Hacking Special Armed Forces System
Chapter 63
The FBI and the FBI are a special department in the United States. However, it is this special department that has captured many top hackers. The myth of London is an example. Gary has been squatting in it for five years and was finally released at the end of this year.
The FBI has a "good reputation" in the hacker community. It is not only the hell of hackers, but also the terminator of hackers.
The FBI's internal system has also been visited by bold hackers, but the result is either caught or inexplicably missing. Few people can completely break in and escape safely. A few years ago, bolder hackers attacked the FBI's official website in order to prove their strength. However, hackers in recent years chose to attack the White House in the United States and the Yasukuni Shrine in Japan or a more famous hacker organization.
The old bird in the circle knows why this phenomenon occurs. It is entirely because the strength of the FBI has suddenly increased a lot in recent years. Some old birds speculate that the FBI has recruited many top hackers, security experts and tracking experts.
Yang Tian is not unaware of this situation, but he still chose to break into the FBI's internal system, not for anything else, just to find the information of his brother. After all, the FBI is a database and information base for hackers.
Breaking into the FBI requires not only strong strength, but also experts in all aspects. It is not easy to break into the internal system of the FBI. Yang Tian and other four people conducted a series of discussions on this action. This time, the danger is undoubtedly the greatest for any of the four, so this action must have perfect plan and cooperation.
The clock struck at 12 o'clock at night.
At the ant Dynasty headquarters, the red ant's hands kept dancing on the keyboard, and the data flow on the display screen kept turning. The other party had attacked for more than an hour, and the source attack point of the other party had not been found yet. At this time, the red ant was a little anxious, but being anxious was not the way. Slowly let his mood recover, and then shouted to the microphone.
"Xiao Lei, report the details!" Red ant uses a local call tool, which can't be monitored on the network at all.
"Now all our five main servers are attacked, and one web server is also attacked at the same time, but the traffic of main server 2 is relatively large, and the other four main servers are relatively scattered attacks!"
Xiao Lei is the leader of the analysis team in the organization. He is good at analyzing all the dynamics of the network. The red ant frowned and thought for a while, and then ordered: "open five fortress machines from the computer room to access the web server, and then make every effort to defend the No. 2 main server. If there are special circumstances, report immediately!"
As soon as the red ant gave the order, there came the words of Pluto.
"The other party's attack on the 2 main server began to become fierce. Red ant man, this is a good opportunity to access the 2 main server. We will release the other party's attack, so that we will have the opportunity to track the other party's attack data flow."
The red ant hasn't responded yet. Just about to reply, it found that the data flow monitoring No. 2 main server on the display suddenly changed greatly!
If the attack is released now, I'm afraid it's too late. The red ant doesn't dare to neglect it and hurriedly urges Xiao Lei to start five fortress machines.
After 30, the fortress machine successfully connected to the No. 2 main server.
The other side's attack was relatively slow. After the fortress machine was successfully connected, the red ant stared at the display screen, which showed the security degree of the five main servers and the number of checkpoints of the web server.
"Red, the other party's attack suddenly stopped!" The words of the yellow ant came.
"Strange!" The red ant whispered, and then came the emergency voice of Pluto, "no! Connect to the No. 2 main server immediately!"
As soon as the voice fell, the five main servers monitored on the display screen suddenly changed, and the security level of No. 2 main server suddenly fell to the 4-star index (10 stars are the safest).
The red ant scolded angrily, "shit! Release the attack!" With that, he quickly called out the tool to access the No. 2 main server, and then released the other party's attack.
While releasing the attack, Pluto and other six color ants take advantage of the chaos to track the data flow from the attack. Releasing the attack is entirely at the expense of master server 2, that is, if master server 2 is disconnected, the other party must transfer. However, the red ant intercepts the data flow when the other party escapes.
Suddenly, the security level of No. 2 main server on the display fell to 1-star index!
Watching his main server destroyed, the red ant was extremely hard to feel, but fortunately, he had already transferred the data on the server. If he sacrificed a main server and set it up again, it is not only a matter of time, but also a matter of modulation.
Heartache is heartache. We have to take action. The red ant faces up and accesses the No. 2 main server. As soon as it is accessed, the security level of the No. 2 main server completely becomes blank.
At this moment, main server 2 has been destroyed by the other party.
"OK, catch a fictitious IP of the other party!" Then the Pluto sent the IP to the red ant.
