Feather Emperor
Chapter 116 Hacking
Chapter 116 Hacking
In 1999, Chinese hackers began to develop unstoppably, and a group of hackers began to set up their own hacker websites.From 1999 to 2000, a large number of hacker websites such as China Hacker Alliance, China Hawk, and China Honker Alliance sprang up, bringing popular education to hackers.
Next, Chinese hackers and foreign hackers fought again and again. It was not until 2002 that this wave of hackers began to subside, and the incubation period began for several years.
Now, it is 2015, after such a long time, I did not expect that there will be another anti-Chinese incident in Indonesia.Back then, a peaceful approach was adopted to deal with the Chinese exclusion in Indonesia.But it’s different now. China’s national strength is developing rapidly. It only took a few minutes from the occurrence of the incident to the news reaching China, which is enough to show that the government’s attitude towards the incident is different. If it is still the same as before, it will definitely block all news.
Back in the chat room, Leng Bingyan was about to ask Xia Shui Wu Yue what he thought.
Frozen: Snow Elf, what are you going to do? (Snow Fairy is Minazuki's screen name)
Water: what to do?Give Indonesia some lessons, China is not easy to bully, although those Chinese have joined Indonesian nationality, but they are always of the same origin~
Leng Bingyan thinks about it, and then looks at the screen, because Minazuki's hacking skills are very high, so the prestige is naturally high, some people in the chat room heard that Minazuki wanted to teach Indonesia some lessons, and quickly raised their arms and legs to agree.
So a vigorous hacker battle is about to begin, and some hackers have already started planning...
At this time, Leng Bingyan was also itching, and she also wanted to take the opportunity to dive into the muddy water and teach Indonesia a lesson. Being a Chinese is really easy to bully!
Called out his frequently used tools, Leng Bingyan was ready.Hackers usually use some special programs. Generally, powerful hackers use programs written by themselves. For them, using other people's programs, first, they feel uncomfortable, and second, their security is not guaranteed.The "hackers" who will be caught are not powerful hackers, they are just "rookies" who can use some hacking software.
There are several ways hackers can attack:
One is "true and fake Li Kui". When logging into some sites, especially those that provide personal services, such as stocks, banks, etc., those sites often require visitors to fill in some personal information such as passwords before entering.Some "smart" hackers take advantage of this process to carefully forge a login page, rushing to appear before the real login page appears, and the real login page will appear only after you "seriously" write down your information and send it. It's late, and by this time your secret information has been stolen.For such incidents, the best solution is to take precautions before they happen, and check the server's operation logs frequently. If you find something, you must deal with it as soon as possible.
The second is "striking from the east to the west". Some hackers take advantage of the loopholes in some firewalls and cleverly set their IP requests to point to the firewall instead of the host protected by the firewall, so they can approach the firewall unimpeded. At this time, the hackers The goal has been achieved, because of this matter, they can completely feign a shot, use the firewall as a springboard, and easily drive straight in and directly reach the host.
The third is "cutting the nail on the head". Hackers who can reach this level are the real hackers. With their superb technology, they can directly obtain the IP addresses of hosts such as web servers by analyzing DNS, thereby completely removing obstacles for breaking into the enemy's camp.
The fourth is "sounding on the sidelines", spreading some special viruses through e-mail.
Leng Bingyan was among the many hackers attacking Indonesia. The target she chose to attack was the transportation system. This is quite a huge project!As we all know, the importance of such a management system can be imagined. Let alone a group of superb network security experts, even without them, it would be very difficult to break into such a system.
Leng Bingyan scanned the IP address of the traffic management server located in Jakarta. The server here manages the traffic lights of several large cities around it.Such a management system must be extremely strictly guarded, and the external network alone may be difficult to enter, or even impossible to enter.
After thinking for a long time, Leng Bingyan decided to hack into a government office network first, and then access the traffic management server through the intranet.The government office network is a little simpler than the transportation network. Leng Bingyan used his full power and used several broilers scattered around the world as springboards, and he entered one of the computers in a short time.Then install the backdoor and kernel kit, and then enter your target network through this computer.
After everything was ready, Leng Bingyan went into a closer inspection and found that the transportation system was composed of more than 48 servers, which were divided into three groups. The first group consisted of 33 servers, the second group consisted of [-] servers, and the third group It is a server of the highest level. Eighty-odd servers like this form a pyramid-like structure. If you want to obtain the highest management authority of the management system, you must intrude in groups, until the last group can be obtained. .
It started, an inexplicable smile hung on the corner of Leng Bingyan's mouth, how many times has she attacked?She can't remember clearly, but she remembers that since half a year ago, she has been wandering among the various servers in the world, attacking occasionally to enhance her attacking ability.Of course, she did not make any substantial damage after obtaining the highest authority, but left quietly.
