HacKer

Chapter 948: Deep invasion!

On June 4, at 0:00 am; South Vietnam, National Security Agency, internal network.

Shi Lei adopted the method of "surrounding Wei to save Zhao" and attacked the internal network of the National Security Agency of the South Vietnamese country. The power of the network security of the South Vietnamese country, which was originally attacking the origin of the supercomputer of the dream entertainment main server, was all attracted back.

The original server of Dream Entertainment, the origin of supercomputers, withstands almost 500tflops of computing resource attacks. This level of attack has put IWN secret network under great pressure.

Fortunately, such a huge amount of attacks are also provided by distributed computing resources. Otherwise, IWN secret network can not stop!

With the power of one person, Shi Lei blacked out the official website of the National Security Bureau of South Vietnam and put on a stance to test the internal network of the National Security Agency.

After the return of the cyber security personnel in South Vietnam, Shi Lei still did not mean to give up. Even if many cyber security experts from South Vietnam returned, Shi Lei was not afraid.

The cybersecurity experts in South Vietnam have indeed returned to the country and invested in protecting the internal network of the National Security Agency. As a result, the internal security of the National Security Agency has improved a lot, and Shi Lei still faces more security defenses. It seems that the rough look is that it is more difficult for Shi Lei to invade the internal security network of the National Security Agency.

In fact, this kind of situation has also existed for Shi Lei. Standing on the perspective of Shi Lei, the cyber security expert from South Vietnam returned to the internal network of the National Security Agency, and the origin of the supercomputer of Dream Entertainment’s main server was relieved, thus freeing the computing resources of the IWN secret network. Shi Lei can call the IWN secret network computing resources to attack the internal network of the National Security Agency of South Vietnam.

Overall, Dream Entertainment and South Vietnam's cyber security experts are basically at the same starting point, but Shi Lei has saved the supercomputer origin!

Jingyayuan.

Shi Lei put his hands on the keyboard and quickly typed the line source code. Shi Lei is analyzing the loopholes in the internal network of the South Vietnam National Security Administration. Yizhe currently controls the safety of the entire Mi Rui technology system, and the IWN secret network runs at high speed, which is temporarily unable to provide more help for Shi Lei. It will take some time for the clothes to be adjusted before the IWN secret network resources can be integrated.

The performance of the clothes was limited by the hardware performance. The supercomputer originated only in the calculation speed of 10tflops. If AMD's latest ‘gift’ dream entertainment design supercomputer with a calculation speed of 320tflops is completed and handed over to Yizheer control, then Shi Lei does not have to worry about what the main server is attacked by South Vietnam!

It’s a pity that the supercomputer with a design theory of 320tflops is temporarily out of service. According to AMD's estimates, this supercomputer will take up to June 20 to be assembled.

Shi Lei chose the assembly location in Lijianguo, and placed it at AMD's headquarters. The calculation speed of 300tflops seems to be much at present, but Shilei knows the future development. This calculation speed is nothing in the future. The territory of Lijianguo does not matter.

In addition, Shi Lei attempts to show an attitude to the high-level Xia Guo in this way, that is, if Xia Guo is unfair to Dream Entertainment and Mi Rui Technology, Mi Rui Technology will not hang on the tree in Xia Guo. !

“Well, how is the IWN secret network occupied?” Shi Lei asked the source code information while asking about the information about the IWN secret network.

Yirui quickly answered Shi Lei. "Sir, IWN secret network has been integrated, idle computing resources, a total of 980tflops, the system can be called at any time."

Shi Lei showed a cold smile. "Well, prepare all the idle computing resources of IWN Secret Network and raise the security level of the endless defense system to the highest level. We have to play with the National Security Bureau of South Vietnam!"

“Yes, Sir!” Yi Zhuer responded to Shi Lei.

Shi Lei took the coffee cup on the computer desk with his right hand. After taking a big sip, he said to himself: "Nan Yueguo, I don't believe, you have no secrets!"

The South Vietnamese National Security Agency, as a national intelligence agency, Shi Lei is sure that their internal network must have confidential information. Shi Lei wants to use the power of the IWN secret network to let him cooperate with him to break through the internal network defense of the South Vietnamese National Security Agency and find the information content he needs.

At present, the cyber security experts of South Vietnam have fully protected the South Vietnam National Security Bureau. Shi Lei wants to break through the defense, and it is more or less difficult.

"Jie, the computing resources of the IWN secret network, sent a scam message to the South Vietnam National Security Bureau." Shi Lei ordered the clothes. The so-called spoofing information is that the IWN secret network is installed as a normal random network scanning test. Although this is also a malicious query, most defense systems will not pay attention to random network scanning heuristics.

In accordance with Shi Lei’s orders, Yi Shier began to send random network scanning probes to the internal network of the South Vietnam National Security Administration. As predicted by Shi Lei, the internal cyber defense system of the South Vietnamese National Security Agency did not respond to random network scanning at all.

