Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 137 Hacker War (3)

Previous page        Return to Catalog        Next page

    Chapter 137 Hacker War (3)

    China Telecom is one of the largest network service providers in China. It and China Unicom control all network communications in the country. Whether it is a foreign hacker or a domestic hacker, everyone must use the Internet to invade others.  , without a network, no matter how awesome the hacker is, he can't do it.

    Therefore, if these people want to hack into domestic web pages or servers, they must do so through the communication network. Zhang Yang directly uses his own software to search for telecommunications servers on the network.  Telecom's servers are not the same as ordinary servers. Strictly speaking, it is more like a network distribution service. Once there is a problem with Telecom's server segment, all networks within its jurisdiction will be interrupted.

    Zhang Yang¡¯s first victim was no one else, but domestic and foreign submarine optical cables!  There are only three places for connecting domestic and foreign optical cables. The first place is Qingdao, the second place is H City, and the third place is Shantou!  Three optical cable interfaces and a total of six major submarine optical cables allow domestic and international Internet connections to be closely connected.

    Where the three submarine optical cables go ashore, there are large data centers that allocate the network, and the network addresses of these three data centers are top secrets. Even God may not know the IP addresses of these three data centers.  But it's not difficult for Zhang Yang to find it.

    Network service providers such as Telecom and China Unicom are nothing more than operating a large local area network in China. Telecom has large, medium and small server rooms in every city in the country, which are used as distribution networks. The location of the Telecom server room in City H is  very clear.

    After finding Telecom's server room in City H, Zhang Yang directly opened the back door through the infected bugs and entered Telecom's computer room. After obtaining the highest control authority of the computer room, he looked at the infected bugs that had spread throughout the computer room and paused.  After that, Zhang Yang hit Enter hard!

    Zhang Yang has always turned off the active infection propagation method of the infected bug. When he wants to hack which server, he can just specify the infection. But now Zhang Yang has directly activated all the functions of the infected bug in the telecommunications server!

    What is the fastest way for the virus to spread?  It's not like hanging a horse on some portal website. Although it can also spread very quickly, the virus spreads the fastest and the most direct way is what Zhang Yang is doing now, hacking the telecommunications server.  Your computer virus can break through their firewall, then it will first infect all telecom servers across the country through the telecom server's internal private network, and then all data exchanged through the telecom server will be infected with the virus!

    Looking at the number of infected bugs on the computer screen, in just ten minutes, the number of infected bugs increased almost at a geometric rate. In ten minutes, the number of infected bugs increased directly from zero to more than 10 million.  Now it is no exaggeration to say that these more than 10 million computers or servers are almost defenseless to Zhang Yang!  It doesn't take much effort to hack any computer he wants.

    After activating it, Zhang Yang copied his data detection software into Telecom's data center computer room. Through the detection software, Zhang Yang directly retrieved all data traffic going abroad. All data traffic going abroad must be accessed through optical cables.  The centralized place is where the server is located.

    With the previous server as a guarantee, the server where the submarine optical cable is located quickly fell into Zhang Yang's hands.  It took more than half an hour to get all the servers for the three domestic submarine optical cable entrances. Zhang Yang immediately started placing honeypots in these three servers.

    "I said, where did gscsd go? Why wasn't he found?" In the chat room, Shenyue Sha asked with some confusion.  He and Orange Nianhua did not join the defense battle of the National Computer Emergency Response Center server. The two of them wandered around the periphery. The other party's actions were obviously organized and premeditated.

    "I don't know. Could it be that it went abroad?" Lan Mo thought for a while and said.

    "Probably not. These hackers don't know which country they are from. How can they get abroad? Could it be that he can hack all foreign countries?" Shenyue Sha was a little unsure.

    "Don't worry about it. The whole country is in chaos now. He should have his own ideas about what he does. Xiao Yueyue, besides these few people, what about other places?" God's voice came at the right time.

    "Don't call me Xiao Yueyue. The situation is not good. The servers of most portal websites are under maintenance. I don't know if their servers have been damaged. And more importantly, foreign hackers are responsible for such a big thing.  I already know it, but now there are many small fish and shrimps coming in to fish in troubled waters." Shenyue Sha's tone was quite depressed.

