Defect another world
Chapter 343 Network Intrusion
Chapter 343 Network Intrusion
Please note that the following acts are serious crimes, and our country has a complete set of criminal laws corresponding to them.
Places of interest like this generally have an introduction and welcome web page.This is easy to find with a search.
"Welcome to the Baal Monastery in the Fruitless Cave."
The following is a bunch of introductions to Baal Temple and instructions for visiting precautions.
The domain name of a web page is directly the address of the web server.It's just that things like web pages are too simple and have little to do with the office.
Moreover, nine out of ten web servers are hosted by others, so hack it and replace it with a picture of the middle finger, which is the meaning of Xuan (zhuang) Chuan (b).
Meng Fei chose Taotie Wen as the language, and then began to search for "If you have any questions, please contact".
Usually "please contact" is followed by an email address.This address is more valuable than the home page address.
Before the @ of the email address is the user name, and after @ is the address of the mail server.
After finding the address of the mail server, Meng Fei is not polite, he cracks it decisively, hacks it in, and gets the list of mail users.
The mailing list is an address book, and it is a very important thing.It contains not only everyone's email address, but also everyone's name and position.
It means that the basic information of everyone in the entire unit is here.
Some headhunters scour the entire company with mail, relying on the mailing list.Of course, they may not necessarily have been obtained by hackers, most likely with the help of an insider.
Meng Fei picked out the email addresses of those who were related to security, and then directly started writing scripts in the gluttonous people's notebooks, sending mass emails to these email addresses.
The content of the email was an extremely tempting advertisement for a Chiwu*love website, not only the pictures were quite attractive, but also a small free video.
He downloaded it directly from a certain website in Chiwu.After downloading it, he made a few modifications, implanted a Trojan horse and sent it out.
Obvious small advertisements on the website and the office email system have minimum filtering rules, which will be filtered out directly, and will not be sent to employee mailboxes at all.
However, if the mail system has been hacked by him, it is not difficult to suspend the filtering rules.
After 1 minute, a sentence popped up on the script.
"Remote connection has been achieved."
This is the result of someone among the security personnel in that office opening the email and clicking on the small video.
In the short video, there is a Trojan horse implanted by Meng Fei, which directly infects the operating system through a player vulnerability.Then establish a connection, take a screenshot, take over the input, and transmit.
Meng Fei returned to the car in his mind, and the person's desktop was displayed.All the desktops in Chiwuwen, and the small video is still playing.
Resisting the urge to appreciate art with the Chiwu guy, Meng Fei began to open hidden windows in the machine, bury the back door, scan the system, and look for the entrance to the security system.
This person seems to be an important maintenance personnel of the security system, so the authority is not low.
System entry is easy to find.Now Meng Fei can use this machine as a springboard to control the entire security system of Baer Temple at any time.
The back door was buried deep in the system in the form of a rootkit, and it was difficult to find it through scanning, let alone remove it.
When Meng Fei was finishing all this on the plane, a Two-dimensional JK girl suddenly popped up on the computer of Jiaojing, a young man who sits at the Baersi branch of the Chiwu Ancient Culture Research Institute.
She has long flowing green hair, a delicate and lovely loli face, and is wearing a cool white short-sleeved shirt and a dark blue checkered pleated skirt, with a pair of slender legs under the skirt.
This is the image of his idol Touchine Akemi.Of course, Ms. Touch Yin is not only his idol, but also the wife of countless nerds in the world.
Touchyin has a well-developed two-dimensional culture in Chiwu. She has served as the heroine in countless two-dimensional animations and film and television works. She is the dream lover of countless fans. Many nerds directly call her "Mingmei Wife".
For many Chiwu otaku, as long as there is a bed sheet that touches the sound, it is enough to comfort them for a lifetime.Of course, there are not a few such nerds in Qingmang, Suanni, the entire East Continent, and even the entire world.
Miss Touchyin pouted, looked at the screen with an unhappy expression, then looked at the young man's wretched expression, and said bluntly:
"Uncle, are you watching something bad again?"
It's a pity that this is an AI program developed by their research institute to monitor system security and the working conditions of their employees.This gave him an uncomfortable feeling of ruining an idol.
In fact, the heroine of the short CG video he was watching was Touch Sound Akemi.
As a system security maintainer, he knows very well that he should not click on the video in this kind of email.It's a pity that there is no way, he was hit fatally, and his heart itches unbearably.
