Desperate Hacker

Chapter 658 Contest

Chapter 658 Contest
As a hacker expert, sometimes you may only have a few skills in the world.

Sean has been under house arrest in this super luxurious apartment these days.

You don't have to leave your house every day, but you can use your computer.

That's enough for him.

But as a person who has not appeared in the hacker industry for several years.

He first needs to look ahead to what vulnerabilities have been exposed so far.

The result surprised him.

In just a few years, the world outside has been turned upside down.

I vaguely remember when he first entered Guantánamo.

The technology community is still discussing NVIDIA's Kuda, as well as other topics such as heterogeneous computing, parallel algorithms, cloud computing, and big data.

What scientists publish is programmatic.

This is the gap between computer scientists and engineers.

Then he chose an expensive bottle of red wine worth tens of thousands of dollars.

The world is completely different.

However, when it comes to certain technologies, Sean was surprised to find that a deep zero-day vulnerability existed before he was imprisoned, but it has not yet been discovered.

After the meal, he ate ice cream for dessert. While having an in-depth one-on-one interaction with the female anchor on the screen, his fingers quickly entered some codes on the keyboard that others could not understand.

The discussion is about how many human jobs will be replaced by artificial intelligence in the future.

In the evening he ordered a takeout steak from a well-known New York restaurant.

But the thing that breaks his defense the most now is his diet.

Even some large companies have not discovered this vulnerability.

Engineers use their skills to practice and create things that have practical applications in the world.

What people are discussing now is the technology of generative AI.

But it's only been a few years now.

With this vulnerability, Sean is full of confidence in the next work.

But most of these foods don't taste very good.

Generally speaking, people should eat healthy food.

Anyway, someone is paying for all this, so why not do it.

This vulnerability lies in the heartbeat algorithm of Open SSL.

Sean tried it, and soon the familiar feeling of being in control came back.

Fighting against the disease for such a long time has allowed Chen Qingfeng to develop a healthy living habit.

At this time, Chen Qingfeng, who is far away on the west coast, has gone to bed early.

Although Chen Qingfeng has not yet reached the stage of enjoying delicious food without any worries.

But food restrictions have been greatly lifted.

And he also felt the positive response from his body towards health.

My appetite becomes much better every day.

Even when I slept, I slept quite peacefully.

What's more important is that when he wakes up every morning, he no longer feels that indescribable tiredness that feels like he hasn't rested.

What replaced it was an indescribable feeling of energy.

He hadn't felt this way in a long time.

Even before he was diagnosed with the disease, as a programmer at that time, he had not felt this sense of expectation for a long time.

But this night, Chen Qingfeng didn't know what was going on. He always felt that something was wrong with him.

He tossed and turned and couldn't sleep.

Looking at his sleeping wife beside him, Chen Qingfeng slowly got up and went to the bathroom. He sat on the toilet and looked at himself in front of the mirror.

Visibly, he became much healthier than before.

Whether it's the complexion, the muscles on the body, or the belly that just appeared, it's the look that Chen Qingfeng is happy to see. But at this moment, his phone inexplicably sent a warning vibration.

Chen Qingfeng picked up the phone and looked at it, and was suddenly shocked.

He hurriedly arrived at his study room on the same floor and then turned on the computer in a panic.

An alarm message came on the phone.

That is a mechanism that will be triggered when someone tries to break into the security system he set up.

I haven't encountered much trouble in the past few years.

He is a hacker by nature, so he will naturally stick to this aspect.

What's more, he has mastered so many hacker vulnerabilities. Even some highly skilled experts would not invade his company's database.

However, some data needs to be transferred between research institutions in the United States and research institutions in China.

Because it involves some patent and technical issues.

Therefore, Chen Qingfeng personally participated in the design of laboratory safety protection issues.

However, nearly a year after the establishment of the two research institutes, they were suddenly targeted.

When Chen Qingfeng logged into the server, he found that the other party was still trying to invade his server.

Upon seeing this, Chen Qingfeng immediately began to use his long-dormant arsenal of weapons.

"Come on, no one has come this far in a long time, show me who you are!"

Chen Qingfeng's anti-tracking tool was quickly activated. The address shows that the other party should be in New York State. However, Chen Qingfeng was not sure whether this was the other party's forged address.

Because it all comes so easily.

However, Sean, who was sitting across from the computer at this time, was lost in thought while looking at the screen.

Those who hired him gave him far too little.

And he is not afraid of being traced to his real address.

But he unexpectedly discovered that the server address of the cancer research foundation he wanted to invade was even more stringent than the security systems of top companies.

His set of Open SSL vulnerability penetration technology is helpless in front of this small charitable research foundation.

"Hi, if you give me another $100, I can take off this top!"

The female anchor on the other screen suddenly sent a message.

Sean seemed to be greatly disturbed at this time and turned off the video software directly.

He began to concentrate on looking at this difficult bone.

The prompt shows that the other party has tracked you.

But it doesn't matter, Sean doesn't care about being discovered, those people have locked him up here.

But now the other party is trying to turn on his camera.

Sean even clearly discovered that the other party was using a technique that he was very familiar with.

He also participated in the writing of the virus.

So I am very familiar with hardware drivers.

Sean took the most extreme approach and taped the tape on the pizza box directly to the camera.

Soon its security system indicated that the camera had been turned on remotely.

As a result, Chen Qingfeng saw a dark area.

If control of the camera has been obtained, it proves that the address is genuine.

But why didn't his opponent stop him?

Chen Qingfeng was a little unsure.

"Hello, I know you can hear me! Who the hell are you!"

Chen Qingfeng took a look at his hardware. The voice part was not controlled, and the other party should not be able to penetrate it. He made an anonymous conversion of the address on the server, so it is impossible for the opponent to follow the clues and track his current address from the server.

However, the other party seems to know that he has the right to control the other party's machine hardware.

"It's really interesting. It turns out there are people in the world like me who discovered this vulnerability early!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like