The Executor of the Heavens: Beginning with the Watch Dogs

Chapter 27 Carry out the main quest to steal the system

Chapter 27 Carry out the main quest to steal the system

In fact, after Xie Yuan unlocked the entire ctOS system, he was able to connect to the entire system and complete one of the most important main tasks—downloading the ctOS1.0 system, but he never did so.

Because he still wants to learn more knowledge, this is a relatively quiet and good place, and he doesn't know what world he will be born in next time, so it's good to enjoy the tranquility more.

So far, his computer proficiency has reached the requirements of a general information engineer, but he is better at writing firewall and virus programs than an information engineer. System evaluation level: hacker Lv.3 (junior elite)
This level is not comparable to Bad Boy 17's Lv.4 and Damian's Lv.5, but with the help of a universal tool, he can infinitely rival Lv.6's advanced hacker.

It's a pity that he estimates that the system will not give him an excellent grade after completing the task this time, so he has no other benefits or rewards to get except a series of skill improvements.

Although he can continue to study, Xie Yuan has already begun to get tired of the ordinary world, so this level is almost the same.

Since there is no benefit, no matter how peaceful this world is, it is meaningless. It is better to finish it early and leave as soon as possible.

"It is detected that the system focuses on the target: ctOS system 1.0, do you want to execute the copy transfer task?"

A prompt came from the retina screen in front of me. This is not the first time it has been sent. The first time Xie Yuan chose to veto it. This time, let's confirm the execution.

"After receiving the selection and confirming the execution, the universal tool will complete the transmission in 30 minutes, and the system task will be automatically updated after completion."

After getting the confirmation, Xie Yuan simply sat on the ground, took out his mobile phone and pistol, and prepared to meet the enemy.

The only disadvantage of downloading from the console with the lowest encryption in the ctOS system is that it is slow, because this is an area intentionally undefended by Bloom Company, there is no confidential information, and layers of barriers are set up to disconnect from the host at any time .

Even with the calculation speed of 1 Z flops of the universal tool, it is necessary to continuously brute force and hard crack each divided area. If the consoles in various places are not unlocked, it will take a whole day.

But now with the unlock codes of each area as a guide, the system card intrusion program in the universal tool can continuously wander between various areas at the fastest speed and disrupt the sight of Bloom's security department.

But that's not even a word. Now the system card program is establishing a mirror image program in each area. As soon as the establishment is completed, the invasion will start in full swing.

Now Xie Yuan only had to wait. After Bloom's network security department found that the system infection could not be defeated online, they had only one last resort: power off the ctOS system.

But breaking a huge system that covers the entire city is not enough to simply set a button, which will only bring fatal flaws to ctOS.

So they will set up one or several so-called nodes. Once these nodes are all released from control, they can completely control the switch of the entire system to determine the life and death of ctOS.

And Xie Yuan's job is to stop them.

……

Once the system is set up, the first step will be to launch a full-scale attack. It is estimated that the entire ctOS system will be captured in 6000 seconds, that is, 10 minutes later. The reason why it takes 10 minutes is that it needs to completely bypass the firewall system without being triggered. alarm.

After completion, the second step is to scan the entire ctOS system. The scan time is expected to be 3000 seconds, which is 5 minutes to complete the scan. This step will not bypass the alarm, but it will not help.

The third step is to copy ctOS in all directions. The time given by our own system is 15 minutes, and the last step is also the most troublesome step.

Within 15 minutes, it is necessary to prevent the power-off programs of the three nodes erected in different regions from starting. The system will automatically locate the position that can be hacked.

But in addition to capturing the first node, which can catch Bloom Corporation and the city's security forces by surprise, the difficulty of the second and third will increase exponentially, which can only depend on whether Xie Yuan's own ability is strong.

After displaying "upload complete" on the multi-tool, Xie Yuan also left the area immediately. He had to put on the thickest armor, bring the most powerful weapon, sit on the fastest vehicle, and suffer the most vicious beating. up.

……

Thirteen minutes later, in Bloom's cyber security hall, there was a heart-piercing siren!
"Ma'am, our system is being scanned!" A panicked female clerk broke into the vice president's office and reported to Bloom's vice president, Charlotte Gardner.

"What?" Charlotte stood up with a sudden "Teng", with disbelief on her face, "Are you sure that our system was scanned, not our system was attacked?"

"Yes," the clerk's voice trembled, and she seemed to realize that she was involved in a troublesome matter, "the security director confirmed that our system's firewall system has been completely bypassed by a super virus program without being discovered.

Now the entire system is being scanned, and it's more than halfway done. "

"Did these geeks grow up eating shit? Why are they so incompetent!" The sudden bad news caused Charlotte to yell at her shamelessly, "She also said how superb my skills are, how stupid I am, why did I only find out when the system was completely compromised today?" I'm going to fire them! Fire them all!!"

When Charlotte rushed to the security hall aggressively, the lights here were completely shrouded in red light. Everyone was lying in front of the computer desk and using their keyboards to launch a counterattack against the virus program. Virus army to contend with.

They could only watch helplessly as the red area continued to expand like a zombie virus invading the human body, and then slowly covered the entire area, but they couldn't stop it.

"I need an explanation, please start your performance" Charlotte asked blankly in front of a man in a hardcover suit wearing glasses.

But the man in the suit also unambiguously held a piece of A4 printing paper densely printed with data and handed it to Charlotte.

"What is this? A letter of resignation? Do you think that apart from such a big event, a letter of resignation can calm things down?" Charlotte tried her best to suppress her overwhelming anger, but her words were already rushing out uncontrollably.

"If you can calm down a little bit, you can know that what I handed you is not a resignation letter," the man in the suit responded to Charlotte without fear, "At first, I thought it was the legendary hacker T-Bone using it again. The virus program that was used in the 2003 power outage in the United States and Canada was loaded with countless backdoors he set up in the ctOS system to hijack our system."

After all, the man in the suit explained arrogantly, "If this is the case, the firewall of the ctOS system will respond immediately.

We can transfer 90% of the confidential information during the period when they actually hacked into the three major nodes, leaving a shell or a framework of the ctOS system to anyone, and let him live the addiction of city controllers for a few days , and then counter him or them, especially those pretentious Dedsec, hum!

Even if he is a saint, unwilling to manipulate the system, and intends to close ctOS, it is just closing a shell. ctOS can still be launched on other frameworks. After optimization, we can upgrade to 2.0.But we'll keep the core anyway. "

But as soon as the voice changed, the man in the suit was also exhausted, and helplessly explained the content of this printing paper: "Then I found out that I was wrong. This virus program is not like this. He first established a mirror image in each area. program, and after infecting the entire area, it directly infiltrates the firewall system, pay attention to infiltration!"

The man in the suit focused on the word "infiltration": "He made the firewall system think that it was harmless data, so he let it in and out arbitrarily. As a result, as more data entered, the scope and ability of the virus program became larger and larger. , like a cancer cell that has been eroding the entire system."

He looked at Charlotte, who was in a daze, and read the critical illness notice with a sad face:
"Our ctOS system is now terminally ill!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like