My Super Black Technology Empire
Chapter 207: 1 group of sand sculptures
() You can search for "My Super Dark Tech Empire( in Baidu to find the latest chapter!
At this time, what is displayed on the computer screen is a series of complex codes, which are constantly flashing.
This is a large number of IP addresses of types A to E of major meat machines, as well as some MAC address attack data packets and source code.
61.0.50.0-61.4.63.255 American New York
61.4.80.0-61.5.80.255 Aramco Watson
128.210.0.0-128.210.255.255 Han Country Seoul
128.211.0.0-128.211.255.255 Shengyang Empire Tokyo
.......
At the same time, a large amount of data is constantly leaked, and there is a light green progress bar above it, indicating that the progress has reached 100%.
"Xiete, Ober, we succeeded! Hahaha, it really is the firewall set by those yellow-skinned monkeys, it just can't match our offensive methods." Everyone leaned over there and looked at the screen. The data displayed, smiled.
"Copy all their databases, as well as system log files, etc., GOGOGO, guys, we can make a lot of money this time!"
"Tsk tusk, I really don't know what important information the game company has, and even the top executives personally came out, but it's his responsibility, 30 million US dollars, this can be earned."
Soon, everyone was happy to discuss with you every word.
At this time, Ober quickly entered a cd command, this cd command can directly enter the target system database, so as to modify the key in it to get the information he wants.
The general idea is to use the cd command to enter the C: Windwossystem32 subdirectory and modify the administrator password.
Ober enters the cdc: command in the "Command Prompt (cmd window and press Enter to switch the directory to the root directory of the C drive administrator, and then enter cdWindowssystem32 to successfully invade.
The second step is to enter the dir command during the blank period when the other party's firewall is compromised.
The function of this dir command is to list all or specified file directories of the disk. The contents that can be displayed include volume label, file name, file size, file creation date and time, directory name, remaining disk space, etc.
Type dir and press Enter
Outcome:
Root directory file:
"Heavy Nuclear Fusion Technology". Doxc, file size 1028MB, generation date: 2020.4.27.
"Hey, what we are looking for seems to be this document. Get this document first and then copy their database."
A sharp-eyed hacker standing on the side quickly saw the file name displayed on Ober's screen and immediately spoke.
"I know, you don't need to say more." Ober gave him a blank look, and soon established their organization, a direct connection with Datang Technology.
They can choose to use the meat machine to jump layer by layer, and then hide their IP address and MAC address segment as much as possible, so as to achieve the purpose of coming and going without a trace.
It’s just that there’s a risk. After all, the jump of one more meat machine will slow down the speed of the network. Also, if you use the meat machine to jump layer by layer, at least 5000+ jump channels can be used to achieve the effect of invisibility. .
However, in this case, the network transmission will be directly five thousand times slower. If the Internet speed on the meat machine is fast, it is better to say, if the Internet speed is slow, they will also be slow here.
So the most concealed is the least secure. After all, the other party’s firewall can be repaired at any time, and then all the data that has not been sent can be deleted directly, or the files that are still being transferred in the meat machine can be recovered by special means. .
Their method of sending is to divide a file equally into 2048 small copies, like sub-volume compression, and then forward them to their original server at the same time, so as long as there is a problem with one small file, the entire file will be garbled .
Ober directly entered a section of Ping and netstat commands.
The Ping command is a command under Windows, Unix and Linux systems. It belongs to a communication protocol and is part of the TCPIP protocol.
Netstat is a console command and a very useful tool for monitoring TCPIP networks. It can display routing tables, actual network connections, and status information of each network interface device.
Netstat is used to display statistical data related to IP, TCP, UDP and ICMP protocols, and is generally used to check the network connection of each port of the machine.
Soon, a point-to-point communication link appeared on the computer screen, and a progress bar appeared.
"The line is established successfully, hey guys, you have to speed up the pace. I just checked the information from their system log. It will take two minutes for their firewall to restart." Ober looked at the progress bar displayed on the computer screen. , I was also relieved.
It only takes 30 seconds at most to complete the point-to-point transmission directly. Soon they will be able to use this data file to demand 30 million U.S. dollars from Amegian.
At the same time, if time permits, they can directly copy Datang Technology's data database, and use this information to threaten Datang Technology to surrender a large amount of data to get back this data.
After all, in their eyes, Datang Technology is an excellent game company. The core code of the game can be said to have been cracked by no one so far. Even their top hacker team has nothing to do with this code.
So if they can get a large ransom from Datang Technology, their income will definitely increase a lot, and even if it doesn't, they will not lose money at all.
Even reselling this data to other game companies can get a lot of money.
"Hehehe, Ober, their stupid firewall has a worse IQ than my stupid cat. This code of mine can also directly shut down their firewall for one minute." Viohm also spoke at this time.
He quickly opened the cmd command line ~www.wuxiaspot.com~ and typed shutdown-s-t60. Soon, a line of words was displayed on the computer screen.
[The firewall system of the other party will be shut down in 60 seconds. 】
Because firewalls generally have power backup and undead systems, after being invaded, they usually restart and restore directly.
So this code can directly hold the firewall for one minute.
....
at the same time.
Datang Technology, inside the quantum computer matrix.
In a bunch of data streams, Yuanyuan sneered at the other hacker's operations.
"A bunch of silly dicks."
In order to facilitate the next reading, you can click the "Favorites" below to record the reading record of this time (Chapter 215 A Group of Sand Sculptures), and you can see it next time you open the bookshelf!
If you like "My Super Dark Tech Empire", please recommend this book to your friends (QQ, blog, WeChat, etc.), thank you for your support! ! ()
You'll Also Like
-
Monster Hunter: This fire dragon has special characteristics
Chapter 147 2 hours ago -
Extremely hot apocalypse: I evacuated the polar icebergs
Chapter 498 2 hours ago -
If you are asked to live broadcast fortune-telling, will you compete with the King of Hell?
Chapter 141 2 hours ago -
Only seven days left to live? She goes crazy and kills
Chapter 234 2 hours ago -
Reincarnated as a sacred tree, I create a family of Yin soldiers
Chapter 633 1 days ago -
Rebirth as a lion starts with self-discipline
Chapter 160 1 days ago -
National Creation: I created a weird world
Chapter 136 1 days ago -
Road Survival: Once you hit the soul, you can make a must-have product
Chapter 645 1 days ago -
Asking for Immortality in Another World
Chapter 717 1 days ago -
What kind of evil method is this? This is the righteous method.
Chapter 117 1 days ago