Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume One Chapter 427 The War of the Century (1)

Previous page        Return to Catalog        Next page

    Chapter 427 The War of the Century (1)

    Chapter 427 The War of the Century (1)

    God and his gang were aroused by the anubis people. In fact, not only god, but also other hackers who knew about this incident were also a little angry.  Although it is said that hackers have no borders, it does not mean that hackers have no borders. Hackers are all a bit angry. Because they stay at home for a long time, hackers are quite sensitive to ethnicity and country.

    If l and gscsd take the initiative to invade others, and then a hacker war breaks out, although domestic hackers are equally excited, they will only go up and watch the fun, most of them will not take action, and they will just watch the crowd who do not know the truth.  Only a very small number of people might join in the fun and take action directly.

    But when you come back from being bullied, the situation is different. nnd, just once, forget it. Do you really think there is no one in the Chinese hacker community?  Most of the domestic hackers have this idea, and the hackers are all connected with each other. Now that they are in contact, everyone talks about it, and the anger becomes even greater, and the anubis group begins to suffer tragedy.  As Zhang Yang said before, although these small hackers may not pose any threat to the anubis group, you cannot ignore the various attacks they launch.

    Especially when the number of these people reaches a certain level, you can¡¯t ignore them even if you want to.  If your technology is not good, your attack will be useless, but if you occupy the network bandwidth, it¡¯s okay, right?  It¡¯s okay for men to affect your network speed, right?  Most of the little hackers who join in the fun have this attitude. Anyway, I just broke the pot. Maybe my skills are not very good, maybe the software I use is software written by other big-name hackers, but I just blame you.  Let's do it, what are you going to do?

    The ones who are most susceptible to incitement are often these little hackers, because they are not technically strong enough, so when they see the master doing something, they can't help but feel itchy when they see the master doing it. When someone incites them, they immediately join in the fun.  These people are not like those experts who have any concerns. They have never done anything illegal, and they don¡¯t have the strength to do it, so they are not afraid of you tracking their real IP. In other words, even if it is you  What if I track you down?  How many little hackers are there on the entire Internet to join in the fun now?

    The opponent's attack is slowly weakening, and Zhang Yang has also discovered the situation outside. To be honest, Zhang Yang is very emotional now. It seems that what *** said is not unreasonable. There is strength in numbers!  The more people there are, the bigger the base will be.  Even if you have one hacker among 10,000 people in the United States, the probability in China is smaller than yours, and there is one hacker among 20,000 people in the United States, but you can¡¯t handle the large base!

    Soon, the crisis on the Starry Sky Group server was resolved, but things on the outside network were not over. The entire network was now in chaos. The anubis group was also being chased a bit miserably. After all, not only were those who were following them  Not only are there small hackers, but there are also masters like god.  Zhang Yang posted a message on the Starry Sky Group's website. The servers of many companies over there have begun to be affected.

    There is no way, whether it is anubis or these people in China, they will always use broilers, and many of these broilers are servers of major companies, or servers from specialized rental server companies. These servers have suffered  Attack, the messy website immediately began to be affected.

    ¡°In particular, many of the people who attack randomly are small hackers with insufficient skills. The damage caused by these people with insufficient skills is often beyond your expectation.  Isn¡¯t there a good saying?  Those computer systems that cannot be repaired by computer experts are often broken by novices. You don't know how these novices broke it, so you feel like you have no way to start.

    This is the situation on the domestic network now. The servers of many companies have actually been affected by Chiyu. Originally, they had nothing to do with it.  A very formulaic announcement was made on the Starry Sky Group's official website. Zhang Yang didn't say much. He just said that the Starry Sky Group's official website had been hacked. All in all, it was formulaic language.

    After posting this post, Zhang Yang directly switched to the Infected Bug side. The Infected Bug side has made considerable progress. This server also has experts helping to defend, and the intensity of the defense is quite good, but they don't have that many people to help.  More importantly, they are attacked by infection bugs. Although infection bugs are not more powerful than a super hacker, computers will always be better than human brains in seizing opportunities, analyzing vulnerabilities, etc.

    So now the infected bugs have broken through the other party's three-layer firewall. "Ding dong" Not long after Zhang Yang switched the page, a crisp prompt sounded suddenly, and then a green pop-up popped up on Zhang Yang's computer screen.  dialog box, while the aboveIt is a new ip.

