Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume 1 Chapter 325: Comparing myself with myself (Part 1)

Previous page        Return to Catalog        Next page

    Chapter 325: Comparing myself with myself (Part 1)

    Chapter 325: Comparing myself with myself (Part 1)

    The action of gscsd was within everyone¡¯s expectations, but the location of the action was beyond everyone¡¯s expectations.  Moreover, the ferocity of the attack made all the hackers who watched gscsd feel ashamed. Is this a battle created by one person?  Are you sure this is not an organization?

    The attack mode of infection bugs is different from that of ordinary hackers. It should be said that infection bugs only make optimal choices to achieve their goals and do not care about which method is better.  Because Zhang Yang gave it some rights of independent choice, the infected bug instantly assigned all targets to the four official servers at the same time, and the first one used was DDoS attack. After all, for humans, you have to direct the DDoS attack.  Numerous broilers, enter the order.

    ????????????? But for computers, especially now, although the performance of infected bugs cannot be maximized, only this part of the performance is enough.  While using DDoS to attack a computer, the infected bug also threw a lot of virus bombs directly to several other official websites. These virus bombs contained variants of various computer viruses, including the infected bug.  A sub-virus derived from itself.

    When the infection bug attacks, its database records the reactions of the other party's system and firewall at the same time, and then performs centralized calculations to analyze more effective and feasible methods.  The infection bug ran according to the program, but the hackers watching the battle were covered in cold sweat. If these attacks did not come from the same IP, these people would have thought that this was a tight organization rather than the action of one person.  .

    Although such a huge attack flow is unlikely to pose a big threat to the firewall, the technical personnel responsible for maintaining the official website servers of the three major intelligence agencies were immediately in a hurry, and various pop-ups kept popping up in front of the computer screen.  command, once the operation is a little slower, maybe this command will cause the entire system and firewall to collapse.

    Naturally, the technical staff of such an intelligence organization cannot just be passively beaten, but the simultaneous attacks launched by the infected bugs have temporarily left the technical staff of several major intelligence organizations without the strength to conduct counter-tracking. Currently, they can only withstand the attacks of the infected bugs.  The Internet in the United States is in turmoil, and the domestic Internet is also unsettled.

    Zhang Yang was staring at the computer screen nervously at this moment, because all the resources of the infected bugs had been mobilized to attack. Zhang Yang naturally could not use the infected bugs here, and he could only defend it himself.  However, with the Brood in hand, Zhang Yang blocked almost all of the opponent's attacks.

    Many hackers at home and abroad who were watching the battle had extremely strange expressions on their faces. Everyone looked at their computer screens dumbfounded, watching the official website of the Ministry of Foreign Affairs still defended as impregnable despite such a terrifying flow of attacks.  Like an iron bucket.

    Where did this l come from?  !  This thought was almost in everyone's mind with shock on their faces!  It's so weird. A gscsd suddenly appeared before, and now an l appears. Could it be that the masters in this world are so worthless?  Look at what these two people did. One person single-handedly took on the three major intelligence organizations in the United States and a technical staff from the Department of Defense. Although the technical staff responsible for these four official sites were not the real elites of the other party at all,  But the situation is so complicated. Who in the world would dare to jump out of the world who can do this?

    No!  Only gscsd!  There are still a few people who are similar in strength to gscsd, but there are no people who are so blatant, upright and so dark.  The power of the three major U.S. intelligence agencies joining forces even makes many hackers shudder, but gscsd did just that!

    Seeing this scene, the Chinese hackers were so excited that they began to tremble. Since the gscsd master has already targeted the three major intelligence agencies, we can't be soft, can we?  The intelligence department was gone, but there were many websites of various government departments. These hackers immediately pounced on them like a pack of wolves.

    ????????????? This pervert in China is using his own strength to withstand the attack of many well-coordinated hacker masters, and the defense is still impregnable. At least for now, the attackers have no way to invade the official website of the Ministry of Foreign Affairs even one step!  The hackers who were planning to stay in the country to help were dumbfounded and fascinated. When would they be able to act like a great god in front of them, just like the legendary Changshan Zhao Zilong, killing every one in and out of the enemy group!

    It is even more powerful to defeat the enemy, and the enemy attacks invisible, which is too good.  These hackers were sitting in front of the computer and their faces were red with excitement, but Zhang Yang's face was extremely serious and there was no time to get excited.  His scanner has been paying attention to the opponent's several data streams.

    If these people are really ghost troops, then if they cannot attack for a long time, they will definitely be divided.A large number of forces have been deployed to hack other government websites, and Zhang Yang's honeypots deployed at several telecommunications network nodes have sent back messages, indicating that many American hackers have also entered the country.

    You don¡¯t need to think about it to know that they are attracted by infected insects. The infected insects attack there. American hackers have different ideas from domestic hackers. Some domestic hackers will come to help defend, but American hackers don¡¯t even think about it.  , and ran directly to attack happily.

    ??It¡¯s so boring to defend, how fun is it for everyone to mess around?  So these American hackers excitedly came to do it as soon as they discussed it. After all, we are also the boss, right?  Just like the United States considers itself the boss in the world, American hackers also have a sense of superiority and believe that their technology is the best in the world. In their eyes, China is just a country that was a computer blind spot a few years ago.  , in their eyes, in a few years, even if China's computers develop further, where can they develop?

    In fact, if you just defend a website, it¡¯s not a big deal. After all, the self-defense function of the Brood can already defend the system without reservation.  Even the infected bugs can't do anything to the brood. No matter how awesome these hackers are, they are at most the same level as the infected bugs, and they still can't do anything to the brood.

