HacKer

Chapter 302: Another group of people trying to steal the so plan!

The official website of the NHK TV station, who had just been blacked out by the code Y, issued an announcement to pretend to be Shi Lei.

Pretending to be such a thing, Shi Lei has always pretended to be someone else, this time he was actually overcast!

From the strength analysis of the other party's own management system of Haneda Airport, the strength of this imposter is definitely not weak. At least a world-class hacker, and maybe even the world's highest level.

Shi Lei looked at this announcement impersonating him, and secretly guessed, which is the masterpiece of this master.

‘This guy, is it the guy in the dark night dynasty? The strength of the night dynasty is eccentric, and it has the strength to resist the International Intelligence Bureau of the Ministry of Foreign Affairs. At that moment, their server defenses were weakened. I am afraid that this is a master who pretends to be me, and this master goes to attack Haneda Airport and come to Wei Wei to save Zhao! ‘Shi Lei’s heart sneered.

How can you have a world-class hacker in the dark night dynasty! ?

This is obviously not in line with common sense!

After being impersonated by his compatriots, Shi Lei was not too angry. As the saying goes, often there are non-wet shoes at the riverside station?

In the small supercomputer of the Dark Dynasty, when the JFS security experts were evacuated, these personnel also began to evacuate, so as not to be besieged by JFS personnel.

JFS security experts, to track the imaginary ‘Mr. M’, naturally can't have any results.

Shi Lei looked at the JFS internal network, and the SO plan download progress of the confidential server.

It still takes more than three minutes!

‘The night dynasty these idiots! ‘Shi Lei’s heart stunned, JFS security experts, if you can’t find Mr. M’s trace at Haneda Airport, and the night dynasty’s guys ran away, they would naturally return to JFS.

Ke Shilei is now stealing their information!

Once those JFS security experts come back, you will not find Shi Lei's action!

In order to successfully steal the SO plan, Shi Lei had to let Mr. M's identity appear to attract JFS's firepower.

Let Mr. M show up, and not just show up casually. First of all, Haneda Airport can't go there. At this moment, JFS security experts are all at Haneda Airport. Now, isn't it a self-investment?

Secondly, the small target does not have much effect. It will make JFS suspect that it is Mr. M's adjustment of the tiger from the mountain, and they are transferred from Haneda Airport, and then take the opportunity to escape.

After carefully thinking about it, Shi Lei finally chose the Tokyo Metropolitan Police Department.

The Tokyo Metropolitan Police Department has a record of being invaded by Mr. M, and the Tokyo Metropolitan Police Department has a major impact, and JFS has to guard against it.

Invading the Tokyo Metropolitan Police Department is very simple. It can even be said that it is not an invasion. It is more appropriate to use harassment. The harassment of the Tokyo Metropolitan Police Department is to use an anonymous VoIP account to dial the alarm phone without interruption. The replay is automatically hanged by the software after each dial-up. Use this approach to block access to the real alarm phone.

Last time, the Tokyo Police Department’s alarm call interrupted service for nearly two hours, and the direct loss was as high as 500 million yen. The indirect economic loss was incalculable.

If you come again, JFS will definitely respond quickly!

Shi Lei opened his own telephone harassment software and began to perform the task of harassing the Tokyo Metropolitan Police Department, so that the alarm system of the Tokyo Metropolitan Police Department was paralyzed.

In order to delay the time as much as possible, Shi Lei actively separated five units, installed fixed enterprise broilers with a meteorite firewall, and distributed 30 temporary broilers to form a small botnet. Mount the arc harassment software on an enterprise-grade fixed broiler and let it run automatically.

As a result, Shi Lei did not care about the arrival of JFS security tracking experts, even if the phone harassment software was found by JFS security experts, it has nothing to do with it.

After the harassment call from the Tokyo Metropolitan Police Department began, the JFS security experts responded very quickly.

Almost a minute after the Tokyo Metropolitan Police Department was harassed by the telephone, a few JFS security experts rushed to the Tokyo Metropolitan Police Department to find the source of telephone harassment.

Shi Lei looked at the countdown reading of the SO plan, and there was still a minute or so. That small botnet should be able to block JFS security experts for more than two minutes!

After all, five fixed enterprise broilers were installed with a meteorite firewall. Even JFS security experts know how to bypass the meteor firewall, it takes at least 20 seconds to avoid the meteorite firewall and break an enterprise server.

JFS's security experts, like the scripts of Shi Lei, are easily executed through 30 temporary broilers and then blocked by enterprise-class fixed broilers.

When the countdown of the SO plan, and the last ten seconds, JFS security experts broke the third fixed broiler. At the moment when the SO plan was completed, Shi Lei finally breathed a sigh of relief.

