Desperate Hacker

Chapter 373 The predecessors planted trees, and the descendants enjoy the shade.

Chapter 373 The predecessors planted trees, and the descendants enjoy the shade.

I vaguely remember that Kevin Mitnick, known as the king of hackers, once hacked into the command network of the North American air defense system.

Chen Qingfeng didn't know exactly how it was done.

But as a man, he still has some interest in military affairs.

He had at least heard about the data link.

What to say?

Modern warfare command has reached the smallest infantry unit.

Why in American war movies are the bongo troops the ones who charge into battle?

The reason is that the person directing their operations is likely to be a colonel or brigadier general in the Pentagon.

Although a small force was dispatched, the combat information of individual soldiers was probably uploaded to the Pentagon's server through data link collection.

Although Chen Qingfeng has no definite evidence, he believes that it is not difficult to achieve this with current information technology.

And now Chen Qingfeng wants to find a way to attack a sea target.

He guessed that Ding Jiancheng should be on that ship.

This matter does not allow Chen Qingfeng to investigate slowly, because since Zhou Zhihua dares to attack him and his friends, it means that Ding Jiancheng is also in danger.

But how do you get a submarine to rescue someone on a merchant ship?

Chen Qingfeng thought over and over again and decided to find a suitable target first.

The place where the ship appeared was the Miyako Strait.

That is the breakthrough point of the first island chain. Even if Chen Qingfeng is not familiar with military information, he can probably guess that there must be an underwater fleet hidden there.

In other words, any ship passing there will be focused on.

Time did not allow Chen Qingfeng to calm down and think slowly.

So he began to try to use his original method of hacking drones to see if he could find an aircraft on duty in the inner area.

When he first invaded India's air defense network, Chen Qingfeng actually acted through information on the Internet.

It was the same this time. Chen Qingfeng was familiar with the previous safety measures for drones.

To hack into drones, it would be too troublesome to directly attack the Department of Defense's network.

Chen Qingfeng's idea was to first invade the aerospace-related departments.

But Chen Qingfeng needs to consult Susan.

"Do me a favor! I need to rescue a ship now!"

"What's the matter?"

"I want to command military installations in the United States! Or those in other countries too!"

"You're crazy! Even if you do this, you will become famous, but you won't be able to live a peaceful life in this life. If you really do this, there will be endless pursuit waiting for you. !”

"So I'm not going to use my own name! How about I pretend to be Anonymous?"

"Do not make jokes!"

"I'm not kidding! I have succeeded before, but the opponent is not a US military agency. Forget it, we will talk about these things later! Tell me, besides the Department of Defense, what other departments can mobilize weapons like Global Hawk or underwater submarines? Something?”   “Department of Energy! Or NASA or something like that! I remember last month a hacker just released the mailboxes and personal information of some of their employees!”

"NASA? Are you sure? Why does the aerospace department have anything to do with Global Hawk and nuclear submarines?"

"Do you think the military is just a military target? Sometimes the Ministry of Defense will assist other departments in conducting some research work, and NASA is also an organization that serves the military!"

Chen Qingfeng had no time to discuss these details with Susan.

But since Susan mentioned that other hacker groups have succeeded, now Chen Qingfeng only needs to use some preliminary work announced by these hacker groups.

So Chen Qingfeng found the information released by those hacker organizations.

This is a hacker group called AnonSec. About a few months ago, they released some information about NASA. However, NASA immediately denied it, but in the hacker circle, many people believe that the content released by this organization is true!
  Because the names and email addresses of all 2414 NASA employees published have been partially confirmed. And at the same time. Some spacecraft and radar data and spaceflight records released by the organization have also been directly or indirectly confirmed by others to be true.

To be honest, Chen Qingfeng was a little surprised, but since someone has paved the way, he might as well do a big one.

Although NASA denied it. But you must know that after the hacker organization releases some obtained information, it will not disclose the loopholes through which they penetrated.

Moreover, there are some zero-day vulnerabilities involving underlying logic issues that cannot be modified in a short time.

Besides, Chen Qingfeng still holds an all-conquering weapon in his hand.

Susan used big data to quickly filter out some of the content Chen Qingfeng needed about the vicinity of the Miyako Strait from the previously released 240g data.

There are adaptive submersibles, drones, and others...

"Peak! Look at line 13! There is a joint scientific research project between NASA and Australia, located near the Miyako Strait! If you want to control a submarine, you can try this one! The Australian submarine is quite simple. Some!"

Chen Qingfeng quickly found this voyage record.

The records did not disclose whether this voyage record was left by a nuclear submarine or another submarine.

There is one problem. Chen Qingfeng is not sure whether the submarine is still performing its mission.

Because those hackers announced this information a few months ago.

Chen Qingfeng knew that he couldn't rush. The only clue now was NASA.

Since a hacker organization has already broken in before, it shouldn't be difficult for Chen Qingfeng to get in.

So he quickly found the addresses of several servers based on the information left by the previous hacker organization.

Unfortunately, some server addresses are no longer available!

Chen Qingfeng didn't care.

So he asked Susan for help to see if some of the previously released video materials were public, or which website these video materials were posted on.

Soon Susan found out some information!
  "Peak! There is a public service platform that records a previously released video related to the voyage!"

Chen Qingfeng followed the lead and opened the website, and then began to use various tools to test it. Soon he was familiar with the route and found the address where the files were stored.

No one is stupid enough to manually copy these images or other data.

If it is automatic, it means that this server may have access to the server that actually stores important data.

Chen Qingfeng retrieved various programs on the server. I quickly found a script that automatically captures information and generates articles.

Later, Chen Qingfeng thought of a way to capture the packet server, and then followed the clues to find a higher-level database!
  (End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like