What about this time?Is there something to be done?
"Attacking people is not enough!" You need to make good use of tools. Leng Bingyan has various tools written by himself in the computer. Now you can call them directly and step on them. You don't need to start scanning directly, PING scanning, Port scanning, security vulnerability scanning, hey hey, get active servers, open servers, of course, such a management system should not be open, right?Obtain key information such as operating system and security vulnerabilities through scanning.
After scanning, it's time to attack. Leng Bingyan thought about it for a while, what method should he use?Unknowingly, or with great fanfare?Then he patted himself on the head, he was here to make trouble, and he was afraid that others would find out?Just use violence directly!
As a result, waves of data flow rushed towards several servers through complex network channels.
"It's dangerous to design such a huge honeypot." Leng Bingyan screamed, but she was not worried at all, as if everything was under her control.Bypassing these complicated honeypot traps, I got the first set of management passwords for a total of 48 servers in a short while.
Through the switch between the first group and the second group of servers, it is only possible to enter the second group of servers if all passwords are entered correctly at the same time.
"Damn it, who invented this? It's a waste of my young master's time." Leng Bingyan flicked his fingers and typed without interest, muttering in his mouth.At this time, she didn't notice at all that the word "Master Ben" seemed inappropriate for her.
It successfully entered the second group of servers and started to attack. At this moment, in a certain computer room in Jakarta, the alarm sounded loudly.
"What, was discovered?" Leng Bingyan looked at the data flow on the screen in disbelief, "No, how could I be discovered so easily?" After scanning the IP carefully, a smile appeared again, it turned out that At this time, another IP came out.
Leng Bingyan used the method of reverse tracking, and after breaking through more than a dozen springboards, he secretly scolded that person for being so careful and used so many springboards, while looking at the IP that finally appeared, it was her!
Minazuki looked at her computer angrily. She also thought of attacking the traffic management system in Jakarta, but she didn't expect that the server there was so terrifying, even if it was a pyramid structure, there were so many honeypots.It doesn't feel like it's used to direct traffic, but more like it's used to catch hackers.After finally entering the second group of servers, they accidentally touched the honeypot and were discovered.
So Mizunazuki wiped off the footprints helplessly, quit the server over there, gave up, and found another target.
Leng Bingyan acted as a good person once and helped Shui Wuyue to close the port, making up another loophole.At this time, several IPs appeared, which should be the administrator of the server. "Okay, the game begins!"
Mobilize the tools in hand and start an overflow data attack. This attack process will not damage the server system, but it is very likely to cause damage to the server after the attack. However, Leng Bingyan doesn't care, this is what he wants.
The data flooded to those 33 servers, and the speed of the network suddenly slowed down, or the servers were processing a large amount of data, and the speed of providing services slowed down.
Several administrators started a war with Bingyan in the server. Bingyan wanted the passwords of several servers, but the administrator wanted to stop her.Fortunately, she has no psychological burden, and she doesn't care how much damage her actions will cause to the server.
"A full-scale attack!" Leng Bingyan immediately called the broilers scattered all over the world to attack the server at the same time with different IPs.The flood was out of control, and the overflowing data completely smashed countless honeypots to pieces in an instant.
The alarm sound in the computer room became more and more urgent. Leng Bingyan has obtained all the passwords of the second group of servers and is entering them in the switch. He will soon enter the third group, which is the last server. As long as he has obtained this server The highest authority, then the traffic of the entire Jakarta and its nearby big cities will be under the control of Bingyan.
However, at the last critical step, the other party's server was disconnected.
"You coward, you actually disconnected from the internet!" Leng Bingyan said angrily.But she has already succeeded. The moment she logged in to the last server just now, she inserted a small virus program into the management system.
Of course, the program size of the entire management system has not changed. This is because there are a lot of gaps in most of the codes, and many things can be stuffed in these gaps, including viruses. It can turn the original normal program into a virus carrier and parasitize it. As long as the program runs, the virus will also start at the same time.
Leng Bingyan's purpose is not to obtain the highest authority of the traffic management system and to manipulate it artificially, that would be too boring.Her purpose is very simple, to make trouble and destroy!
So, when the server over there started up again, all the traffic lights under its jurisdiction turned into red lights, and the traffic couldn't run normally...
(End of this chapter)
In 1999, Chinese hackers began to develop unstoppably, and a group of hackers began to set up their own hacker websites.From 1999 to 2000, a large number of hacker websites such as China Hacker Alliance, China Hawk, and China Honker Alliance sprang up, bringing popular education to hackers.
Next, Chinese hackers and foreign hackers fought again and again. It was not until 2002 that this wave of hackers began to subside, and the incubation period began for several years.