After a thorough inspection, the confidential server did not leave any traces, and other information, there is no need, Shi Lei immediately retreated.

From the internal network of JFS, Shi Lei, sitting in front of the No. 1 server, smiled smugly.

Ministry of Foreign Affairs International Intelligence Bureau, Network Security Department.

The second security team, Watermelon Mountain Blowfish, led six formal security expert teams and seventeen preparatory expert teams to manage the system at Haneda Airport, clearing the entire system and looking for any possible backdoor systems.

Moreover, after two incidents of being invaded, the top officials of Haneda Airport made up their minds and asked the Ministry of Foreign Affairs’ International Cyber ​​Security Department to re-create a new security system for Haneda Airport.

The first security team leader, Oda Shiro, led, six formal security expert groups, and ten preparatory expert groups, entered the botnet set up by Shi Lei.

Just three minutes before and after, Oda Shikun killed the small botnet and stopped the running phone harassment software. And save this phone harassment software for research and evidence use.

The alarm system of the Tokyo Metropolitan Police Department only stopped for less than four minutes before and after, and there was basically no serious loss.

But this time, the Tokyo Metropolitan Police Department is not the goal of Shi Lei!

Shi Lei’s goal has been taken in his hands!

The voice communication channel of the Dark Night Dynasty assembled the core layer of the Dark Night Dynasty, with a total of eight masters. In addition, there are men codenamed Y and D, and the four masters they brought.

The man, code-named Y, was changed by the electronic sound-changing software, which is very strange, as sharp as the ancient father-in-law. "D, dark night, let's stop acting for a while!"

"Second!" The man, code-named D, succinctly stated his attitude.

There was a nervous opening in the dark night. "Y, D, we haven't got the SO plan yet. If I suspend the action, how can I explain it to them?"

The goal of the dark night dynasty to invade JFS is actually the SO plan!

"In the dark, the situation in Wozang, can't you understand? The guys of the International Intelligence Agency of the Ministry of Foreign Affairs, by the mysterious M, are nervous and can't move and follow the traces. This is for us. The pressure is too big. Even if I and D can temporarily block the mad dogs, if they continue to invest, we will die!" The man, code-named Y, is as sharp as the father-in-law, and continues: "The night, JFS has What power, don't you know? Hey, with your relationship with CNS, how could you not know?"

The man, code Y, revealed some secret information. The International Intelligence Bureau of the Ministry of Foreign Affairs should have hidden power, and the boss of the Dark Night Dynasty, the dark night actually has a shallow relationship with the CNS.

Could it be that he is the boss of a second-generation hacker organization, actually colluding with the official forces?

Some nights are not reconciled: "Y, if you and D, attack JFS alone, is it possible to take out the SO plan?"

The man, code-named Y, laughed. "In the dark, I and D are powerful, but we have a little gap with the mysterious M, and Raphael. JFS has a very powerful supercomputer inside. I'm afraid you know. If you can let the CNS, lend the permissions of their supercomputer to me and D, maybe there is still a chance."

In the dark night, how can the CNS borrow the power of the supercomputer?

In case Y and D are both happy and heart-warming, they will use the CNS supercomputer to obtain confidential information inside the CNS. It will be a disaster!

The man with code D coughed, "Y, don't be embarrassed by the night. How can CNS give us super computing power? In the dark, you don't have to bother us. JFS is really bad, they want someone to be advanced. The hardware has advanced hardware, and it is still at home, how do we fight with them?"

"Y, D, is there no way?" The night is a little helpless. If you can't get the SO plan, the dark night is really bad to explain to those people.

After all, at the beginning, he promised to get the SO plan.

The man with code D thought about it and came up with an idea: "You go to contact Mr. M, the guy will definitely be able to enter the JFS internal network. The last time Raphael was tracked by JFS and CIA, the situation is very suspicious. It may be that The mysterious Mr. M, Rafael, who is framed in it. And the key is Mr. M, who may be the master of our summer country. However, I don’t know who he is!

"Really?" The dark night was overjoyed. If Mr. M was a member of Xia Guo, then the matter of stealing the SO plan, the night was planned in the heart, to convince Mr. M.

Shuangqing City, Jingyayuan.

Shi Lei used the unordered file segmentation technology to turn the SO plan into a pile of 5MB files. Then, on a number of broilers, after jumping a number of times, from the split SO plan, from the multiple broilers, the first server local is retrieved, and the IP connection records on multiple broilers are eliminated.

However, after Shi Lei regrouped the split SO plans, when he was ready to open the SO plan, the endless defense issued an alert.

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like