At this time, the words of the yellow ant came, "Pluto is worthy of being Pluto. I'm chasing each other's 11 data streams, and I can trace another fake IP!"
Generally, the pursuit of an attacker starts from the subtle, catching the attack data flow of the other party, so as to trace the virtual IP, then trace the attack source point of the other party, and finally the virtual IP and real IP of the other party!
This is a difficult process, which also leads to easy attack and difficult pursuit. Of course, there are pursuit experts and attack experts. Their techniques are different, but they are inseparable from this process.
Since they caught a fake IP, the red ant quickly entered it for pursuit. At the same time, Pluto and the six color ant also began to track. The angry red ant forgot that the attack did not stop.
In Shanghai, mu wanqiu and Xi Yue have been tracking the attacker who broke into the periphery. At this time, with the tracking, they inexplicably entered the battlefield of the ant Dynasty.
Mu wanqiu is proficient in tracking technology. At this time, he has killed countless fake IPS of each other. On the battlefield, two people pursue and one person runs away. Suddenly, Xi Yue exclaimed, "someone attacked me!"
"What?" Mu wanqiu stared at the display screen and danced his hands quickly.
Xiyue tilted her head sideways and said to the wheat: "sister Xue, sister Xue, accept the target's virtual IP!" With that, she sent the intercepted virtual IP to sister Xue.
After a while, sister Xue's voice came from the stereo: "the other party wants to escape. Xiao Wan, you try your best to track! This time, the ant Dynasty is not attacked by one person. Now the ant Dynasty is still attacked. You continue to track the person you found just now. A Yue, I'll give you another task immediately and assist Xiao Wan in tracking until you find this person!!"
Xiyue and mu wanqiu nodded and responded. Mu wanqiu tried his best to track. After more than half an hour, the other party had left the virtual battlefield of the ant Dynasty, and mu wanqiu also left.
The war went into chaos at once!
The FBI has a "good reputation" in the hacker community. It is not only the hell of hackers, but also the terminator of hackers.
The FBI's internal system has also been visited by bold hackers, but the result is either caught or inexplicably missing. Few people can completely break in and escape safely. A few years ago, bolder hackers attacked the FBI's official website in order to prove their strength. However, hackers in recent years chose to attack the White House in the United States and the Yasukuni Shrine in Japan or a more famous hacker organization.
The old bird in the circle knows why this phenomenon occurs. It is entirely because the strength of the FBI has suddenly increased a lot in recent years. Some old birds speculate that the FBI has recruited many top hackers, security experts and tracking experts.
Yang Tian is not unaware of this situation, but he still chose to break into the FBI's internal system, not for anything else, just to find the information of his brother. After all, the FBI is a database and information base for hackers.
Breaking into the FBI requires not only strong strength, but also experts in all aspects. It is not easy to break into the internal system of the FBI. Yang Tian and other four people conducted a series of discussions on this action. This time, the danger is undoubtedly the greatest for any of the four, so this action must have perfect plan and cooperation.
The clock struck at 12 o'clock at night.
At the ant Dynasty headquarters, the red ant's hands kept dancing on the keyboard, and the data flow on the display screen kept turning. The other party had attacked for more than an hour, and the source attack point of the other party had not been found yet. At this time, the red ant was a little anxious, but being anxious was not the way. Slowly let his mood recover, and then shouted to the microphone.
"Xiao Lei, report the details!" Red ant uses a local call tool, which can't be monitored on the network at all.
"Now all our five main servers are attacked, and one web server is also attacked at the same time, but the traffic of main server 2 is relatively large, and the other four main servers are relatively scattered attacks!"
Xiao Lei is the leader of the analysis team in the organization. He is good at analyzing all the dynamics of the network. The red ant frowned and thought for a while, and then ordered: "open five fortress machines from the computer room to access the web server, and then make every effort to defend the No. 2 main server. If there are special circumstances, report immediately!"
As soon as the red ant gave the order, there came the words of Pluto.
"The other party's attack on the 2 main server began to become fierce. Red ant man, this is a good opportunity to access the 2 main server. We will release the other party's attack, so that we will have the opportunity to track the other party's attack data flow."
The red ant hasn't responded yet. Just about to reply, it found that the data flow monitoring No. 2 main server on the display suddenly changed greatly!
If the attack is released now, I'm afraid it's too late. The red ant doesn't dare to neglect it and hurriedly urges Xiao Lei to start five fortress machines.
After 30, the fortress machine successfully connected to the No. 2 main server.