Now, it is 2015, after such a long time, I did not expect that there will be another anti-Chinese incident in Indonesia.Back then, a peaceful approach was adopted to deal with the Chinese exclusion in Indonesia.But it’s different now. China’s national strength is developing rapidly. It only took a few minutes from the occurrence of the incident to the news reaching China, which is enough to show that the government’s attitude towards the incident is different. If it is still the same as before, it will definitely block all news.
Back in the chat room, Leng Bingyan was about to ask Xia Shui Wu Yue what he thought.
Frozen: Snow Elf, what are you going to do? (Snow Fairy is Minazuki's screen name)
Water: what to do?Give Indonesia some lessons, China is not easy to bully, although those Chinese have joined Indonesian nationality, but they are always of the same origin~
Leng Bingyan thinks about it, and then looks at the screen, because Minazuki's hacking skills are very high, so the prestige is naturally high, some people in the chat room heard that Minazuki wanted to teach Indonesia some lessons, and quickly raised their arms and legs to agree.
So a vigorous hacker battle is about to begin, and some hackers have already started planning...
At this time, Leng Bingyan was also itching, and she also wanted to take the opportunity to dive into the muddy water and teach Indonesia a lesson. Being a Chinese is really easy to bully!
Called out his frequently used tools, Leng Bingyan was ready.Hackers usually use some special programs. Generally, powerful hackers use programs written by themselves. For them, using other people's programs, first, they feel uncomfortable, and second, their security is not guaranteed.The "hackers" who will be caught are not powerful hackers, they are just "rookies" who can use some hacking software.
There are several ways hackers can attack:
One is "true and fake Li Kui". When logging into some sites, especially those that provide personal services, such as stocks, banks, etc., those sites often require visitors to fill in some personal information such as passwords before entering.Some "smart" hackers take advantage of this process to carefully forge a login page, rushing to appear before the real login page appears, and the real login page will appear only after you "seriously" write down your information and send it. It's late, and by this time your secret information has been stolen.For such incidents, the best solution is to take precautions before they happen, and check the server's operation logs frequently. If you find something, you must deal with it as soon as possible.
The second is "striking from the east to the west". Some hackers take advantage of the loopholes in some firewalls and cleverly set their IP requests to point to the firewall instead of the host protected by the firewall, so they can approach the firewall unimpeded. At this time, the hackers The goal has been achieved, because of this matter, they can completely feign a shot, use the firewall as a springboard, and easily drive straight in and directly reach the host.
The third is "cutting the nail on the head". Hackers who can reach this level are the real hackers. With their superb technology, they can directly obtain the IP addresses of hosts such as web servers by analyzing DNS, thereby completely removing obstacles for breaking into the enemy's camp.
The fourth is "sounding on the sidelines", spreading some special viruses through e-mail.
Leng Bingyan was among the many hackers attacking Indonesia. The target she chose to attack was the transportation system. This is quite a huge project!As we all know, the importance of such a management system can be imagined. Let alone a group of superb network security experts, even without them, it would be very difficult to break into such a system.
Leng Bingyan scanned the IP address of the traffic management server located in Jakarta. The server here manages the traffic lights of several large cities around it.Such a management system must be extremely strictly guarded, and the external network alone may be difficult to enter, or even impossible to enter.
After thinking for a long time, Leng Bingyan decided to hack into a government office network first, and then access the traffic management server through the intranet.The government office network is a little simpler than the transportation network. Leng Bingyan used his full power and used several broilers scattered around the world as springboards, and he entered one of the computers in a short time.Then install the backdoor and kernel kit, and then enter your target network through this computer.
After everything was ready, Leng Bingyan went into a closer inspection and found that the transportation system was composed of more than 48 servers, which were divided into three groups. The first group consisted of 33 servers, the second group consisted of [-] servers, and the third group It is a server of the highest level. Eighty-odd servers like this form a pyramid-like structure. If you want to obtain the highest management authority of the management system, you must intrude in groups, until the last group can be obtained. .
It started, an inexplicable smile hung on the corner of Leng Bingyan's mouth, how many times has she attacked?She can't remember clearly, but she remembers that since half a year ago, she has been wandering among the various servers in the world, attacking occasionally to enhance her attacking ability.Of course, she did not make any substantial damage after obtaining the highest authority, but left quietly.
What about this time?Is there something to be done?
"Attacking people is not enough!" You need to make good use of tools. Leng Bingyan has various tools written by himself in the computer. Now you can call them directly and step on them. You don't need to start scanning directly, PING scanning, Port scanning, security vulnerability scanning, hey hey, get active servers, open servers, of course, such a management system should not be open, right?Obtain key information such as operating system and security vulnerabilities through scanning.
After scanning, it's time to attack. Leng Bingyan thought about it for a while, what method should he use?Unknowingly, or with great fanfare?Then he patted himself on the head, he was here to make trouble, and he was afraid that others would find out?Just use violence directly!
