Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume One Chapter 429 The War of the Century (3)

Previous page        Return to Catalog        Next page

    Chapter 429 The War of the Century (3)

    Chapter 429 The War of the Century (3)

    Not only was Zhang Yang shocked, in fact, after Zhang Yang finished talking to God and the others in the chat room, Shenyue Sha and the others rushed over directly. As soon as they came over, they saw gscsd activated.  Attack, Zhang Yang did not hide his actions at all this time, and Zhang Yang had also studied the anubis website before, so when Zhang Yang took action directly, he directly entered the instructions that could threaten the anubis website into the instructions of the infected system.

    The infected bugs immediately launched a targeted attack, but what Zhang Yang didn't expect was that the animals like anubis were ruthless enough. As soon as the infected bugs' attack started, countless virus packages suddenly popped up from the anubis transfer server.  , what made Zhang Yang even more shocked was that these virus packages, which were obviously placed in advance, were not targeting i Zhang Yang, but other websites.

    ? And these sites are nothing else!  They are all websites of the British government¡¯s cybersecurity department and major intelligence systems!  Why does this behavior feel so familiar?  After being stunned, Zhang Yang felt a little weird. The more he thought about it, the more he felt that he had seen such behavior somewhere. When he thought about it more carefully, Zhang Yang suddenly realized that this was not the same as the rogue policy of nuclear bundling among the major nuclear powers.  Is it the same?

    "I've been attacked. Well, don't let others have an easy time either. This is such a rogue thing."  Zhang Yang shook his head, but if you want to be tied up, just tie him up, I will still be black.  Zhang Yang was not ready to stop at all. The infected bug was still invading the anubis website firewall with extremely high efficiency. To be honest, there was indeed a lot of information worth invading on the anubis website.

    The registration information of those hackers alone is enough to make many intelligence agencies excited. It is obvious that the reason why the anubis group adopts such a rogue policy is that they are afraid that their website will be successfully invaded.  Let¡¯s engage these intelligence departments first. Although these intelligence departments may not be able to get the specific information of the anubis website, they can definitely get the address of the transit server.

    Although it is said to be a transit server, there is still a lot of information in it. Naturally, these intelligence agencies do not mind troublesome looking for these servers.  I didn't take the initiative to cause trouble for you, maybe I turned a blind eye, fearing that you would cause trouble in turn, but now that you have taken the initiative to cause trouble, you can't blame us.

    When Shenyue Sha and the others saw this situation, they almost dropped their jaws. Damn, these people are quite ruthless.  Anubis has a great idea. Firstly, it is to prevent hackers from obtaining the information of their website. Secondly, it is to cause trouble for these hackers. However, no intelligence department in any country can just watch these hackers.  Doing it on your own country's territory.

    So when Shenyue Sha and the others come to join in the fun, innocent people will soon be affected. At that time, the intervention of the intelligence agency is necessary.  No matter what Shenyue Sha and the others think, Zhang Yang is not afraid of this anyway. Zhang Yang has great faith in the skills of the security personnel of the intelligence department, but they cannot find him.

    "What should I do? What's your opinion?" Shenyuesha asked in the chat room.  "Uh, I don't know. My intrusion skills are not good, and I will be a hindrance in following you. I am better at defense. This god boss should know better." Zhang Yang quickly said haha.

    The questions he asked god at the beginning were all about defense, so god should know about this.  Seeing what Zhang Yang said, God immediately smiled and said: "Actually, intrusion is not difficult, and with your current understanding of security, I think it is very simple for you to learn to intrude. The so-called knowing yourself and the enemy is victorious in any battle. I think  To learn how to invade well, you must first learn how to defend. Only if you know how to defend can you know how to break through the opponent's defense."

    Zhang Yang was convinced by God¡¯s words. Many hackers just learn how to invade. In fact, they are putting the cart before the horse. Only by learning to defend first can they better understand the invasion.  This is a mutually reinforcing process.  "Then let me borrow God's good advice, but what are you going to do? The gscsd guy said that he is not going to give up, and if he wants to play, he will play big." Zhang Yang said in the chat room with a smile.

    "God, what do you think?" Guzhu Canmeng asked.

    "What, it's already like this, are you afraid of Mao? Let's not talk about whether the intelligence agencies of the British government can find us, but what if they find us? Don't worry, as long as I am here, they can't extradite you.  , Those people from the National Security Bureau are not stupid." God said calmly in the chat room.

    God¡¯s words made Zhang Yang slightly stunned. It can be heard from God¡¯s words that this guy is a bit powerful in reality?  Is it from the National Security Bureau?  Probably not. If god were from Guoan, many things would be completely unnecessary.  If he is not Guoan, then obviously this guy should have another identity.

      "Hey, let's go, gogogo!" Shenyuesha immediately shouted excitedly and started to take action.  Zhang Yang did not use ddos ??attacks this time. Zhang Yang used to directly let the infected bugs start to crack the other party's firewall. Anubis's firewall is undoubtedly quite powerful, but unfortunately, anubis forgot one thing.

    What is the predecessor of the infection system?  Or what does most of it come from?  It's the Adam system!  The Adam system was once the most confidential base management system of Anubis!  The entire management system naturally has an anubis firewall!  Even that firewall is stricter than the firewall used on the anubis website!  When the infection bug stole the Adam system, the firewall embedded in the entire Adam system naturally followed.

