Chapter 57 Wingman
Doorbell rang.

Lynn happened to be sitting on the outermost side of the sofa, and just wanted to get up and take a step to open the door.
suddenly,

click
The door opened.

This door is an electronic door, which can be entered by swiping a card, and there is no external lock at all.

I don't know how to open it.

A very ordinary person stood in the middle of the door frame like this. He was a man of yellow race, with no characteristics in his body. He belonged to the kind of person who looks like he didn't see it in the vast crowd. But it is often this kind of person, and it is actually the most terrifying.

Easley became excited, "Oh, you are that one, that black guy who knows computer technology well."

"A little bit, a little bit."

The ordinary man interrupted Easley and waved his hand humbly.

Hearing this, everyone present became excited. This is a hacker who understands network technology!

The position of the hacker is similar to that of the company's programmers. They are all gods and men who use the "Internet" to complete magical operations, but one focuses on intrusion and tampering, and the other focuses on compilation and protection.The groups of the two have a high degree of overlap, but they are also in the same situation. Lin En's impression is like a black magician and a white magician.

It is quite different from the position of a craftsman like a mechanic.

"Come in, come in"

These people panicked and hurriedly invited this distinguished person to sit down.

"This...Mr. is me, Uncle Chen, and Master Ruiwen and a few others who pooled in the money and hired a hacker through personal connections to name him in the Shanty Programmers Association." Zhu La omitted the other party's name and began to make a short speech. The introduction, and then the topic was directly taken over by ordinary people.

"My visit this time is a personal matter and has nothing to do with the association." The man said, and then immediately got to the point: "I have already understood the details. It just so happens that there is also a personal grievance between me and Grundfos, so this time it will be a matter of personal grievances." and dealt with it.”

He began to talk about his plan of action.

For network hackers, invading a database can be divided into five steps.

They are collecting information, detecting vulnerabilities, verifying the authenticity of vulnerabilities, comprehensive analysis, and the final intrusion link.

Preparing in advance takes the bulk.

"I checked the temporary database of Grundfos, and it uses a T2 energy-level "advanced" defense environment. The defense is surprisingly weak. As long as I play normally, it can be said that it will not take much effort to defeat his entire defense system." This An ordinary man began to boast.

It turned out that the modesty just now was just pretending.

"However, I happen to be unable to exert my full strength right now!"

As soon as this person changed the topic, Lynn heard a big question mark in his heart, why can't he show his strength?

Like weightlifting and e-sports, hand injuries will indeed have an impact,

But it all depends on knowledge, why can't it show its full strength?

In the other party's narration, Lynn understood again.

".Our association's arsenal is on the web page, which is blocked by a wall of information. I can't open the arsenal at all, I can't use advanced tools that are too suitable, and I can't call my peers to help me remotely. Some vulnerability detection modules on the Internet only have AWSscan with T2 level, although it is a bit cumbersome, it is still usable.”

"The worst thing is the censorship mechanism!"

"The intrusion module is very easy to be tracked and counteracted by the review mechanism. It is not feasible to use it to test the loopholes. It can only be the last one to ensure a success. Before that, there are quite complicated tasks to be completed, and I need someone to help me error detection"

"I need a wingman!"

Having said that, the hacker stopped talking.

Someone understood what he meant, frowned and said, "But none of us have ever touched the Internet, and none of us can cooperate with you like this."

"These are some very simple things that you can learn now."

As he said that, the hacker took out a thick book from his backpack, and added, "I know you don't have a terminal, so you can't transfer data quickly, so I specially brought a paper book."

Lynn looked down, and his eyes naturally attracted to it, only to see a few large characters written on the cover of this book:

"Introduction to Hacking"

"In this period of time, all of you should study this book, and then I will choose the one who has the best mastery."

After all, the hacker left.

"These" people looked at me, and I looked at you, and in the end it was Isli who opened the book first.

He put his hands on the front and back covers of the book, and opened a certain page in the middle at will, wanting to have a glimpse of the whole picture of knowledge.

at a glance,

All symbols!

The major is totally wrong, and he can't understand anything.

He couldn't help complaining: "It's too difficult, we don't have these foundations at all, how can it be so easy to learn from scratch?"

Uncle Chen said: "You read it from the first page. That person said it is a very simple job. You are all young and have a high ability to accept these things. I am old and I haven't said anything yet. .”

Uncle Chen is a well-known mechanical master. Hearing his advice, several people were also relieved.

Lin En was impatient for a long time. He turned the book to the first page and savored it with others.

At first glance,

Can't understand anything.

A second look at the past,

[Computer Science - Cyberspace Penetration: exp+1]

When looking at the past with the third eye,
Lynn understood.

I understand a little.

If you continue to look down along the point you understand, you can continue to look at the fourth eye.

Then I understand more and more.

1 minutes later,
Lynn has figured it out.

He has mastered all the knowledge on the first page,
So he looked up,
I found that several people around the table looked confused,

Jura was still reading the first two lines.

Easley's head nodded, and he was about to fall asleep.

Lin En scratched his head and suddenly felt a sense of loneliness as a master.

Next, the few people agreed to squeeze out time in the evening to study this book together after work every day.

On the first day, fifteen people came.

The next day, twelve people came.

On the third day there were only ten people.

A week later, Lynn yawned late at night, rang the doorbell and walked into the secret gathering place.

I don't know what's urgent today, Zhu La suddenly informed everyone to get together.

So here it is.

this week,

Lin En used his mobile phone to input and copy the contents of the book, and studied every day at two o'clock in the morning, and the level of the subject of cyberspace penetration successfully reached LV2.

It can be said that he is also the best among these elites.

Up to now, there are very few people who can continue to persevere.

There are only five people in total.

But they really have basically mastered the content of the work, and they will probably not lose the chain by then.

Uncle Chen is still there, but he has given up the idea of ​​studying and only comes here every day to clean up and boil water.

People are better at learning all kinds of new things when they are young, but when they are old, their brains are not so good.

Can't remember anything.

Easley looked up, suddenly changed his previous decadence, and said:

"To be honest, it's not that difficult."

After all, he is also a senior mechanic, his IQ is still there, and he is still young now.

If you really want to learn, you will definitely understand it in a while.

Now that he has a preliminary understanding, he can probably fulfill the request of the mysterious hacker in a stumbling manner.

People are gradually coming, and many of them are people who give up halfway.

Hearing Easley's words, they all complimented him.

"Youth is promising!"

"Oh, it's good to be young"

Little do they know that not all of them are so old, there are still some young people, the reason why they don't learn is simply laziness.

Wouldn't it be nice to go home and sleep with this time?

Hearing everyone's words, Easley couldn't help but feel a little blissful, and pretended to be modest like the hacker:

"How can there be, how can there be~"

Everyone was present, and Jura and the long-absent hacker were the last to enter the house.

The hacker was busy, obviously came in a hurry, finally put down his luggage, took a rest, and immediately said:

"Things have changed a little bit and we have to act immediately tomorrow!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like