Reborn Super Hacker

Chapter 107 The Secret in the Picture

In the special industry of hackers, the main target is computers, and the computer systems built in computers are the source of income for hackers.The so-called "it is never possible to have something perfect!" Of course, the same is true for computer systems. The current computer is full of loopholes, so hackers will use these loopholes to do something that can profit for themselves, but loopholes can also be exploited. to sell.

Gray space is the world's largest trading platform for computer system vulnerabilities, but not many people know about it, and those who know about it have top-notch technology. .

The founder of the gray space is the world-renowned hacker Kyle, who is currently wanted by the whole of Europe and the country M, but because no one wants to mess with him, it doesn't matter.But there is also a reason that his command of the gray space can be of great benefit to hackers around the world.

"windows0day!" Today this vulnerability is very popular.The main reason is that this vulnerability is a general-purpose vulnerability of the Windows system. It has existed since the oldest version of Windows, .nt3.0.

Mike Fei, a company that focuses on network security in the world, its product Mike Fei anti-virus software accounts for half of the European and American markets, and the other half is Mike Fei's deadly rival Tiemen Saike Company!McAfee is headquartered in the Hawaiian Peninsula.

"Odum, who do you think will buy this loophole??" Mike said, taking a sip of coffee.

Odum held his chin and pondered for a while, "Hehe, look at what Microsoft has done this time, I guess they are still holding an emergency meeting!!"

"There's not much buzz about Tiemen Saike recently, is he developing something?" Mike continued to ask.

"I think so. Recently, Huaxia's 'Feiqi anti-virus software' has become as fierce as a tiger crossing the river. Although all the computers here are not available, the people from our Chinese branch sent a report that it can actually check and kill all computer programs. Viruses, Tiemen Saike is probably developing a new killing function now!" Odum said.

"Well, China should not be underestimated now. A few years ago, it was a country ravaged by Internet viruses, and it has developed too fast in the past few years. By the way, what is the progress of our latest version of the firewall?" Mike asked.

"The current progress is fairly stable, and the last step of the function is being solved, and it will be done in a few days!" Odum replied aggressively.

And this time.

"The bug was bought!!" Kyle received such a message. .

Kyle showed a faint smile when he saw it, and then he opened a gif picture on the desktop, changed the suffix to another English, then opened the picture with a special tool, and typed: "Haha , I think it is normal for that vulnerability to be bought, now you Microsoft is probably going to die, technical director??."

Afterwards, Kyle changed the suffix of the picture back to gif, uploaded it to the homepage of his gray space website, and replaced the logo picture.

Soon, Microsoft's technical director began to search for the person who bought the vulnerability.Because all transactions in the gray space are kept confidential, as long as you have money, the vulnerability will be revealed to you directly after you buy it directly, and it will not be shown who bought it, as long as it is bought, the vulnerability will automatically disappear in the sale column. . "Our loophole was bought!!" A stranger sent a message.

"Haha, well done!! The Xuanwu forum is under a lot of pressure this time. Their administrators found the loophole and it was sold by us. How comfortable it is!!" There was a conspicuous skull on the speaker's desk.

Microsoft held an emergency meeting at this time. Of course, the meeting was mainly to discuss the consequences of this vulnerability. Although their operating system is the most used in the world, its security is also the worst. There is no doubt about this. .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like