“Very good!” Shi Lei saw the test feedback of Yizheer. He immediately controlled the computing resources of the IWN secret network and conducted a large-scale trial scan of the internal network of the Nanyue National Security Administration.

With the scanning of Shi Lei, the internal network of the South Vietnam National Security Agency has become slow. Its defense system began to automatically retrieve the reason for the slow system.

The South Vietnamese national security expert who retreated from Xiaguo carefully discovered the abnormality of random network scanning. Under normal circumstances, the frequency of random network scanning is very low. After all, the entire Internet is so large. Where can the internal network of the South Vietnam National Security Agency be scanned frequently?

Network security experts from South Vietnam began investigating unusual random network scanning frequencies. They quickly identified the internal network of the South Vietnam National Security Agency, which was under attack. Therefore, the cyber security experts in South Vietnam are waiting for the invasion of Shi Lei.

"Sir, random network scanning has been discovered by the other party." Yi Zhuer prompted Shi Lei.

Shi Lei's ten fingers on the keyboard, enter the last line of source code, and then press the Enter key, the source code just written, to the test. The quick verification of the clothes was completed and the feedback from Shi Lei was given.

"Sir, the source code is verified, is the source code executed?" Yi Zhuer asked Shi Lei's final order.

Shi Lei smiled nodded, "Execute the source code!"

About the worm, the second generation of hacker organizations in South Vietnam, the leader of Annan Star, the big pineapple is a world-class expert, but Shi Lei is not bad! Shi Lei also has a very deep research on worms, perhaps not reaching the peak level of the world, but it is also absolutely not bad.

Big pineapple can make a worm to deal with Xia Guo's internet. Shi Lei can also make worms naturally. The worms made by Shi Lei are not inferior to the Diablo made by the big pineapple.

The only thing that is unfortunate is that there is no big penguin-like company in South Vietnam. If you want to expand the worm quickly, Shi Lei can't learn from the big pineapple.

Fortunately, the worms made by Shi Lei are not prepared to expand on a large scale, but only for the South Vietnamese National Security Agency. The worm is not only highly contagious, but also highly penetrating.

The worm, which Shi Lei named as 'stinger', has a very high penetration. Shi Lei spent a lot of time and created a 'stinger' to facilitate the penetration of high-defense internal networks and destroy Information on the internal network.

‘The worm is not my strength, but definitely not my weakness! On the screen of the No. 1 server, Shi Lei is injecting the source code into the internal network of the South Vietnamese National Security Agency.

The stinger eroded the internal network of the South Vietnamese National Security Agency, but it was not successful for a while. The internal network defense of the other party was too high. Shi Lei created conditions for the stinger on one side. He tore up the internal network defense of the South Vietnamese National Security Agency. Although it is only a small gap, it is enough to allow the stinger to enter.

The stinger did not expect to enter the internal network of the South Vietnam National Security Agency!

South Vietnam, National Security Agency. Location, confidentiality.

Inside a mysterious underground base, cybersecurity experts in South Vietnam are coping with Shi Lei’s attacks. One of the bald glasses is middle-aged, bare on the forehead, and densely covered with cold sweat.

The middle-aged boy named Chen Guang, the chief technician of the South Vietnam National Security Bureau, is also the first generation of hackers in the South Vietnamese country, but turned into a security expert.

Chen Guang is forty-seven years old this year. Baldness is just because of too much fatigue, causing premature aging!

At this moment, Chen Guang was nervously watching the computer screen, and there was a shouting next to him: "Chen Chen, the pressure we have continued to increase has reached 300tflops of computational attack."

Chen Guang is the chief technician of the South Vietnam National Security Bureau, and because he is forty-seven years old, he is still not married. Therefore, the colleague of the National Security Agency, dubbed the general manager of Chen, means the **** supervisor of the court.

For this kind of teasing, Chen Guang is not angry. Chen Guang’s temper is notoriously good, but there is no woman. Perhaps it is because Chen Guang put too much experience on the hacker's offensive and defensive knowledge, let Chen Guang ignore other things. It is for this reason that Chen Guang’s technology has reached the world level!

"Chen, the defense of the other party is still improving. We are tracking the source of the attack, but we can't find any IP address for the time being. The other party's connection IP address has also been protected!"

The director of the South Vietnam National Security Bureau, named Kang Kang, is also the first generation of hackers, but the technical aspects are weaker, only to the extent of superb. In the aspect of hacking technology, Ji Kang did not have Chen Guanghao, but Kang Bing Chen Guang did a little better, that is, Kang Kang is good at employing people.

It’s definitely not difficult to do things that you can’t. As long as you can find someone who can meet and use this person well, you can solve the problem!

"Old Chen, is the current situation beneficial to us?" asked Kang Kang quietly.

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like