    Although the hacker group usually fights on its own, it alwaysOnce a situation like this occurs, the hacker community is also quite united. The most important thing is that most hackers are otakus. People who are otakus have some extreme ideas and some national complexes or angry youth complexes. It is easy to  Being aroused by others.

    It's like these hackers came in and hacked most of the domestic portals, causing domestic hackers to join forces to fight against them. Although most of them are rookies, rookies are also useful, although it is unlikely to be useful to them.  Cause trouble, but this kind of harassment is very annoying.

    But at the same time, such a big struggle between hackers can easily cause some domestic hackers to go abroad to cause trouble, and the scope of the struggle will rapidly expand. This is how the Sino-US hacker war started.  .

    "Don't worry about them, they can't make much trouble. You two should pay attention to those experts, and if you can contact the foreign experts, let them know in advance. It's best not to come in, otherwise, don't blame us when the time comes.  Go find trouble with them." God was very serious when he said this, and no one in the chat room refuted it.

    Although Zhang Yang didn't turn on the microphone, he didn't turn off the sound. Zhang Yang naturally heard the conversation between God and the others, but he didn't have time to reply to these people. He looked at the number of viruses infected by the infected bugs and found that it was close to 20 million units.  You know, it's late at night, and the infection bugs in these computers have definitely spread abroad.

    However, judging from the current situation, no one should have discovered the existence of the infection bug. All three servers responsible for submarine optical cables were filled with countless honeypots, and then Zhang Yang copied the tracking virus in his firewall.  Let it completely infect these three data centers. When these hackers retreat, the virus will bite them directly. By then, it will be enough for them to drink a pot.

    After finishing these things, a clear "ding dong" sound suddenly sounded. Zhang Yang was stunned for a moment, and there was a burst of ecstasy on his face. This kind of sound only occurs when the assassin virus has been thoroughly analyzed and found.  Only then will its variation patterns appear.

    Zhang Yang quickly connected to Satellite 1 from his laptop. Sure enough, the results of the analysis had come out. Zhang Yang looked at it and found that this variation pattern was indeed very awesome. It should be based on a mathematical formula, but it is still possible.  It can be deciphered, but for a virus like Zhang Yang, unless you have a thorough understanding of biology, it will be an extremely huge amount of data if you rely on computer calculations.

    How complex is the genetic map of an organism?  After getting the virus, Zhang Yang began to quickly transform the virus. In the same way as the assassin virus he killed for the first time, Zhang Yang made two. One was specifically designed to kill this virus, and the other was based on the principle of infecting insects.  An anti-virus virus adapted to hunt down assassin viruses on the Internet and delete itself.

    The second type is that Zhang Yang will not give it to anyone. The first type, after Zhang Yang made it and encrypted it, he sent it directly to Gao Gang. After that, Zhang Yang added a sentence: If your company makes more than a thousand profits because of this special killing.  If it¡¯s $10,000, I want two-thirds of the income.

    After sending it, Zhang Yang didn¡¯t care what Gao Gang thought. This sentence was more of a request than a discussion.  After sending out the anti-virus virus, Zhang Yang directly copied the second modified virus to the telecommunications server. After copying, after setting it up for two hours, the anti-virus virus would delete itself. Only then did Zhang Yang completely  activated it.

    Seeing the virus spreading out at the same speed, Zhang Yang was relieved. It was impossible for this virus to remove all viruses on the Internet. Even domestic viruses might not be able to completely remove it because it was tracking the assassin.  After the virus, there will be a search process.

    The speed is relatively slow, but 2 hours is enough to kill more than 80% of assassin viruses, and the assassin viruses of important and large websites will definitely be cleaned up.

    "gscsd, did you create a special kill of the assassin virus? The same way as last time?" Suddenly, God's voice rang in the chat room.

    "Yes!" Zhang Yang turned on the microphone and replied. God must have his own detection method, so he noticed that the number of assassin viruses was decreasing rapidly.

    "Cow!" Shenyue Sha replied with one word.

    "" Zhang Yang was about to say something when suddenly he screamed and hurriedly opened the control panel of the infected bug.

    "What's wrong? What happened?" The people in the chat room were stunned for a moment. When they heard Zhang Yang's cry just now, they knew that something big had happened, and everyone couldn't wait to ask.  Including god, but they didn't wait for Zhang Yang's answer. If Zhang Yang wasn't still in the chat room, they all thought Zhang Yang wasIt's online.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report