Then again, who would hack his computer?To hack the security system of a dilapidated monument?For fare evasion?
He quickly turned off the video that was playing that nearly gave him a nosebleed, and said:
"Where is it? I'm just checking a suspicious video routinely."
Although Touchtone will appear from time to time to supervise his work, he will not directly peek at his screen and mail content.After all, Chiwu's privacy protection laws are still very strong.
"Someone just attacked the mail system you maintain."
The touch sound reminded.
"Hehe, how is that possible?"
Now it was Kakui's turn to sneer.In terms of professionalism in system security, he felt that it was impossible for him to be inferior to an artificial intelligence program.
"Someone just sent more than 10 identical emails to your office in 50 minutes. I guess it may be a mass phishing email."
"It's a pity you guessed wrong."
Kakui pressed his temples to relieve his nervousness.
"I've already checked the email you mentioned. It's just a small website pushing advertisements. I can receive several emails of this kind every day at home."
It's an implicit exposure of his favorite sites, but he doesn't realize it.
He also wanted to say that if you hadn't jumped out and interrupted me, I would have "checked" the video with you from beginning to end.
"Shouldn't this kind of mail be filtered by the mail system?"
"Spam filtering rules are not everything."
Kadoi decided to give this ignorant little loli a good education.
"Spam filtering systems are constantly improving, but spam is also constantly evolving to find loopholes."
"I recommend comprehensively analyzing the content of the email to see if there is any hidden malicious code. In addition, I recommend comprehensively scanning all servers and PCs on the intranet."
"It's three o'clock in the afternoon, which is the time when there are the most tourists.
"We have to deal with the capture of tens of thousands of avatars.
"And you're spending CPU processing time scanning small ads?"
"Just in case."
Touch tone Minmei begged him relentlessly.
(End of this chapter)
Please note that the following acts are serious crimes, and our country has a complete set of criminal laws corresponding to them.
Places of interest like this generally have an introduction and welcome web page.This is easy to find with a search.
"Welcome to the Baal Monastery in the Fruitless Cave."
The following is a bunch of introductions to Baal Temple and instructions for visiting precautions.
The domain name of a web page is directly the address of the web server.It's just that things like web pages are too simple and have little to do with the office.
Moreover, nine out of ten web servers are hosted by others, so hack it and replace it with a picture of the middle finger, which is the meaning of Xuan (zhuang) Chuan (b).
Meng Fei chose Taotie Wen as the language, and then began to search for "If you have any questions, please contact".
Usually "please contact" is followed by an email address.This address is more valuable than the home page address.
Before the @ of the email address is the user name, and after @ is the address of the mail server.
After finding the address of the mail server, Meng Fei is not polite, he cracks it decisively, hacks it in, and gets the list of mail users.
The mailing list is an address book, and it is a very important thing.It contains not only everyone's email address, but also everyone's name and position.
It means that the basic information of everyone in the entire unit is here.
Some headhunters scour the entire company with mail, relying on the mailing list.Of course, they may not necessarily have been obtained by hackers, most likely with the help of an insider.
Meng Fei picked out the email addresses of those who were related to security, and then directly started writing scripts in the gluttonous people's notebooks, sending mass emails to these email addresses.
The content of the email was an extremely tempting advertisement for a Chiwu*love website, not only the pictures were quite attractive, but also a small free video.
He downloaded it directly from a certain website in Chiwu.After downloading it, he made a few modifications, implanted a Trojan horse and sent it out.
Obvious small advertisements on the website and the office email system have minimum filtering rules, which will be filtered out directly, and will not be sent to employee mailboxes at all.
However, if the mail system has been hacked by him, it is not difficult to suspend the filtering rules.
After 1 minute, a sentence popped up on the script.
"Remote connection has been achieved."
This is the result of someone among the security personnel in that office opening the email and clicking on the small video.
In the short video, there is a Trojan horse implanted by Meng Fei, which directly infects the operating system through a player vulnerability.Then establish a connection, take a screenshot, take over the input, and transmit.
Meng Fei returned to the car in his mind, and the person's desktop was displayed.All the desktops in Chiwuwen, and the small video is still playing.
Resisting the urge to appreciate art with the Chiwu guy, Meng Fei began to open hidden windows in the machine, bury the back door, scan the system, and look for the entrance to the security system.
This person seems to be an important maintenance personnel of the security system, so the authority is not low.
System entry is easy to find.Now Meng Fei can use this machine as a springboard to control the entire security system of Baer Temple at any time.
