HacKer

Chapter 258: catch broilers, loopholes!

In the sixth year, Xia Guo had two cyber wars against Wozang, and Won Sangguo retaliated once, but the tiger's tail rushed back.

This is because in the case that Shi Lei did not know, CNS intervened, their official security expert group, tracking the members of the cherry group, and letting the Wonsan hacker lose the leader, so the hacker's short attack of Vosang State retreated.

At the beginning of the pink cherry blossoms, the offensive was too sharp, pointing to the social problems of Xia Guo, which made the leader of Xia Guo very unhappy.

Fortunately, the pink cherry blossoms run fast, and the CNS only dispatched a formal group to pursue. If it is pink cherry blossoms, it still stays in the network of Xia Guo, and the 12 expert groups of CNS are not allowed to collectively besiege the pink cherry blossoms.

That pink cherry blossom is absolutely necessary!

In the cyber world of Wozang, Rafael provoked Mr. M, the vest of Shi Lei. Shi Lei successfully settled the endless defense of the anti-virus firewall. After he had the premise of protecting himself, he also had some temptations.

The first two Xia’s wars against the Vasang State, although Shi Lei participated. But he is not pushing the waves, it is behind the yin, no one has fought positively!

This time the moon virus raged in the Wasang country, and Rafael provocatively, let Shi Lei decide, ready to bully and bully Rafael!

To bully people, you must first be well prepared, such as catching broilers.

There are only two fixed broilers in Shi Lei's hands. The first one is the core broiler super computer swallow. Yan is the absolute trump card in Shi Lei's hands. With a super computer Yan in hand, and there is endless defense, Shi Lei is not afraid of anyone!

Of course, not afraid of anyone, does not mean that you can provoke anyone. For example, the CNS of Xia Guo, the International Intelligence Bureau of the Ministry of Foreign Affairs of the Vasang State, and the CIA and FBI of the Confucius Institute.

Supercomputer Yan with endless defense can indeed resist them, but this will undoubtedly expose Supercomputer Yan.

If you lose the super computer Yan, Shi Lei's strength in the Internet, at least half!

Another broiler of Shi Lei is the public server of Shuangqing University. This broiler is very weak. It can only be said to be Shi Lei's small toy. It can be used to perform daily tasks. There is no possibility of borrowing a public server from Shuangqing University at a critical moment.

At the time of the second Xiaguo and Wozang network war, Shi Lei abandoned Aixon’s first-class broiler and abandoned the meteorite firewall, just to protect the supercomputer Yan. That lesson also made Shi Lei memorable.

So before bullying Rafael, Shi Lei was prepared to grab a few more broilers and prepare for it.

Using Supercomputer Yan, scanning in the Internet world of Wozang, Shi Lei himself also uses the search engine of Vosang State to view the official websites of some high-tech companies and look for opportunities.

On the search engine, I looked for it, but I didn't find the right object. Shi Lei touched his stomach, licked an all night, and after sleeping for a day, he was indeed hungry now.

Looking at the scanning progress of Super Computer Yan, Shi Lei stood up and found some food in the refrigerator, that is, bread and milk.

I used a microwave to heat up the bread and milk. Although it was not delicious, Shi Lei’s own cooking was even worse. He missed Ouyang Xiang’s cooking skills!

After barely eating the bread and milk, Shi Lei washed his hand and sat back in front of the No. 1 server.

Supercomputer Yan's scan has been feedback back to good news. Supercomputers are rented out, and some companies that need supercomputers have purchased supercomputer Yan's computing services.

These companies that need supercomputers are mostly high-tech companies, and their own servers are quite powerful. With the help of supercomputer Yan, Shi Lei has the right to connect with high-tech enterprise servers, and reverses from supercomputer Yan to several high-tech enterprises.

In these high-tech companies, Shi Lei screened two companies with superior server performance and lower server usage.

The two companies, like the original ACCESS, rented Supercomputer Yan just to increase corporate visibility, rather than actually using Supercomputer Yan.

Shi Lei first attacked a company named Music Company through the authority of Super Computer Yan. This company, mainly for other companies, provides computer service support.

Their servers are in cluster mode. The so-called cluster mode is the cluster server. Simply describing a cluster server is to make multiple servers work like a server.

For example, the music company's cluster server, a total of eight independent servers, through the cluster system, improve stability and computing power.

