Urban Denon

Chapter 130 Hacking the Hardware Forum Server

Xiao Yihan looked at the time and it was only after two o'clock, and it was still early, so Xiao Yihan stretched, stood up and moved his hands and feet, thinking to himself: "It's time to meet that mak."

When attacking a server, the first thing to do is to scan, detect and analyze.

The difference during this period is only that the top hackers will use these methods more skillfully and without flaws than the junior hackers.

In layman's terms, scanning is actually drawing a map for the server you will invade. The better the scanning, the better your understanding of this server.

And scanning can be done because any computer on the network, when other computers ask it to respond, it will automatically provide some technology, and these automatic questions and answers take care of many of the routine things that keep the network working.

But, at the same time, it also gives hackers an opportunity, because they can use this system to obtain a lot of useful information, such as who is out there and how their system is structured.

Probing is a more detailed scan.

Hackers use probing to fool firewalls and monitoring systems to gain more information about how servers are structured.

Rookie hackers generally use automatic detectors to detect, while top hackers generally use manual detection. As a rookie hacker, it is definitely easy to be caught by intrusion detection software, and the latter can often avoid triggering intrusion detectors.

When scanning and probing are complete, it's time to analyze.

Generally speaking, analyzing a site or server takes quite a long time. He must use the data you obtain to find out how the server is running and what hardware and software are used to keep it running.

According to normal circumstances, the scanning and detection activities should not cause the other party, the better.

But because this intrusion was by appointment, this part of hiding seemed completely unnecessary.

At this time, Xiao Yihan did not scan the server through the Tianlong system program, but scanned it manually.

After scanning this server, Xiao Yihan began to analyze all the acquired data.While reading the feedback information, he couldn't help clapping his hands in admiration, "This mak is really amazing, it can make such an amazing firewall, it's impeccable, this guy seems to be not only an expert in hardware, but also absolutely perfect in software. An expert hacker."

Although Xiao Yihan praised Mak's improved firewall as impeccable, in fact, there is no system or firewall in the world that is really impeccable.

As long as it is a program, there must be loopholes, even the most perfect program is no exception.

After spending several hours carefully analyzing the samples from his own server, an idea came to Xiao Yihan's mind.

After having an idea, Xiao Yihan immediately started to do it, and he spent another hour immersing himself in various preparations.

An hour later, mak started to attack the server, using his huge chicken botnet to attack the server, reducing the efficiency of the data monitor, while opening all kinds of attack tools, using countless tcpip connections to apply for tide generally flock to the server.

Xiao Yihan did this, of course, he didn't expect to break through the firewall made by mak with this method, he just wanted to make a more accurate assessment of the performance of the firewall with this wave of attacks.

In this situation, it is as if two armies are facing each other, one side has done intelligence work on the other side, but always has no idea, so it sends a group of troops to rush over to try the truth.

At this time, the firewall activated the counterattack function, Xiao Yihan was caught off guard by the sudden counterattack by the firewall, and after finally blocking the counterattack of the firewall, Sun Yunmeng said to himself a little depressed: "Damn it, who is hacking now?" Who? This firewall is really perverted."

Knife for collection

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like