Desperate Hacker

Chapter 343 Fictional Project

Chapter 343 Fictional Project

A simple meeting is held online through ZOOM software.

Speaking of which, this well-known online conference company was founded by an engineer who came to the United States from China.

It is said that when ZOOM was first launched, it caused a sensation.

Because the founder of this company graduated from a second-level school in Shandong Province.

He is definitely not considered a top talent in the country.

However, after arriving in the United States, it turned into the best realistic advertisement for that country to pursue its dreams.

To be honest, Chen Qingfeng no longer values ​​academic qualifications very much.

Some people graduated from prestigious schools, but are not suitable for this industry.

Just like when they graduated from graduate school.

Most of them have no connections, and the students are doing real research projects.

But after graduation, some people can use various connections to write a forward-looking program for the industry.

For example, bullshit articles like the research on the communications industry in the next 10 years.

Then you can still get a degree.

Of course, if you can graduate by writing this kind of article, you have to look at the strength of your family.

……

The meeting was held online, and participants could only hear voices, so they could not see each other's faces.

The reason for setting it up like this is to hide your identity.

Of course, even Chen Qingfeng's voice has been changed.

At least with today's technology, it is no longer difficult to use other people's voices to forge.

After all, Chen Qingfeng is someone who has done similar projects in collective learning, so the questions he asked are also very practical.

The engineers on the other side also responded fluently.

Then I made a special trip to visit the online platform established by Chen Qingfeng.

Of course, only a rough model can be built in a hurry.

But this is what makes it look more real.

"That's right, Mr. Robin, we hope to fully embed the current project into NXP's platform! But there is no prior precedent in this regard, and it seems that other research teams are more inclined to use NVIDIA's ready-made platforms!"

"That's it! I think we are willing to provide any help you need for your project. In addition...if possible, I can send some chip samples..."

Robin said it politely and seemed eager.

Chen Qingfeng understands that a company in a brand-new field does not yet have a market share and can only compete for some marginal projects.

And once Chen Qingfeng decides to use this chip, they will be the ones to bear the risk.

The success of the project can prove that NXP's chips can also be used in the fields of machine learning and AI technology.

As for the failure of the project, the semiconductor company did not suffer any losses. The investment team that suffered the loss must be Chen Qingfeng.

However, what NXP does not know is that Chen Qingfeng’s team does not exist at all.

But the whole project just looks so real.

The sample library is full of X-rays, pathological slide pictures, and other image resources from the hospital's front-line resources.

According to the project leader, this project is to use AI technology to assist diagnosticians in their decision-making.

This can greatly reduce the pressure on doctors in pathology departments, as well as radiology and ultrasound departments.

In fact, from a certain perspective, AI technology is used to steal these people’s jobs.

The reason why I am optimistic about this project is that it takes a long time to train a similar skilled technician in Europe.

And machines, as long as they are invested once, can continue to work tirelessly.

The project seems to be somewhat reliable, and the other party's questions about semiconductor technology are also well-founded.Engineer Robin was not suspicious.

Then when the meeting approached, the two parties established a way to communicate with each other!In fact, all Chen Qingfeng needs is the address of a mail server.

Soon he got the other party's email server address.

Because this address needs to retrieve some information from NXP's internal database.

This gave Chen Qingfeng an opportunity to take advantage of.

……

The meeting ended quickly. At least in Robin's opinion, the cooperation between the two parties was very promising.

However, Chen Qingfeng quickly obtained the other party's information.

It is about the use of some undisclosed technical manuals for NXP's one or two hundred chips in the field of artificial intelligence.

Chen Qingfeng checked it and found that compared with the manual downloaded from the official website, this manual was more detailed.

However, he could also see some clues, such as the page numbers in some places being inconsistent.

In other words, this information was pieced together temporarily.

Chen Qingfeng looked at the email address and quickly sent a thank you email to the other party and attached an attachment.

It's just that Robin didn't expect that there would be a program from the flame virus in the email.

……

For security reasons, most companies will use technical means to separate the internal and external networks.

However, sometimes some information on the internal network needs to be authorized to the external network.

You need to open some ports on the company's firewall.

This is the method Chen Qingfeng can use.

As long as there is no absolute physical isolation, hackers can theoretically get involved.

Especially if you have some zero-day vulnerabilities.

Even more so.

After Chen Qingfeng sent the email, he waited for the reply.

Soon some new log information appeared on his screen.

He knows that the other party has opened his attachment!
There is a small trial program in the attachment. On the surface, Chen Qingfeng sends his product to the other party for evaluation.

But in fact, some downloaded files contain hidden flame virus file contents.

Chen Qingfeng has completely figured out how the CIA's virus database works?

It didn't take long for him to get the gatekeeper's information.

It seems to be another product from an old friend.

Cisco's networking products!
Chen Qingfeng vaguely remembered that among the zero-day vulnerabilities he announced last time, there were still a few that were not reported.

So he tried to check, and sure enough, Cisco's web access vulnerability still had not been cleared.

Chen Qingfeng can use this method to access Cisco's web service iOS console.

Soon, Chen Qingfeng took control of the firewall system in the Berlin laboratory!
Everything is a breeze!
Because many companies buy products and then try their best to buy things they don’t need.

For example, engineers and most users of Cisco products have become accustomed to interactive control methods on their consoles.

But the product manager still wants to develop a control function for them that can be accessed through the web!
When new functions are launched, some new problems will inevitably arise.

However, these all need to be handled by engineers. People who make products and markets only care about what they make and whether there are any new points to attract users, but they don't care whether it is safe or not.

Chen Qingfeng really loves these smart people!

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like