The back door was buried deep in the system in the form of a rootkit, and it was difficult to find it through scanning, let alone remove it.
When Meng Fei was finishing all this on the plane, a Two-dimensional JK girl suddenly popped up on the computer of Jiaojing, a young man who sits at the Baersi branch of the Chiwu Ancient Culture Research Institute.
She has long flowing green hair, a delicate and lovely loli face, and is wearing a cool white short-sleeved shirt and a dark blue checkered pleated skirt, with a pair of slender legs under the skirt.
This is the image of his idol Touchine Akemi.Of course, Ms. Touch Yin is not only his idol, but also the wife of countless nerds in the world.
Touchyin has a well-developed two-dimensional culture in Chiwu. She has served as the heroine in countless two-dimensional animations and film and television works. She is the dream lover of countless fans. Many nerds directly call her "Mingmei Wife".
For many Chiwu otaku, as long as there is a bed sheet that touches the sound, it is enough to comfort them for a lifetime.Of course, there are not a few such nerds in Qingmang, Suanni, the entire East Continent, and even the entire world.
Miss Touchyin pouted, looked at the screen with an unhappy expression, then looked at the young man's wretched expression, and said bluntly:
"Uncle, are you watching something bad again?"
It's a pity that this is an AI program developed by their research institute to monitor system security and the working conditions of their employees.This gave him an uncomfortable feeling of ruining an idol.
In fact, the heroine of the short CG video he was watching was Touch Sound Akemi.
As a system security maintainer, he knows very well that he should not click on the video in this kind of email.It's a pity that there is no way, he was hit fatally, and his heart itches unbearably.
Then again, who would hack his computer?To hack the security system of a dilapidated monument?For fare evasion?
He quickly turned off the video that was playing that nearly gave him a nosebleed, and said:
"Where is it? I'm just checking a suspicious video routinely."
Although Touchtone will appear from time to time to supervise his work, he will not directly peek at his screen and mail content.After all, Chiwu's privacy protection laws are still very strong.
"Someone just attacked the mail system you maintain."
The touch sound reminded.
"Hehe, how is that possible?"
Now it was Kakui's turn to sneer.In terms of professionalism in system security, he felt that it was impossible for him to be inferior to an artificial intelligence program.
"Someone just sent more than 10 identical emails to your office in 50 minutes. I guess it may be a mass phishing email."
"It's a pity you guessed wrong."
Kakui pressed his temples to relieve his nervousness.
"I've already checked the email you mentioned. It's just a small website pushing advertisements. I can receive several emails of this kind every day at home."
It's an implicit exposure of his favorite sites, but he doesn't realize it.
He also wanted to say that if you hadn't jumped out and interrupted me, I would have "checked" the video with you from beginning to end.
"Shouldn't this kind of mail be filtered by the mail system?"
"Spam filtering rules are not everything."
Kadoi decided to give this ignorant little loli a good education.
"Spam filtering systems are constantly improving, but spam is also constantly evolving to find loopholes."
"I recommend comprehensively analyzing the content of the email to see if there is any hidden malicious code. In addition, I recommend comprehensively scanning all servers and PCs on the intranet."
"It's three o'clock in the afternoon, which is the time when there are the most tourists.
"We have to deal with the capture of tens of thousands of avatars.
"And you're spending CPU processing time scanning small ads?"
"Just in case."
Touch tone Minmei begged him relentlessly.
(End of this chapter)
You'll Also Like
-
Starry Sky Railway: I develop mobile games in Xianzhou.
Chapter 472 2 hours ago -
Yu-Gi-Oh: Stop it, this is not a duel!
Chapter 180 2 hours ago -
Type-Moon lists the top ten virtues, and the defense of Valhalla is broken
Chapter 167 2 hours ago -
Someone edited a video at Marvel, making everyone in the Avengers cry
Chapter 129 2 hours ago -
Intercept Hu Lingling, I create the Lunaria Protoss
Chapter 414 2 hours ago -
Zombie Agreement: One-click max level, join the chat group
Chapter 256 2 hours ago -
American comics: The opening time is wrong, crazy plundering entries
Chapter 186 2 hours ago -
People are in Bengtie, join the chat group
Chapter 413 8 hours ago -
Special Forces: Fusion of Death Shot, Support for Long Xiaoyun!
Chapter 190 8 hours ago -
Spoilers from the original Spider-Man
Chapter 355 12 hours ago