God Bless Hackers

Chapter 0054 Jump

() "You'll know in a while!" Xu Wenwen smiled lightly, then took out a remote control with his exquisite little hand, and then pressed a button...

"boom……"

The cliffs in front of the jeep suddenly shrunk slowly towards both sides. A few minutes later, a five-meter-wide asphalt road was exposed between the cliffs.

In an instant, Xi Tianhao also suddenly realized that this mountain had obviously been hollowed out, and it should be an underground base of the Southwest Military Region.

The jeep also drove in under Xu Wenwen's driving, and the black-lit cave gave people a feeling of going from the yang to the yin.

The jeep drove for a long distance before stopping, and what Xi Tianhao saw in front of him again seemed to be an empty square, which was as big as several football fields.

No... It cannot be said to be empty, because in this seemingly square place, there are many tables with computers and various instruments on them, and several large screens are hung on the surrounding walls. All kinds of data on the Internet are flying.

Xi Tianhao not only shook his head and laughed, because he could see that this should be Xu Wenwen's territory, where the network team under her leadership worked.

But Xi Tianhao was a little speechless, isn't he the Internet brigade?It's not a secret army. Does it need to put the office underground?

Could it be that when it comes to the underground, hackers from other countries will not attack the network of the Southwest Military Region?

In Xi Tianhao's view, there is no such need at all, in this dark underground, it is like being a mouse, it will be depressing.

In the midst of depression, who can devote himself to work?No wonder the network systems of the Southwest Military Region were invaded one after another.

Of course, even though he thought so, Xi Tianhao couldn't say anything, and he didn't need to dictate the affairs of the Southwest Military Region.

Xi Tianhao stared at the big screen for a while, then turned to Xu Wenwen and said, "Give me a computer!"

"Well... this way, follow me!"

Xu Wenwen brought Xi Tianhao into a du li office that was isolated from the hall. Judging from the furnishings of the office, this should be Xu Wenwen's office.

As the captain of the network brigade, it is not surprising that Xi Tianhao has a private office, this is the privilege of being an official.

"Use my computer!" Xu Wenwen pointed to a laptop on the desk and said.

"Um……"

"Need something to drink?"

"Is there any beer?" Whenever Xi Tianhao uses the computer, he always likes to drink some beer, which is also a habit he brought from later generations.

"Uh...you can't drink alcohol in the army."

"That's whatever!"

Xu Wenwen went to prepare drinks, and Xi Tianhao also turned on the computer and began to study the traces of intrusion in various systems of the Southwest Military Region.

After a while, Xu Wenwen put a cup of hot coffee on the desk and asked, "How is it? Did you find anything?"

Xi Tianhao raised his head and asked in reverse, "What did your people find?"

Xu Wenwen smiled bitterly, and said: "The log file of Linux does not have any records, and the wrapper also does not record any signs of hackers' activities. It is certain that these hackers are real masters."

"That's for sure!" Xi Tianhao asked with a smile: "Are there any traces left by hackers on the firewall?"

"No! Obviously, these hackers bypassed the firewall."

Xi Tianhao raised his eyebrows and said with a smile: "Are you so confident about your firewall? Is it just bypassed by hackers instead of being breached?"

"It's hard to break through the firewall?" Xu Wenwen looked at Xi Tianhao with some doubts.

Xi Tianhao said with a smile: "It's indeed difficult, but didn't you tell me? These hackers are real masters."

"What do you mean?" Xu Wenwen frowned, and said, "Could it be that hackers have..."

"Hmm... the fireproof diary has been deleted by hackers."

Although it feels a bit unbelievable, Xu Wenwen also knows that the firewall is not impossible to break through, and its logs may also be deleted and modified.

And she also knew that an attacker could also launch a denial-of-service attack on the firewall, paralyzing it or at least slowing it down, making it difficult to respond to the attack in a timely manner, thereby compromising the integrity of the firewall's log.

"What do we do now?"

"It's okay!" Xi Tianhao smiled calmly, then set his eyes on the computer screen, and his fingers flew up.

A few minutes later, he raised his head and said with a smile, "The log of the firewall has been restored."

"Recovered?" Xu Wenwen walked behind Xi Tianhao in disbelief, and then leaned over to look at the computer screen.

After seeing the content on the computer, Xu Wenwen exclaimed: "Ah... all the information about the hacker's activities in the firewall has been restored, how did you do it?"

Xi Tianhao raised his brows, and said coquettishly, "Military secrets!"

"Eh..." Xu Wenwen was quite speechless, this guy was clearly out to take revenge on her, he was really narrow-minded.

However, she also knew Xi Tianhao's behavior style very well, so she didn't care, but said excitedly: "With these data, we can track down these attackers."

"and then?"

Perhaps Xu Wenwen was too excited, and without even thinking about it, he responded, "If you find their IP addresses, you can find them in reality, hmph...you dare to steal the secrets of the army, you must bring them to justice .”

"Eh..." Xi Tianhao rolled his eyes and said angrily, "If the IP address is abroad, how can you bring them to justice?"

After pouring cold water, Xu Wenwen finally came to his senses, and replied depressedly: "That's right, it's impossible for a hacker to use a real IP address."

"That's right! If it were me, I would definitely use the method of long distance and close attack."

"What do you mean?"

Xi Tianhao asked: "Do you know 'Jump'?"

"I know!" Xu Wenwen also understood what Xi Zaihao meant.

She knew that before invading, master hackers usually try to control a host on the network first, gain system privileges by exploiting loopholes in the operating system, and then use this as a base to access other hosts on the network. Often referred to as "jumping" by hackers.

Typically, hackers will do this a few times before reaching the target host.

For example, if a hacker in the Americas targets the network of the Southwest Military Region, before invading, he may first log in to a host in Europe, then log in to a host in Africa from there, then jump to Asia, and finally from Oceania A host in a certain country launched an attack on the network of the Southwest Military Region.

In this way, even if the attacked network finds out where the hacker launched the attack to itself, it will be difficult for the management personnel to find it back.

What's more, after a hacker obtains the system privileges of a certain host, he can delete the system log and cut off the "vine" when exiting.

In this way, it is very difficult to find the hacker.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like