HacKer

Chapter 428: ignited the sturdy fire!

Shi Lei and the International Intelligence Bureau of the Ministry of Foreign Affairs are now in a situation of similar situation, and there is basically no possibility of reconciliation.

The International Intelligence Agency of the Ministry of Foreign Affairs wants to investigate the situation of Mr. M from Shi Lei in order to be able to recover the information of the Robot Project. It is best to pass Mr. M, the earthquake hacker EQ one pot end.

For this reason, plus Shi Lei is Mr. M, how does he reconcile with the International Intelligence Agency of the Ministry of Foreign Affairs?

Tianyue Hotel, the top floor of the 66th floor, room 6606.

Shi Lei took all the accessories in the kraft box. AIP artificial intelligence prosthesis, when packing, it is very considerate to install all the accessories in a small one-size carton, which is convenient for the storage of various spare accessories.

The accessories of AIP artificial intelligence prosthesis include four behavioral dynamic acquisition cameras, namely two flat glasses and two brooches; two spare rechargeable batteries, respectively replacing the batteries in the two prostheses; one manual; one warranty card; Finally, there is a guide CD that guides the user through the process of installing the AIP artificial intelligence prosthesis.

"Liu Lao, this CD, you arrange relevant personnel to study and study, and you will take off your prosthesis every night and put it on you in the morning. Yes, if there is any malfunction in the artificial intelligence prosthesis, please follow the instructions on the phone directly. Get in touch with us, don't dismantle the artificial intelligence prosthesis. Because we presuppose anti-disassembly measures and need specific engineering mode, we can open the artificial intelligence prosthesis." Shi Lei finally shouted.

In fact, Shi Lei has not finished, the AIP artificial intelligence prosthetic anti-disassembly measures have very strict protection. If there is no specific password authorization, disassemble the AIP artificial intelligence prosthesis, the built-in system will automatically delete all the data, and start the engineering backup battery, short-circuit the destruction of some circuits and electronic components.

Xia Guo's electronic product development is really bad, but Xia Guo has a trick, that is, the cottage imitation. Once there is an advanced finished product, Xia Guo's electronics manufacturers have begun to copy the cottage.

Although the AIP artificial intelligence prosthesis is built on the behavioral dynamic simulation system, the cottage manufacturers can't imitate it, but Shi Lei still sets very strict protection measures. Just in case, the stricter the better!

Near noon, Meng Xun made the east, ordered room service, and sent all kinds of expensive dishes to the executive suite on the top floor.

Shi Lei coughed softly. "Sorry, I will go to the bathroom first."

In the bathroom, Shi Lei took out the phone and pressed the ‘5’ number key to contact the low-level pseudo artificial intelligence.

"Sir, the clothes are for you!" The synthetic electronic sound of the clothes, the tone is quite cold. This is because the basic logic application module of Yizheer does not contain human emotion simulation modules.

The human emotion mimicry module has no practical use except to make it a human emotion. Moreover, the human emotion simulation module, the program code is very complicated, and has a great basic requirement for computer hardware.

For a function that has no practical use, Shi Lei will not write the corresponding human emotion simulation module for the time being, which is a waste of time!

"Jie Zheer, control the No. 2 server, through the broiler network, launched an attack on the Lijianguo network. Attack conditions are limited: first, IP daily browsing more than 100,000, less than 1 million websites; second, exclude military networks Third, the priority is to attack the media industry network; fourth, the attack mode is set to destroy the data, after breaking the server defense, directly clear all the data of the other server, and control the power supply scheme, adjust the voltage of each component, burn the hardware! ”

The so-called control power to burn the hardware is definitely not a joke. For example, the current popular hardware overclocking, CPU core voltage, generally only a little more than 1V, the maximum can not exceed 1.65V. If you tamper with the power supply scheme and provide 2V or even 3V to the CPU, then the CPU must be burned properly!

Shi Lei wrote the design of the black magic software, there is a sinister design, control power supply solution, with the tampering motherboard BIOS information, so that the power supply system is unstable, causing serious damage to the hardware.

"Sir, please determine the time to execute the command, and the conditions for terminating the order." Yi Shier reminded Shi Lei to set more specific command conditions.

"Start the command immediately! The command abort condition is to protect the server from being attacked. When the load reaches 70, immediately clear the connection record of all the broiler servers. If the record cannot be cleared, discard the broiler that has not cleared the record!" Shi Lei added set.

"Sir, the command is accepted. The target is being screened and the broiler network is being initialized. It is expected to start attacking after 2 minutes and 48 seconds."

