Chapter 502: The second is
The second is to steal the holographic information of the existing personnel who have access to the system, pretend to be a real user, and hide their true identity.
The thief handed over the stolen information to the system, and then let the information of these original users enter the system's review mechanism to deceive the system's approval.
However, this method is also too difficult and basically not feasible.
Because Lucas has neither soul in nor out of body, it is impossible for him to enter through the backdoor, but by other means.
That is to find the weakness of the system, and from this weakness, break into the system.
He is a veteran of many years and knows more about this specialized system than anyone else in charge of it in the industry.
Therefore, he knows that this kind of defense that is particularly rigorous at the highest level has a hole that is difficult to completely plug, that is, a weakness that is difficult to fully strengthen.
Network security, in fact, is not only the network, any system is the same, there are many links, each such link, is the breakthrough point of those hackers waiting for the opportunity to attack.
Since each link is different, their security defense may also be different.
So, there has always been a talk about cybersecurity, and it has been unanimously agreed upon.
This statement is that the security level of the entire system is equal to the security level of the weakest link in the defense.
Because this weakest link will definitely be discovered and exploited by hackers, and then break through from here.
That's why there are a number of tests to be done before those major systems are put into use, and one of the important tests is the hacker test.
In order to truly understand whether their system can withstand the attack of top hackers, system owners often do not hesitate to spend a lot of money to hire real hackers to carry out real attacks on the system.
For example, the real attack on this China Shangguo International Settlement Center is to put real money in it, which is about ten times the reward they should get.
If the hired hacker finally breaches the system's defenses, the money will be his.
The only difference between these hired testers and real hackers is that they report the security vulnerabilities they find.
Then, the owner of the system will strengthen security measures against these vulnerabilities.
This is the most effective way to improve the security level of the entire system.
Because the defensive loophole of one link is blocked, the whole system does not have this loophole, that is, the security of the entire system is improved.
However, since there are many links in the system, this weak link that has been tested and found is strengthened, and the other links will pull out the general, and another weak link will appear.
Therefore, this kind of offensive and defensive warfare is also an endless cycle of repetition.
Through a long period of research, Lucas found the weak link of the China Shangguo International Settlement Center.
This weak link is the connection line between the portal into the network and the communication network of the information base host.
In fact, such a line is actually very well guarded, and it can be called the best defense line in the world.
However, Lucas, who attacked the specialized line, still became a weak link.
Due to the large amount of information required for the backup of user profiles, and the fact that such a system cannot be set up in a decentralized manner, and can only be controlled by the center, the entrance and exit and the verification center must be connected by the line of information circulation.
There are two kinds of information conveyed above.
One is the information of the user who applies to enter the system, which is collected from the entrance and then sent to the host.
Another type of information is the decision made by the host after comparison.
There are two other types of such decisions, either to admit or to deny.
Of course, as a hacker, it is useless to block the information that the customer applies to enter, and Lucas's goal is to track down the information that comes out about deciding whether to let him in.
He passed through the system's route, entered the main machine, and asked the entrance system to collect his holographic information.
The function of sending to the host does not make judgments on such information, and directly sends it to the host for comparison.
The host is business-minded, and of course recognizes that this is not a pre-approved user!
The host is iron-faced and selfless, and if he didn't say it, he immediately refused!
Then, without delay, this refusal order was sent out.
At this point, the identification task of the host has been completed, the rejection instruction has been sent, and everything is fine with it, and if there is any accident in the future, it will not care.
The packet containing the rejection instruction, secured by the system's design, rushed directly to the approval office of the entrance at lightning speed.
Not allowing users to wait too long is also one of their service standards, so it can't be slow, let alone delayed.
If this directive reaches the entrance, then the immediate effect is to deny Lucas's application for entry.
If he waited until that point, his attempt to enter would have failed completely.
What's more serious is that his holographic information, which has already been filed in the rejected file, will be rejected directly next time, and it may trigger further action.
Therefore, for Lucas, there is only one chance, and the time is very short, he has to intercept that packet of information before that rejected message reaches the entrance application!
In the midst of the urgency, Lucas struck out decisively and grabbed the packet.
The other two members of the trio, Leohard and Leonie, were all relieved.
It's really more anxious to see others than to do it yourself!
The two of them breathed a sigh of relief, but Lucas was even more nervous, and the most important thing was that time was pressing!
He grabbed the packet, and while it wasn't going to continue to run towards the entrance terminal, he had to process it in an extreme amount of time!
Otherwise, the user will feel abnormal!
There is a time limit from the time you apply for entry to the time you approve it, beyond which both the user and the system will be alerted and then follow up accordingly.
This is Lucas, of course he will not appeal, but the system's automatic alarm function will take the initiative to report, then all the monitoring systems will be triggered.
Although the time is short, Lucas has a lot to do.
Taken together, he has four things to do.
First, he had to open the packet.
And to open this packet, you need to unravel at least two secret bonds.
The first is the secret detention that is specially used in the process of information transmission, even if it flows within the system, it must be strictly prevented from illegal reading.
This protection is the easiest for Lucas, and he can break it with a single effort.
Then there is the second secret deposit, which is the secrecy measure for entering the information packet, which is more professional than the transport secret, but Lucas still breaks it relatively easily.
However, it took twice as long as the first decryption!