaluation server. His own security defense strategy finally nodded with satisfaction, then left the second assessment server and entered the third assessment server.

In the face of the third evaluation server, the mysterious hacker did not have an urgent attack, as if it was stopped by the third evaluation server, the two sides were deadlocked.

But in fact, mysterious hackers are paying close attention to the second assessment server!

Although he had lost his connection to the second assessment server after he left the second assessment server, the mysterious hacker was waiting, and his default means worked.

"Private r, the mysterious hacker left the second assessment server, the system has isolated the second assessment server, and has not merged into the iwn secret network for the time being."

Shi Lei nodded. "A comprehensive analysis of the situation of the second assessment server, focusing on the analysis of changes in defense strategy!"

The clothing execution command, began the analysis, waited for a while, the transparent lens of the lip lens information processor, showing the dense data information.

Shi Lei carefully looked at the data and information, and couldn't help but take a breath!

The means of mysterious hacking is very clever!

Shi Lei had to admit that the technology of the mysterious hacker was very powerful, and the other party almost completely rebuilt the defense system of the second assessment server, and hidden the code he needed to execute.

If only this is the case, Shi Lei will not feel surprised at all. What really surprised Shi Lei is that the code that the mysterious hacker needs to execute is completely integrated into the defensive strategy. If the simple routine scan is not carried out, it will not be carried out. Full scan, it is absolutely possible to ignore this problem.

After all, the resources of the second assessment server are only very small. Under normal links, the driver will not perform a full scan. It will simply reset the server and collect the resources of the server and return to the iwn secret network.

The mysterious hacker in the second assessment server, the source code of the implant, the first key content, is to prevent the server from resetting, and send out spoofed feedback.

Once the feedback information deceives the clothes, the second evaluation server can join the iwn secret network intact. At this time, it is not the second evaluation server, but the mysterious hacker's broiler server.

The broiler server, which is equivalent to a mysterious hacker, is connected to the inside of the iwn secret network, and the mysterious hacker has the qualification to view the inw secret network.

Even more amazing is that through the simulation of the clothes, when the second test server, as a mysterious hacker broiler, enters the iwn secret network, it will release the fraud information again and integrate it into the entire iwn secret network.

‘The original guy has already judged, the evaluation server uses the technology of the virtual server, actually wants to penetrate the entire iwn secret network, the ambition is not small! ‘Shi Lei’s heart is cold, but he has to admit that the technology of mysterious hackers is very strong.

Until this moment, Shi Lei can basically judge it. This mysterious hacker is a world-class hacker!

However, the world's peak hackers are also quite rare roles on a global scale. Becoming a world-class hacker requires not only technical knowledge but also strong talent.

The top hackers, instead of giving relevant technical information, can follow the technical information and step into the peak step by step. If it is really easy, Li Jianguo’s hackers have long dominated the world, and there is a chance for Xia’s hackers to be stunned?

‘Who is this world-class hacker? ‘Shi Lei’s thoughts in his heart, and another experience of life journey, Shi Lei can pat the chest, the world’s top-level hackers, he knows more or less.

Even if it is the old monster of the Darpa Advanced Bureau, Shi Lei knows some things! After all, the circle of the world's peak-level hackers is only so small, it is difficult to look down and see if you don't know.

Shi Lei once again looked at the transparent lens of the lip lens information processor. The second evaluation server for testing mysterious hackers, the comprehensive analysis of the data, Shi Lei has an answer...

.r1152

...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like