    "Is this?" Zhang Yang was stunned for a moment. While the infected bug was attacking, there were as many as a dozen or even dozens of programs running at the same time. It was naturally impossible for Zhang Yang to observe them all. When he saw this new IP address,  At that time, Zhang Yang immediately checked the system records. After this check, Zhang Yang almost dropped his jaw.

    This IP is a new IP retrieved from this server. In other words, this server is also a broiler.  But what surprised Zhang Yang was not this. When attacking this server, Zhang Yang had already thought of this possibility, so there was nothing surprising about this. What surprised Zhang Yang was the method used by the infection bug to do this!

    In fact, the infection bug has already entered the server's system. Zhang Yang doesn't know how the infection bug got in, but the logs show that the crazy attack outside was simply a feint attack, but the infection bug has successfully used the newly mutated virus.  The intrusion occurred and another IP address inside was captured.

    After being stunned, Zhang Yang couldn't help but sigh. It seemed that the logical memory ability of the infected bug and the independent analysis of the database backup were really awesome.  Although this function seems incredible, to put it bluntly, it is actually nothing. There is an optimization analysis in the database of infected bugs, that is to say, under the premise of achieving a purpose, it will list many ways, and then  After comparative analysis, which approach is optimal and most efficient will be adopted.

    Before Zhang Yang could finish his sigh, a voice came from the chat room on the red smurf's side. Because Zhang Yang had just blocked the voice in the other party's chat room, the red smurf sent Zhang Yang the text of a private chat.  information.  I opened the message and looked at it, "You can withdraw gscsd. We have determined the location of this place. The next step is up to us."

    After a pause, Zhang Yang directly opened the chat room, turned off the sound shield, and Zhang Yang quickly asked: "Wait, what are you going to do?"

    "What to do? Of course, destroy this base. We have been blatantly invading for so long. Even if we successfully invade, it is impossible to get any information inside. The protection mechanism of each anubis server is beyond your imagination, unless you are  Invade silently, and then copy the data from it, otherwise, when you forcefully crack the intrusion, they will blow up the server directly. Since they can't get the information, then just destroy the base." Red Smurf  After being stunned for a moment, he spoke directly.

    "Destroy it?" Zhang Yang was also stunned, how to destroy it?  "Well, it's destroyed. Haha, let's do this. Since we will cooperate next, let's reveal some news to you. We have obtained the command information of the French side's system, and we can directly control the other party's system.  Air Force base, issue an urgent combat order and use heavy ground-penetrating bombs to blow up this base." The red Smurf said easily.

    But the content of the words made Zhang Yang a little frightened. He quickly said: "Wait!" "What's wrong?" The red smurf was stunned for a moment and asked.

    "Nothing. In fact, I just entered that server. Although I didn't get any useful content, and I don't know what the base where the server is located does, but I got a new IP. I'm afraid this IP is the real IP of the other party.  Address." Zhang Yang thought for a while, and told the matter directly without hiding it.

    Zhang Yang¡¯s words caused a dead silence in the channel. After a long time, the red smurf in the channel asked in a strange tone: "Are you sure?" "I'm sure." Zhang Yang nodded happily.  "This is the IP address. I posted it on the public screen." Zhang Yang immediately posted the newly obtained IP address on the public screen.

    Zhang Yang hasn¡¯t had time to look up the IP address yet, but judging from the IP, this new IP is also in France.  "Let's verify it." The other party disappeared without saying a word. Zhang Yang also searched for the new IP with some curiosity. After entering the connection, Zhang Yang directly started scanning the IP. The scan results surprised Zhang Yang.  Because he saw something familiar!

    Although Zhang Yang could not see the whole picture of this new IP server system and could only get part of it through its feedback information through scanners and analysis software, its access denial method and feedback method made Zhang Yang's eyes suddenly light up.  , this kind of publicity has been seen in thanatos in the previous life!

    In other words, this base is undoubtedly one of the secret bases of Anubis!  Just when Zhang Yang was overjoyed, the red smurf suddenly spoke: "gscsd, now it seems that I can't accept it anymore. You are definitely one of the best people I have ever seen in terms of computer intrusion. This base  It is one of the real bases of anubis. We are very familiar with its system. We have participated in the production of this service.machine system.  "
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report