The other side's attack was relatively slow. After the fortress machine was successfully connected, the red ant stared at the display screen, which showed the security degree of the five main servers and the number of checkpoints of the web server.
"Red, the other party's attack suddenly stopped!" The words of the yellow ant came.
"Strange!" The red ant whispered, and then came the emergency voice of Pluto, "no! Connect to the No. 2 main server immediately!"
As soon as the voice fell, the five main servers monitored on the display screen suddenly changed, and the security level of No. 2 main server suddenly fell to the 4-star index (10 stars are the safest).
The red ant scolded angrily, "shit! Release the attack!" With that, he quickly called out the tool to access the No. 2 main server, and then released the other party's attack.
While releasing the attack, Pluto and other six color ants take advantage of the chaos to track the data flow from the attack. Releasing the attack is entirely at the expense of master server 2, that is, if master server 2 is disconnected, the other party must transfer. However, the red ant intercepts the data flow when the other party escapes.
Suddenly, the security level of No. 2 main server on the display fell to 1-star index!
Watching his main server destroyed, the red ant was extremely hard to feel, but fortunately, he had already transferred the data on the server. If he sacrificed a main server and set it up again, it is not only a matter of time, but also a matter of modulation.
Heartache is heartache. We have to take action. The red ant faces up and accesses the No. 2 main server. As soon as it is accessed, the security level of the No. 2 main server completely becomes blank.
At this moment, main server 2 has been destroyed by the other party.
"OK, catch a fictitious IP of the other party!" Then the Pluto sent the IP to the red ant.
At this time, the words of the yellow ant came, "Pluto is worthy of being Pluto. I'm chasing each other's 11 data streams, and I can trace another fake IP!"
Generally, the pursuit of an attacker starts from the subtle, catching the attack data flow of the other party, so as to trace the virtual IP, then trace the attack source point of the other party, and finally the virtual IP and real IP of the other party!
This is a difficult process, which also leads to easy attack and difficult pursuit. Of course, there are pursuit experts and attack experts. Their techniques are different, but they are inseparable from this process.
Since they caught a fake IP, the red ant quickly entered it for pursuit. At the same time, Pluto and the six color ant also began to track. The angry red ant forgot that the attack did not stop.
In Shanghai, mu wanqiu and Xi Yue have been tracking the attacker who broke into the periphery. At this time, with the tracking, they inexplicably entered the battlefield of the ant Dynasty.
Mu wanqiu is proficient in tracking technology. At this time, he has killed countless fake IPS of each other. On the battlefield, two people pursue and one person runs away. Suddenly, Xi Yue exclaimed, "someone attacked me!"
"What?" Mu wanqiu stared at the display screen and danced his hands quickly.
Xiyue tilted her head sideways and said to the wheat: "sister Xue, sister Xue, accept the target's virtual IP!" With that, she sent the intercepted virtual IP to sister Xue.
After a while, sister Xue's voice came from the stereo: "the other party wants to escape. Xiao Wan, you try your best to track! This time, the ant Dynasty is not attacked by one person. Now the ant Dynasty is still attacked. You continue to track the person you found just now. A Yue, I'll give you another task immediately and assist Xiao Wan in tracking until you find this person!!"
Xiyue and mu wanqiu nodded and responded. Mu wanqiu tried his best to track. After more than half an hour, the other party had left the virtual battlefield of the ant Dynasty, and mu wanqiu also left.
The war went into chaos at once!
You'll Also Like
-
The Dragon That Devoured the World: Begins with Rebirth as a Black Dragon
Chapter 326 9 hours ago -
The Saint Clan is too weak? What does it have to do with my Eternal Imperial Clan?
Chapter 66 9 hours ago -
Uchiha clan extermination night, start as Kanna-chan
Chapter 96 9 hours ago -
I'm just acting like a pervert, I'm actually a good prisoner
Chapter 233 9 hours ago -
Xingtie: My mission master joins the chat group
Chapter 288 9 hours ago -
Xingtie: I, who rub the armor with my hands, ascend to the reincarnation
Chapter 201 9 hours ago -
Martial Arts Immortality: Awakening the Three Colors of Domineering at the Beginning
Chapter 421 9 hours ago -
Transmigrating into a book: Green tea, I want the vicious female supporting role!
Chapter 406 9 hours ago -
Detective: Conan calls me brother-in-law?
Chapter 130 9 hours ago -
Football: The king of midfield, Guardiola is crying with envy
Chapter 131 9 hours ago