Chapter 096: Kill the Bubble Bean Server

The reason why Zhao Liu was in the other space where he was able to use the earth network and power supply was originally done by the God King of Fate through extraordinary power, so naturally it was impossible to leave any clues.

And just when Chen Feng was at a loss, someone below told him that something had happened in the live broadcast room where Lilith was.

Niang Xipi, Lilith is actually advertising for other live broadcast platforms.

This cliff couldn't bear it, even if Chen Feng dreamed of signing Lilith, he immediately asked someone to seal her live broadcast room.

However, the Lilith incident did not end there, and the effect was immediately apparent.

In less than a few minutes, the traffic of the fishing platform dropped sharply in a cliff-like attitude, and Chen Feng was in a cold sweat, his eyes were about to crack, and he almost crushed his teeth.

"Niang Xipi!"

While scolding, Chen Feng also smashed his deputy general office.

His bad luck hadn't gone away, and just when he felt a little discouraged, he received a phone call to help the president of Funyu, his immediate boss and competitor.

There was no surprise that Chen Feng was severely reprimanded by the other party, and he couldn't argue yet, so he almost suffered from high blood pressure in anger.

Of course, he is not the only one who is angry, as long as it is a person who teases the fish, whether it is the employees below, or the executives above, or even the vice president, president, or even those who are sensible, no one is not annoyed.

Who said that in less than an hour, the real traffic of amusing fish has dropped by more than one-third!?

"Bubble Bean Studio, I don't share the sky with you!" kicked the chair away, Chen Feng pulled his tie and yelled, at this moment, he naturally knew who did it, not the small studio that sold him video compression algorithms, or who?

Without a word, Chen Feng found a computer that could be connected to the Internet, and contacted the hacker again, "I don't care what means you use, get the bubble bean platform within 2 hours, let it be paralyzed for at least 12 hours, and 200,000 yuan is yours." ”

"500,000. "Hackers bargain.

"Okay!" Chen Feng, who is usually quite picky, didn't think about it, and immediately agreed, anyway, the money couldn't be out of him, and he was too angry.

And in a small area in an inland city.

β€œYES!”

A young man wearing thick glasses, uncontrollably clenched into fists, he is the hacker Chen Feng contacted.

It may seem like less than 20, but the experience of hacking is also extremely rich.

The hacker who received the money did not delay any longer, and immediately analyzed the website and APP mechanism of the bubble bean platform.

The result came out in less than 1 minute, but the hacker was stunned, and the servers used by the website and the APP were actually different.

"Whatever, let's analyze it together!"

The hacker talked to himself, opened his toolkit, clicked on a self-made hacking software, and typed the website IP and APP client IP address into it for automatic scanning.

The scanning time can be short, or long, and you may end up not getting anything at all. The hacker will not put all his hopes here, he entered the Android virtual machine again, and entered the in-depth analysis of the Bubble Bean Live APP.

"Damn, how many IPs does this Nima have?" After a few minutes, the hacker couldn't help but shout, he had a faint feeling that this thing seemed to be uneasy and unreasonable.

The boss who placed the order said that he wanted to paralyze the live broadcast of Bubble Bean, since it doesn't matter how many IPs he has, he will hack them all into the corresponding server and kill it!

At this time, the hacking software has alerted that the vulnerability has been scanned, and it turns out to be the IP server of one of the APP clients.

The hacker was immediately happy, he never thought that the server of the Bubble Bean live broadcast platform was so rubbish, and he could scan the server vulnerabilities with tools.

It was much easier to deal with the vulnerability, and the hacker hacked directly into the server. Take a look at it remotely, it turned out to be a secondary school verification server.

It doesn't have much effect if this thing is hacked.,Not only are there many servers with the same function.,And it's only for verification functions.,The real main server.,I'm afraid it's still hidden in the depths.。

But it doesn't matter, just follow the vine and touch the melon.

Using this server, the hackers quickly found the higher-level server.

Nima, also a transit server.

Going on, Nima is a transit server.

"!"

The hacker scolded in annoyance, and then analyzed, but it was still just starting, but the screen was directly blacked.

After a quick check, it turned out that Nima was physically disconnected. Not only was the third-level server disconnected, but the second-level and first-level servers could no longer be connected.

"Found me? can't be, just its garbage defense?" the hacker muttered to himself.

Confirming their guess, the hacker re-based on another server IP address, starting from the first-level server, and working his way all the way to the third-level server.

Originally, he thought that with the experience of the last time, this time it would be easier. How do you know that the two authentication servers are not using the same system at all, and the security policies are not the same, everything has to be re-analyzed.

So it took a lot of time, but I managed to successfully attack the level 3 server, and presumably the next level is the main server.

According to the designer's urine, perhaps the functional module that receives the live broadcast will not be concentrated on this server. However, as long as you can connect to a server, you will be able to find a server that receives and processes live streams.

As long as it can be killed, it will be impossible for the live broadcast platform to receive the live stream uploaded by the anchor, so that the live broadcast function of the platform will be cut off from the root and completely paralyzed by it.

However, there was a flicker in front of me, and the server was physically disconnected again.

β€œβ€¦β€¦β€

Hackers don't believe in evil and once again follow the route of other servers, all the way to the strategy.

The basic encounter is the same as the previous 2 times, and when the strategy reaches the later stage, the server will automatically be physically disconnected, and there has been no restart.

There is still a harvest, once he attacked the level 4 server, but it was not the main server.

At the same time, he also analyzed the reason for the automatic physical disconnection of the server, as he initially suspected, no one or security policy detected his intrusion. I really don't know what the designer thinks, but the running time of a server is basically about 5 minutes.

After this time, it will automatically shut down all servers on that line.

The main server doesn't know which level it is hiding in, so how can 5 minutes be enough time to analyze the intrusion?

The hacker scolded the mother angrily, so she simply changed her mind and went directly to the live broadcast program.

This time it was much smoother, and after a few efforts, he successfully invaded the live broadcast traffic upload server.

The hacker regretted it a little, he knew it was so easy, and he should have started with it in the first place.

There's nothing to say, just hack the server.

followed by the hacker to open the bubble bean live broadcast platform, and suddenly his heart and liver were cold, and he could still watch the live broadcast normally, shouldn't he?

Quickly analyzed again, it turned out that it was not ineffective, some of the anchors in the live broadcast room were indeed disconnected, but they were quickly connected.

After in-depth analysis again, after understanding the reason, the hacker has the urge to hit the wall.

It turns out that there is more than one server that handles live streams, and judging from the number of live broadcast rooms affected, I am afraid that there must be at least 2 digits.

Even if you take out a server, it will take at least three to five minutes. So if you kill them all, won't it take about 1 hour?

"Then I'll kill you too!"

The hackers were ruthless, and successively found 13 server IPs through means, and spent some time analyzing the vulnerabilities. It is worth mentioning that during the period, because of paralysis and carelessness, he was discovered by the technician of the bubble bean platform, and almost found his real address along the line.

Fortunately, he also has a lot of broiler springboards, and in the end it was just a false alarm.

He didn't hack in one by one, he simply wrote a batch operation software and killed all the servers at the same time.

Although the time consumed a full 2 hours, it was a little longer than he expected. But when he opened the official website of Bubble Bean Live and saw the anchors who had dropped off one by one, he was in a very good mood.