As a result, waves of data flow rushed towards several servers through complex network channels.
"It's dangerous to design such a huge honeypot." Leng Bingyan screamed, but she was not worried at all, as if everything was under her control.Bypassing these complicated honeypot traps, I got the first set of management passwords for a total of 48 servers in a short while.
Through the switch between the first group and the second group of servers, it is only possible to enter the second group of servers if all passwords are entered correctly at the same time.
"Damn it, who invented this? It's a waste of my young master's time." Leng Bingyan flicked his fingers and typed without interest, muttering in his mouth.At this time, she didn't notice at all that the word "Master Ben" seemed inappropriate for her.
It successfully entered the second group of servers and started to attack. At this moment, in a certain computer room in Jakarta, the alarm sounded loudly.
"What, was discovered?" Leng Bingyan looked at the data flow on the screen in disbelief, "No, how could I be discovered so easily?" After scanning the IP carefully, a smile appeared again, it turned out that At this time, another IP came out.
Leng Bingyan used the method of reverse tracking, and after breaking through more than a dozen springboards, he secretly scolded that person for being so careful and used so many springboards, while looking at the IP that finally appeared, it was her!
Minazuki looked at her computer angrily. She also thought of attacking the traffic management system in Jakarta, but she didn't expect that the server there was so terrifying, even if it was a pyramid structure, there were so many honeypots.It doesn't feel like it's used to direct traffic, but more like it's used to catch hackers.After finally entering the second group of servers, they accidentally touched the honeypot and were discovered.
So Mizunazuki wiped off the footprints helplessly, quit the server over there, gave up, and found another target.
Leng Bingyan acted as a good person once and helped Shui Wuyue to close the port, making up another loophole.At this time, several IPs appeared, which should be the administrator of the server. "Okay, the game begins!"
Mobilize the tools in hand and start an overflow data attack. This attack process will not damage the server system, but it is very likely to cause damage to the server after the attack. However, Leng Bingyan doesn't care, this is what he wants.
The data flooded to those 33 servers, and the speed of the network suddenly slowed down, or the servers were processing a large amount of data, and the speed of providing services slowed down.
Several administrators started a war with Bingyan in the server. Bingyan wanted the passwords of several servers, but the administrator wanted to stop her.Fortunately, she has no psychological burden, and she doesn't care how much damage her actions will cause to the server.
"A full-scale attack!" Leng Bingyan immediately called the broilers scattered all over the world to attack the server at the same time with different IPs.The flood was out of control, and the overflowing data completely smashed countless honeypots to pieces in an instant.
The alarm sound in the computer room became more and more urgent. Leng Bingyan has obtained all the passwords of the second group of servers and is entering them in the switch. He will soon enter the third group, which is the last server. As long as he has obtained this server The highest authority, then the traffic of the entire Jakarta and its nearby big cities will be under the control of Bingyan.
However, at the last critical step, the other party's server was disconnected.
"You coward, you actually disconnected from the internet!" Leng Bingyan said angrily.But she has already succeeded. The moment she logged in to the last server just now, she inserted a small virus program into the management system.
Of course, the program size of the entire management system has not changed. This is because there are a lot of gaps in most of the codes, and many things can be stuffed in these gaps, including viruses. It can turn the original normal program into a virus carrier and parasitize it. As long as the program runs, the virus will also start at the same time.
Leng Bingyan's purpose is not to obtain the highest authority of the traffic management system and to manipulate it artificially, that would be too boring.Her purpose is very simple, to make trouble and destroy!
So, when the server over there started up again, all the traffic lights under its jurisdiction turned into red lights, and the traffic couldn't run normally...
(End of this chapter)
You'll Also Like
-
I was assassinated by the reborn at the beginning, and I became a god on the spot
Chapter 483 14 hours ago -
The End of the World: I Have a House of Beautiful Tenants
Chapter 253 14 hours ago -
Naruto: I am invincible after simplifying the basic training
Chapter 152 14 hours ago -
After being favored by the vampire school beauty, I was numb
Chapter 704 14 hours ago -
After rebirth, the young lady chased me and begged for forgiveness
Chapter 188 14 hours ago -
What’s the matter? Can’t a love rival become your wife?
Chapter 323 1 days ago -
Yu-Gi-Oh, but I'm the only one playing with the Pendulum?
Chapter 48 1 days ago -
Villain: The Forbidden Zone Emperor's Son! Sleeping for Ten Thousand Years to Break the Divine
Chapter 60 1 days ago -
Honkai Impact 3: Yulandel's Beloved Brother
Chapter 224 1 days ago -
Naruto: I am in Uchiha, I can extract entries
Chapter 151 1 days ago