There are many advantages to using a clustered server. For example, if the server is upgraded, the old server can't just drop it. Also, consider the problem of continuous service. At this time, if the cluster server is used, the new server can be directly accessed. Form a cluster server to directly improve performance.

Another advantage of clustered servers is that if there is a problem with a separate server in the clustered server, other servers can take on fault-tolerant tasks, isolate the failed server from the cluster system through dedicated software, and the remaining servers pass through the server. Reload load balancing between the load transfer mechanisms. At the same time, give the security guards the presence of the faulty server.

The language system of the music company uses a Unix system that can accommodate up to eight independent servers. They are also equipped with eight independent servers to reach the limit.

Shi Lei knows another cluster system that can support up to 96 independent servers, that is Compaq's OpenVMS!

However, as early as in 2002, Compaq has been acquired by Hewlett-Packard Co., which has caused HP's servers to become more and more powerful.

The Unix cluster system adopted by Music Language Company is equipped with eight independent servers with a computing speed of 0.2TFLop/s. The integrated cluster server has even more powerful computing power than Aisonic's server group.

With the help of supercomputer Yan, Shi Lei successfully invaded into the cluster server of the music company and began to implement his own intrusion plan.

The advantages of clustered servers are obvious, but they also have disadvantages.

Because cluster servers have mutual fault-tolerant tasks, when a stand-alone server fails, or an independent server fails, other servers open the application again because of fault-tolerant tasks, taking over the shared disk cabinet. The data area, which in turn causes the erroneous application to re-run.

This mechanism is very good and one of the advantages of clustered servers, but it is also one of the disadvantages of clustered servers.

The process of taking over takes roughly three steps.

The first step is to investigate the fault-tolerant task and determine if the failure really exists. The second step is to restart a server in the cluster server. The last step is to take over the data area of ​​the shared disk enclosure.

If the application of an independent server fails, other servers in the cluster take over the application and it takes a certain amount of time. At this time, depending on the size of the application in question, the larger the application, the more time it takes!

In response to this mechanism, which is both an advantage and a disadvantage, Shi Lei found a large-scale application running in the cluster server of the music company.

After forcibly suspending this large application and isolating this independent server, the cluster server of Music Language Company is started by another independent server under the management of the fault-tolerant task mechanism, and then the load transfer mechanism starts to adjust the remaining seven servers. Load balancing.

When load balancing is deployed, the cluster system has the highest system resource occupancy rate and the system defense power is the weakest. With this moment, coupled with the power of supercomputer Yan, Shi Lei invaded the core of the cluster system and captured the super authority!

Get the super-privilege of the cluster system, that is to say, master the cluster server of the music company, let him become his own broiler!

Shi Lei gave a laugh and named the new broiler company, the No. 2 server, for his own memory.

After getting the music company, Shi Lei did not stop and continued to move toward the second goal.

The second goal, called Pukong Technology, is a scientific research enterprise. Their servers are actually cluster servers.

However, Pukong Technology's cluster server is different from the music company. The cluster server of the music company is composed of eight independent servers under the Unix cluster system. The Pukong Technology cluster server is composed of two simple servers, one primary server and one standby server.

This architecture is another form of clustered server. The primary server assumes all services. Only when the primary server fails, the standby server takes over all tasks of the primary server.

Shi Lei checked the performance of the main server to reach 1TFLop/s, and the standby server also reached 0.5TFLop/s. The two servers add up and are also stronger than ACCESS' core server group!

For this kind of cluster server, Shi Lei can be said to be handy!

Shi Lei invaded into the periphery of the main server and wrote a message that simulated the problem with the primary server and passed it to the standby server. The standby server immediately begins to take over the tasks of the primary server, and the two servers activate the cluster system's priority level determination procedure because of the moment of takeover.

The primary server does not fail and needs to execute all applications; the standby server needs to take over all tasks because it receives the failure information of the primary server.

When the primary server and the standby server collide, the cluster system activates the priority judgment program to verify whether the primary server is normal.

This conflict time and verification time is very short, but it is enough for Shi Lei, the world's top hacker, to break through the cluster system of the company.

After successfully entering the system, Shi Lei tried to obtain super permissions, he actually found a classic vulnerability!

The network system of the company is also a Unix system. Shi Lei only analyzed for a moment and laughed.

"It's really an idiot! Actually made such a big mistake!".

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like