Desperate Hacker
Chapter 662 The gap is not much, only 8 years
Chapter 662 The gap is not much, only 8 years
"I hope we can achieve something nice soon, so can you now explain what you've been doing these days?"
"You invite me here, don't you just throw me away like trash after you're done using it?"
"Haha! We would never do such a thing!"
"Okay! Then let me explain to you. The opponent you asked me to deal with is obviously more difficult than I thought. Let me put it this way! There are some loopholes that even the CIA may not know about, but he But the defense is very good!”
"Sean! You are the top expert in this area, aren't you?"
"No one has ever done such a ranking. I can only say that I am one of the better people in this industry, but what you have to understand is that there is never a shortage of geniuses in this world! What's more, those research institutes themselves are Use generative AI to research drugs!”
"Then! Don't tell me you can't do anything about them!"
"Actually, I really don't have any good ideas in mind right now!"
"Sean!"
A lot of equipment is piled up here. Even if the air conditioner is turned on when it is turned on at the same time, people coming from outside will feel that it is extremely hot here.
He prefers to work in just a pair of underwear the entire time.
So he can only rely on the emotional card.
……
As for Sean.
Even so, the wind kept blowing.
In the years since Sean was imprisoned, Anonymous has disappeared.
Now, Sean still needs to gather some help online.
He deliberately let his opponent in that day, which actually revealed his strong self-confidence.
I quite don't understand how this institute did it.
The opponent is not an easy one to deal with. In the past few days, Sean has been trying to take advantage of various loopholes created by himself, trying to see what the opponent has made.
But the problem is that Sean doesn't have a suitable and feasible exchange condition to attract the other party.
In fact the two security guards had now taken off their fancy suit jackets.
Yes, sometimes the wolf pack tactic can still work.
It was so hot here that the person responsible for contacting Sean just said a few words and then left.
Before leaving, they left a few words, hoping to see results as soon as possible.
After these people left, Sean continued to be busy.
Obviously, the other party's security measures are better than those of the CIA!
"I know, I know, so I'm going to try again today!"
……
In just a few days, the luxury apartment has now turned into a large computer room.
Think about how great Anonymous was before he got in there.
But before he was imprisoned in Guantanamo, Russia and Ukraine had not yet started fighting.
The world is still at peace.
But now, everything seems strange.
……
"This is my second attempt. I plan to use a brand new way to dismantle the other party's vulnerabilities! I hope I can be lucky this time!"
Sean picked up the voice recorder and recorded his voice.
Then he took action.
He jumped to the company's website and quickly used a scanning tool to find out some of the technologies and database entries used by the website.
That's exactly what Sean wanted.
No company can prevent its employees from logging in remotely.
So since it is remote login, some ports will be opened on the server.
Sometimes if the settings are not in place, these ports can become tools used by hackers.
Of course there is a more convenient one. That is to sneak into the database as an employee through social engineering.
So far Sean has decided to use brute force.
Soon, his machine began to run the program he had written himself.
The program will scan one by one, and Sean will look after the vulnerabilities by himself.
At the same time, what Sean didn't know was that someone was watching him attack his website with ease.
"What is this guy doing?"
"He's using some methods that others don't know about!"
"PEAKER, if the other party knew that the one he spent so much effort attacking was actually a fake website located in Argentina, don't you think he would be so angry that he would vomit blood!"
"Don't talk, this guy is a rare master, just let us learn and see how he does it!"
Sean is still busy, and many times he faces a crossroads of choices.
Is it server a or server b?
Is it URL A or URL B?
This time he used another method to bypass the login restrictions, but his permissions were limited. But we still got into the technical layer behind the website.
But it's obvious that this company has made restrictions.
The database with the highest level of protection should hide the most data.
There isn't much time left for him now.
Sean knew his opponent would soon discover him and shut down his access. He must use limited authority and limited time to find ways to obtain more information.
But after running his program for a while, Sean felt something was wrong.
Today went really well.
Although we have not yet obtained the data from the research institute, we seem to have reached the threshold of the core database.
And soon, Chen Qingfeng also noticed the other party's doubts.
Start putting pressure on your opponent again.
To be honest, things like generative AI are quite interesting.
The five major models of generative AI include VAEs, GANs, Diffusion, Transformers, and NeRFs.
Each of these models has its own advantages.
However, Transformers are currently the most widely used, which is a model that can convert complex calculations into 1+1.
This is also why things like graphics cards are used to combine with AI.
Speaking of which, some of these models are nothing more than a paper from 5 years ago. Some were even born three years ago.
But now people are just converting what computer scientists have proposed into technology.
Finding loopholes used to be done manually.
Now you can use AI technology.
Apparently Sean spent 8 years in jail.
He doesn't know how many new technologies have been born in the world in the three and five years since he came out?
Simply put, Sean is behind the times.
Although it’s only 8 years!
Chen Qingfeng looked at these loopholes that were once worth millions.
Now that these things are out there, some big companies will spend a lot of money to get these loopholes.
But for AI technology, finding these loopholes will only become more and more common.
This is a time difference.
This is like agricultural civilization versus industrial civilization.
……
Chen Qingfeng felt that he should give his opponent a heavy blow!
"Okay, now let's learn the opponent's security settings!"
Chen Qingfeng ran a script he wrote directly on the computer desktop.
But at this moment, Sean, who was sitting across from him, felt as if hackers all over the world were dealing with him!
"No! What's going on! This is impossible..."
(End of this chapter)
You'll Also Like
-
One person controls one prison. After entering the world, I am invincible.
Chapter 2568 13 hours ago -
I stack buffs in a weird world!
Chapter 622 13 hours ago -
You, a druid, go to practice Taoism?
Chapter 206 1 days ago -
The magician of the fairy tale world
Chapter 183 1 days ago -
What if I become a beast?
Chapter 567 1 days ago -
I am the best in Xiuxian cheating, you guys will bear all the damage
Chapter 170 1 days ago -
Cultivating Immortality: Taking on the cause and taking over the result, fellow Taoists, help me!
Chapter 99 1 days ago -
Immortal cultivation starts with copying
Chapter 302 1 days ago -
Primordial Era: Even the Three Purities Must Call Me Second Uncle
Chapter 246 1 days ago -
This is what a fairy should be like
Chapter 46 1 days ago