    And what about the Brood? Once the Brood is used for complete defense, it is actually very perverted. Even if it is a garbage system that does not repair even one loophole, after installing the Brood, it will be like stripping a beautiful woman naked.  , but found that the beauty was wearing nothing else, but she was wearing a pair of super cool alloy pants underneath. You could look at her, touch her, and tease her, but you couldn't do anything.

    I don¡¯t know if it is because of gscsd. After these American hackers came to China, they did not attack the portals that hackers usually flock to. Instead, they targeted domestic government websites.  But Zhang Yang is mainly monitoring the traffic on the network now.

    Just now, normal access to the official websites of the Ministry of Foreign Affairs and the State Council was restored, but these American hackers immediately targeted these two websites again. As soon as these hackers took action, Zhang Yang knew immediately that these two websites might not work again.  He was about to lose his position, so after Zhang Yang paused for a moment, without even hesitating, he directly exploited the loopholes in the systems of these two websites to directly hack into these two websites, and then copied two more nests and entered into these two websites.  server.

    At the same time, the mother nest is turned on the centralized control mode. The so-called centralized control mode is actually like a population of ants. The queen can control all the ants, and then each ant is a separate clone, showing a kind of collective wisdom.  The centralized control mode of the Brood is similar to this.

    In fact, the functions of each clone of these broods are the same, but during centralized control, if Zhang Yang issues an order, the sub-systems of these broods will receive it, and then they will exchange information with each other. For example, if Zhang Yang gives an order to brood clone A,  An instruction to deny all illegal access requests.  Then mother nests b and c will also receive this information, and will exchange information with mother nest a. Once b and c find that they have the same illegal access request as mother nest a, mother nests b and c will  Immediately execute the rejection automatically without having to issue the command again.

    These two websites were attacked, and the hackers watching outside naturally saw it, but before they could react, they discovered that some American hackers who had made progress were kicked out again, and these domestic hackers also tried to scan  After a while and scanning, they found that the two websites were exactly the same as the Ministry of Foreign Affairs website, with one iron barrel, and even the rejection methods and defense methods were exactly the same.

    Needless to say, L was definitely the one who took action.  Before the domestic hackers started to be surprised, the mysterious group of American hackers also discovered this matter. In their opinion, since this mysterious L clone had invaded the other two websites.  Then the Ministry of Foreign Affairs' website defense should not be so tight. This group of mysterious American hackers immediately returned to the Ministry of Foreign Affairs' website and stepped up their intrusion into the Ministry of Foreign Affairs' website.

    However, the result of the invasion surprised them all. Their invasion had no results, and the opponent's defense was still watertight.  Is it possible that when defending several websites at the same time, the other party can still achieve such a terrifying defense?  Although they know that the defense is definitely not operated by one person, they must have installed a new type of firewall.

    But even with a firewall, some instructions require humans to operate, and it is impossible for a firewall to monitor all actions against the system.  Then some of them must be distracted to control, but at this moment, the opponent has no problem defending three websites?

    After this group of mysterious hackers paused their attacks, they immediately began to divide their forces. However, they did not go to hack the official websites of the Ministry of *** and the State Council, but began to hack several other departments, such as the National Development and Reform Commission and the Ministry of Education.  Wait for the official websiteIn other words, all government websites are targets for their intrusion.

    Their reaction speed is fast, but Zhang Yang¡¯s reaction is not slow either.  The systems of the above servers use the same system, which has been modified by the Institute of Computer Science, Chinese Academy of Sciences. Because these systems are very unified, Zhang Yang can use the same system vulnerability when hacking into each system.  .

    But the firewalls installed on these systems are different. Whether they are mysterious hackers or hackers from the United States, they still need to analyze the system before they can choose an attack method, but Zhang Yang does not.  What Zhang Yang has to do is, when they attack a target, Zhang Yang directly hacks the target in advance, then copies his own nest, and then directly adds the nest to the centralized control mode, and then everything is fine.

    Soon, the opponent¡¯s attack targets were spread over more than 20 government websites. Even some government websites that were soy sauce were attacked, but it was still useless. Every website was still defended like an iron barrel.  At this moment, the entire Internet went completely crazy.  Who are these *** people?

    Could it be that Martians have invaded?  Otherwise, the appearance of a gscsd would be perverted enough, and then an equally perverted l suddenly appears?  Many people are a little confused. What the hell is going on?  !  Black Eagle is one of the people who is not clear-headed at the moment.

    Black Hawk smiled bitterly and looked at the several large screens in the several hundred square meters hall. This is the data center of the National Computer Emergency Center. Black Hawk and his entire branch have been mobilized here because of this inexplicable outbreak of Sino-U.S.  Hacker war.

    It has been more than two hours since the two sides started to show signs of intensification, but at this moment, the scene is indeed extremely strange. On the American side, gscsd and many Chinese hacker masters are going crazy. The difference is that everyone's eyes are focused on  On the battlefield of gscsd, after all, everyone knows that when the official websites of the three largest intelligence organizations in the world are breached by gscsd, it means that other websites of the US government are like the one of ***  Like the membrane, it will be broken by gscsd.

    And at home the situation at home is even weirder. Several pieces of information in Black Hawk's hand made Black Hawk laugh or cry. The situation at home is exactly the opposite of that in the United States. There are already a lot of American hackers gathered in the country at this moment, but they are like  It happened to be a thick iron plate, and it couldn't be penetrated no matter how hard it was poked.

    To be honest, this l is perverted enough, and the Blackhawks don¡¯t have a good solution now. l is pretty awesome, but the problem is, l is too awesome, so awesome that the Blackhawks and the others transferred Guoan, **  *Wait for a state where all the network elites in several departments have nothing to do.

    It is true that there are so many government department website maintainers, staff, and technical personnel who are not a small number, but at this moment, l has accepted all their work, and they are now like those on the periphery watching the fun.  Like hackers, they all became onlookers who did not know the truth.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report