Now, Su Yang needs to think about how to hack into a military armed helicopter.

First, let's see if there are any good things in the system mall.

With this in mind, Su Yang opened the system mall and entered the search keyword: "UH-1Y 'Venom' general-purpose helicopter".

"Searching..."

Two seconds later, the search results came out:

"UH-1Y 'Venom' general-purpose helicopter, produced by Bell Helicopter Company.

Autonomic Logistics Information System (ALIS) vulnerability, exchange for 5 million points.

Joint Reprogramming Enterprise (JRE) vulnerability, exchange for 5 million points.

Network control system module vulnerability, exchange for 5 million points.

FLIR reconnaissance system module vulnerability, exchange for 5 million points

..."

Su Yang was immediately refreshed.

The system actually searched out hundreds of vulnerabilities in the UH-1Y helicopter.

"A military helicopter actually has so many vulnerabilities?" Su Yang muttered in surprise.

However, thinking about it carefully, it is not surprising.

He once saw someone selling the source code of the F-15 fighter on the dark web, which had more than 40 million lines of code.

The complexity of a multi-purpose armed helicopter is no less than that of a fighter, and the code volume is estimated to be tens of millions of lines. It is normal for vulnerabilities to appear in so many codes.

As long as there is a loophole, there is a possibility of invasion.

"Ding!"

At this time, a message sounded in the Red Hacker Base group.

Su Yang clicked and opened the chat group of the Red Hacker Base.

The group was very lively, with various messages flooding the screen.

In the past week, the members of the Red Hacker Base have collected a lot of intelligence about the Neon Exercise, some of which even Su Yang has not collected.

"Hello, Clown, I am Brother Yuan from the Red Hacker Base, inviting you to join the internal group: 1256879****."

A private chat message caught Su Yang's attention.

Brother Yuan, this name is not unfamiliar to Su Yang.

Brother Yuan is a senior administrator of the Red Hacker Base with a very high technical level.

Enter the group number and apply to join.

After a few seconds, the application was approved and Su Yang entered an internal group of the Red Hacker Base.

There are only 268 members in this group, and they are undoubtedly the elites of the Red Hacker Base.

"Welcome, Clown!"

"Welcome, Boss!"

"It's Boss 'Clown'! I've used the scanning tool you wrote before, it's very useful, and I'm still using it now!"

As soon as he entered the group, someone recognized Su Yang.

Su Yang had posted a scanning tool on the Red Hacker Base website, which was very practical and loved by some hackers, so his ID "Clown" was also well-known in the Red Hacker Base.

"I'm a newcomer, please take care of me." Su Yang said modestly.

He carefully observed the chat content in the group.

The members of the group were sharing the intelligence they had collected about the Neon Exercise, some of which was obtained through special channels and was very valuable.

Others shared the vulnerabilities and backdoors of Neon's major mainstream websites, which was also very useful to Su Yang.

Su Yang also shared an "overflow vulnerability" he found on the official website of the Neon Coast Guard with the group members.

Next, while Su Yang was paying attention to the information in the group, he exchanged the "ALIS vulnerability" from the system mall.

ALIS, the full name of which is Autonomic Logistics Information System, is a technical service system provided by Bell Helicopter for the Venom helicopter. It can track the flight data, radar information and other data of the helicopter in real time and send it to the pilot to help the pilot understand combat indicators, location information and formulate attack strategies.

Hackers can provide pilots with wrong data by attacking the ALIS system, thereby disrupting their actions. In serious cases, it can even cause the aircraft to crash and people to die.

It cost Su Yang 5 million points to redeem this vulnerability.

Fortunately, he had broadcast live several times in the past week and accumulated 6 million total points, which was enough for redemption.

OK, the attack tool is available.

Su Yang only needs to find a way to implant this intrusion tool into Bell Helicopter's database.

Database center.

This is not an easy task.

Bell is an arms company. Its server database center has a very high network security level. It is obvious that it is very difficult to invade.

Don't worry, plan carefully first.

Su Yang continued to collect all useful information in the group and on the Internet, focusing on collecting intelligence on Bell.

The calendar turned pages.

Two days passed in a blink of an eye.

On this day, night fell in Longguo, while it was daytime in the United States across the Pacific Ocean.

The headquarters building of Bell Helicopter Company is located in Fort Worth, Texas, USA.

Eight o'clock in the morning.

A black Chevrolet sedan slowly drove to the entrance of the building.

At the entrance, a security guard wearing sunglasses, with his hand on the gun on his waist, looked at the passing vehicles vigilantly.

The Chevrolet sedan stopped at the entrance, the window slowly lowered, and a blond, blue-eyed white man stuck his head out and showed his work permit to the security guard.

Name: James

Position: Senior Engineer

"Ding!"

The security guard held an instrument to scan the work permit. After confirming that it was correct, the railing slowly rose and the Chevrolet sedan drove into the company compound.

A few minutes later, James, who had changed into a white antistatic suit, appeared in front of a computer room.

He aimed his eyes at the scanner beside the door for retinal verification.

"Verification passed."

The door opened automatically and James walked in.

In the computer room, rows of large servers made a low humming sound, and the indicator lights kept flashing, like tireless behemoths, silently processing massive amounts of data.

This is the global data center of Bell Helicopter Company, which stores the technical data and customer information of the company's helicopters sold worldwide.

James inspected the computer room and then walked straight to an office deep in the room.

He walked into the office, took off his anti-static suit, sat down at his desk, and made himself a cup of coffee.

He turned on the computer and waited for it to start up. He took out a USB flash drive from his pocket and plugged it into the computer.

After entering a long and complex password, the computer desktop popped up.

James skillfully opened a monitoring program.

This program can monitor the operating status of all servers in the computer room in real time. Once an abnormality occurs, an alarm will be issued immediately.

"Beep!"

At this time, James's phone vibrated.

He took out his phone and saw a message from a beautiful woman:

"Hi, tough guy!"

James' mouth corners slightly raised, and he replied, "Pretty girl."

"【Flying kiss】" The beautiful woman sent a flying kiss expression.

"【Muscle】" James also sent a photo of his muscles to show off his strength to the beautiful woman.

The camera switched to Longguo, thousands of miles away.

Su Yang sat in front of the computer, tapping the keyboard with his fingers: "Dear, I like your blonde hair. 【Love】".

That's right, the "beauty" chatting with James was Su Yang.

Two days ago, Su Yang hacked into James's phone and found that he often hooked up with beauties on a "Whats" social software, so Su Yang disguised herself as a sexy and hot beauty and took the initiative to contact him.

As the saying goes, a hero can't resist the temptation of beauty.

Faced with Su Yang's "beauty trap", James quickly fell. In less than two days, the two chatted passionately online, like a couple in love.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like