Shi Lei hangs up the phone and deletes the call history. The contact between Shi Lei’s mobile phone and the clothes is not through the mobile phone signal, but through the wap network. After Shi Lei deletes the record on the mobile phone, he will delete the records in the network synchronously. This type of communication is much safer than communication by mobile phone.

Out of the bathroom, Shi Lei accepted the lunch invitation with a smile and made proof of his absence.

Even if the matter of Li Jianguo, I finally suspected that Mr. M would not have anything to Shi Lei. After all, Shi Lei has a full absence certificate, which is completely disconnected from Mr. M’s identity. But Shi Lei this time, does not intend to let Mr. M top the tank, but there are other candidates.

The Western Bureau of the State Administration of Cyber ​​Security, Ling Yumo’s old man, and the general director of the West, Ling Yuguo, are viewing the situation of Li Jianguo. Li Jianguo’s network was attacked. As the four major cybersecurity bureaus of Xia Guo, Ling Yuguo immediately received the situation.

In the Lijianguo network world, a number of IP daily visits exceeded 100,000, and websites below 1 million suffered a lot of attacks.

Due to the time difference between Lijian and Xiaguo, according to New York time, the gap was 12 hours. Xia Guo was at lunch time, and Li Jianguo was just around the morning.

The early morning is generally a time of high hacking behavior, because the security of the general server, who has 24 hours of uninterrupted guardianship?

In the face of a server that is not guarded by security personnel, it is definitely much more difficult than a server with security personnel on duty.

Although it is low-level pseudo-artificial intelligence, it has the basic logic application module, and can decide some things autonomously according to the rules of the program.

For example, Shi Lei limited the conditions and allowed Yizhe to attack the network of Lijianguo. In the Internet world, I have captured a large number of temporary broiler servers.

These temporary broiler servers, although not of any quality, have captured more than 10,000 temporary broilers in a short period of time.

More than 10,000 temporary broilers are close to the control limits of the clothes. After all, the second server is not a large supercomputer, the computing performance is not too prominent, can only support the control of more than 10,000 broiler servers.

Controlling more than 10,000 broiler servers, the energy of the clothes is expanded by dozens of times!

Immediately in accordance with the conditions restricted by Shi Lei, it stirred up the wind in the network world of Lijianguo and set off a huge wave. The first of its kind is the official website of CBS CBS, which is famous for Li Jian.

The number of CBS views is not too large, and there are barely 200,000 IP daily visits. In the first round of attack, the control of more than 10,000 broiler servers formed a network of broilers and launched a wave of DDOS flood attacks.

He is not planning to rely on flood attacks to crack the official website of CBS. After all, CBS has a professional DDOS software firewall. The clothes are only using a huge amount of data, so that the DDOS software firewall occupies a large amount of system resources, and then use the black magic software to puncture the real security firewall and enter the web server.

After entering the web server, the company continues to access the data server and application server through the internal network. At the same time, three servers were controlled, and it was finally decided to implement the data deletion plan.

Low-level formatting takes a very long time, such as a normal 500GB single-disc mechanical hard drive, and low-level formatting for a few days is quite normal.

I will not wait for such a long time. According to the attack mode of the moon virus, when the hard disk is formatted low-level, the power supply of the hard disk is suddenly interrupted, the data in the hard disk is lost, and the physical damage of the hard disk is even caused.

After killing the hard disk, continue to control the power supply scheme, and tamper with the BIOS power settings, continue to destroy the CPU and memory!

In CBS CBS's server room, the disk array cabinet issued an abnormal mechanical noise, which was a low-level format of the hard disk, and was suddenly stopped by the power supply.

In the cabin of the motherboard, an unpleasant smell of burnt smell was emitted, which is why the CPU and the memory stick were burned by high voltage!

CBS CBS's first move, and quickly fell under the attack of the clothes, the clothes did not leave any information, the focus of the attack was transferred to other sites.

In the Western Central Administration of the Cyber ​​Security Bureau, Ling Yuguo looked at the information on the computer screen, and his heart raised a cold. From CBS CBS, it was detected that it was hacked and the time of the fall was no more than 3 minutes!

"Which top team is looking for CBS's trouble? Could it be CBS, and recently reported what made them unhappy?" Ling Yuguo muttered to himself.

However, the supervisor of the Western Central Bureau once again reported to Ling Yuguo that several websites of Lijianguo were attacked at the same time!

"Who is it?" Ling Yuguo took a puzzle, but inexplicably, a name emerged in his mind.

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like