    Therefore, the database of the infected system contains all the information about the anubis firewall. Now it can be described as effortless to crack these firewalls. Although the two firewalls are slightly different, the difference is not big. The invasion efficiency of the infected bug is terrifying.  If it weren't for the performance of the transfer server and the weak security personnel behind Zhang Yang, I'm afraid the infection bug would have broken through the system long ago.

    But even if someone is defending from behind, the infection bug has killed the three-layer firewall in a short time.  And at this time, Shenyuesha and others who were following behind came over to do it. Although Shenyuesha and the others were not the same as Zhang Yang's method, the efficiency of the infected bugs in cracking the system was the most threatening now. Those who  The defenders had no time to deal with Shenyue and kill them.

    Access to the entire anubis website was immediately greatly affected!  How many hackers log into anubis every day?  This is an uncountable number. As the leading position in the world of hackers, the influence of anubis has long penetrated into the hearts of every hacker. You can see this if you think about the fact that God and others in the past had vests on the anubis website.  There are some clues.

    When the anubis organization was exposed by gscsd, the number of hackers from around the world logging into the anubis website not only did not decrease, but increased a lot.  Some people want to join anubis, while some have ulterior motives, and some are simply sent by major intelligence agencies to get in. Anyway, the number of hackers of all kinds has not decreased, but has increased.

    At this moment, when the anubis website was attacked, it can be said that all the hackers around the world were confused!  The powerful strength of anubis is deeply rooted in the hearts of the people. It is not that no hackers have tried to invade anubis, but these hackers undoubtedly died miserably in the end. It was not because anubis dug out their addresses and got them into the hands of the intelligence agencies of various countries and made them squat.  The prison just forcefully destroyed their servers and the like.

    More importantly, the powerful technical capabilities of the anubis website have caused the anubis website to be attacked in time, and it has never affected normal access. But now, it is actually inaccessible?  who is it?  !  This is almost the common thought in the minds of all hackers around the world after discovering that the anubis website was compromised.

    Ordinary hackers basically don¡¯t know the anubis circle, and the people who know anubis are at the king level at first. There may be some who are very skilled, but people who know experts also know this website.  But there is no doubt that Zhang Yang's sudden launch of the anubis website shocked the most high-end people in the world's hacker community!

    The technical strength of these hackers is quite good, so when they discovered that the anubis website had been hacked, the curiosity of these hackers immediately arose.  These days, there are too few people who dare to stroke a tiger¡¯s beard!  When they pulled out their own scanners, analysis software, etc. to analyze the anubis website, they immediately discovered the extremely efficient and threatening infection bug.

    There is no way, although there are many hackers who invade at the same time, such as God, Shenyuesha and others are working on this website, but the most serious threat to the entire website is the invasion of infection bugs. The terrifying invasion efficiency is like fireflies in the dark night.  It was so cool that it immediately attracted the attention of all hackers.

    There are basically no secrets in the hacker circle. Everyone knows someone. Once the news spreads to each other, everyone will know it.  So when Zhang Yang broke through the fourth layer of the anubis website firewall, most of the hackers around the world who were watching the battle knew who was doing it.

    gscsd!  This ID has risen like a comet in just a few months, and its dazzling light has almost obscured some veteran hackers.  Of course, this is not the main reason why gscsd is so popular. The reason why gscsd is so popular is because of gscsd's madman-like character and his terrifying strength!  Especially the latter is the main reason why all hackers admire them!

    Because after comparing themselves, they all thought that it was impossible for them to do what gscsd did, so they admired gscsd.  When I knew I was building an anubis websiteAfter gscsd, the faces of these hackers were first shocked, and then excited!

    In the eyes of hackers, what attracts them is always the battle between the highest-level hackers. This is why the global hacker war organized by anubis is so attractive.

    "What should I do, sir?" Inside the M16, a second lieutenant officer looked at his commander and asked cautiously.  Edel was very distressed. He was almost crying now. As the most famous intelligence department in the UK, M16 is famous all over the world because of the 007 movie. Edel, as the chief intelligence officer of M16's network security department, usually  He was very proud, but at this moment, Edel wished that this position could be left to someone else.

    what to do?  Damn, if I knew what to do, I wouldn't be in such trouble.  Adel was completely depressed. The organization anubis was one of the main targets of m16 during this period. He was also responsible for network security, so this matter was naturally handed over to him.

    But the anubis website has been mysterious for many years, and it is understandable that there are no clues about them. So although Adel handed over the task, he didn't take it to heart and slowly investigated. There are so many in the world.  Don¡¯t the country¡¯s intelligence agencies have no information?  If the progress on my side is slower, neither my immediate superiors nor the Prime Minister will say anything.

    But now, Edel is about to cry. Edel knows the fact that anubis' technical secondary server is in the UK. After all, an uncontrolled high-threat target has appeared within his intelligence range, so he is naturally ranked first.  But threats are threats. If there is no way to completely eliminate anubis, m16 internally recommends not taking any action.

    Europe and the United States are different from China. The networks in Europe and the United States have basically penetrated into the grassroots part of society. In these countries, the threat of hackers is much greater than in China, and the losses and harm caused will naturally be much greater. Therefore, there is no way to use anubis  With everyone caught in one fell swoop, it would be understandable for m16 not to take action.

    The question is, why did you provoke the plague god gscsd?  If we have to talk about the threat level, gscsd, the god of plague, will definitely surpass anubis in the eyes of intelligence agencies around the world, because anubis has not caused any trouble for so many years, but what about gscsd, the god of plague?  Look at the good things he has done!
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report