Section 6 When the old treacherous and cunning meets the young genius

readx;

The following is the text of the novel (Tianqing) provided for you, please enjoy!

For the latest reading, please arrive

Just when Duan Tianwolf and Sun Yunmeng were surprised, Ma Luochen, who was in Chen Jiansheng's office, was also surprised. Pen | fun | pavilion www. biquge。 ο½‰ο½Žο½†ο½

"How could it be such a coincidence?" Ma Luochen held the coffee in his right hand, but he couldn't take a sip for a long time, "Attacked at this time?" ”

Muttering to himself, Ma Luochen asked on the Internet, "Have you tracked down the attacker?" ”

"No, this guy's springboard is much more perverted, but that's not a problem, the biggest problem is that he has a springboard that's extremely powerful, and we suspect it's a supercomputer. According to the feedback data, the operation system of this computer is a private operation system and is not open to the public. The system name is ENS. The people of the military-industrial hacker group replied.

β€œensοΌŸβ€ Ma Luochen was stunned for a while, "I've never heard of this system?" How is this system? ”

Because it was already late, although Ma Luochen's voice was very small, Chen Jiansheng, who was lying on the sofa and pretending to sleep, still heard him. He replied, "Why bother thinking about it alone? Wouldn't it be nice to go to someone from Siemens and ask? Didn't they help someone else develop the system? Maybe they developed the system. ”

The behind-the-scenes bosses of Siemens are the Rothschild family and the military-industrial complex, and Siemens' E is an agent of the Rothschild family, and their chief engineer is the military-industrial group.

Moreover, this person is not only a member of the military-industrial complex, but also a student of Ma Luochen, and Ma Luochen is very familiar with him.

"Hmm." Ma Luochen nodded, and immediately called the chief engineer of Siemens.

After the phone was connected and the reason was explained, the chief engineer immediately replied: "ENS is a brand-new operating system written by our company in the first half of the year, which is specially made for the American NN radio and television network, the most advanced television relay satellite, the operating system has a multi-working mode, multi-task processing mode, and can process trillions of requests at the same time......"

"What? It turned out to be a satellite? Ma Luochen asked in disbelief.

"yes, it's a satellite." Siemens' chief engineer said.

Ma Luochen held the phone for a long time before finally saying: "Okay, now find a convenient place to surf the Internet, send me all the relevant information of this system, and tell me your maintenance channel in this system, I want to go in and have a look." ”

"Ah......?" The chief engineer hesitated for a moment and said, "Teacher, this seems to be against business ethics." ”

"Your real boss is causing hundreds of thousands of deaths every year, what business ethics are you talking to me about? Do you think you're being interviewed by journalists right now? Ma Luochen said angrily.

"Oh, okay, I'll send you the information right away."

Just as Ma Luochen was asking his students for ENS information, Duan Tianwolf had also begun to move to the hunting system. With Sun Yunmeng's previous experience, Duan Tianwolf did not rashly attack.

The first thing he did was to find a right-hand man, which was the "Heavenly Dao" system that helped him get Sun Yunmeng's chicken feathers and duck blood last time.

After spending five minutes adjusting the settings of the "Heavenly Dao" system from automatic to manual, and setting up all the detailed technical settings, Duan Tianwolf sent a message to Sun Yunmeng, "Within three minutes, sort out all the list of botnets that you can control and are now online." ”

"Huh? In such a hurry? I can't sort it out much. Sun Yunmeng said.

"It doesn't matter, as many as you want." Duan Tianwolf said.

Sun Yunmeng said: "Okay, I'll try to organize a large server for you." ”

"No, don't waste it. After these zombie computers are used this time, you may not be able to use them again in the future, and the people of the military industrial complex will definitely keep an eye on them in the future. Including the satellite just now, you can't use it anymore, hurry up and clean up the traces inside, and then retreat, don't act rashly. ”

"Ah, my God, that's my favorite ......" Sun Yunmeng, who was sitting in front of the computer, was so heartbroken that he almost cried, "Okay, you wait a minute, I'll sort out a medium-sized computer for you right away." ”

Three minutes later, Sun Yunmeng gave Duan Tianwolf a batch of lists, and Duan Tianwolf included all these lists in the "Heavenly Dao" system, and then made the invasion of the "Heavenly Dao" system the highest level, and in just a few minutes, all these computers were successfully invaded, putting them under the control of the "Heavenly Dao" system.

In this way, the "Tiandao" system has an online botnet with a total number of about 8,000 and 300 medium-sized servers.

At this time, there are less than five minutes left before the half-hour deadline.

And in less than thirty seconds after Sun Yunmeng completely cleaned up the traces, Ma Luochen successfully entered the satellite. After searching for a few minutes, Ma Luochen muttered to himself in a strange way, "How come you can't find any traces of the intruders at all?" ”

Speaking of this, Ma Luochen stretched out his hand and scratched his forehead, "Being able to hack into satellites already shows that the strength of this hacker is definitely world-class." After discovering that he was exposed, he immediately cleaned up his traces, which is tantamount to completely abandoning the satellite. This kind of caution of a strong man with a broken arm is by no means comparable to that of ordinary hackers. All of this shows that the identity of this hacker is extremely not simple. And the most important thing is that, according to common sense, with this satellite being so well defended, if it is attacked, even if it is a super master, plus super equipment, it is not a matter of a day or two, why would he react so quickly? This is not normal...... Unless...... Unless this person knows that we can get the relevant information from Siemens? That is, he is likely to know our background? ”

Thinking of this, Ma Luochen's brows trembled, and he began to realize that something seemed to be wrong.

At this time, Duan Tianwolf's attack on another military-industrial group hacker had already begun to be launched. Under his efforts, the "Heavenly Dao" system simultaneously commanded 8,000 computers, with each medium-sized server as the core, divided into more than 300 channels, and used 300 different attack methods, some of which were malicious connections, and some of which were viruses.

Anyway, it is all the attack methods stored in the "Heavenly Dao" system, and this time all the surnames are smashed at once.

It should be said that in terms of hardware conditions, these computers are simply not enough to see compared to the hackers of the military-industrial complex who have military-integrated servers. However, as the saying goes, there are many ants that bite and kill elephants, and you can't stand the large number of others.

Moreover, all of these attack methods were all stored by Duan Tianwolf himself, and all of them were the latest and blackest attack methods, smashed together, and anyone could drink half a pot.

However, even so, Duan Tianwolf didn't want to be able to successfully invade in this way, because he knew that the other party was not only a top hacker, but also had a top system and a top hardware configuration, and this method of disrupting the battle was unlikely to successfully invade the other party.

However, who said that Duan Tianwolf did this in order to successfully invade?

In fact, Duan Tian Wolf had never thought about successfully invading the other party at all. He just wanted to test the reaction of the other party's system as much as possible through this system.

There are two aspects to this test.

First, Duan Tianwolf knew very well that the hunting and annihilation system was an extremely resource-intensive system, and he wanted to know how long this system could support under such a high-intensity attack.

Second, according to Sun Yunmeng's experience, the hunting and annihilation system is extremely sensitive, incredibly sensitive. This is an advantage, but at the same time it is a disadvantage. Once overly sensitive, it is bound to react promptly to any suspected intrusion signals.

Therefore, Duan Tianwolf used all kinds of offensive methods this time to see how the hunting and annihilation system would react in the face of various attacks.

In addition, Duan Tianwolf also installed more than twenty non-malicious computer connections among these attackers. The identities of these computers variety, some are schools, some are hospitals, some are police stations, some are military schools, and some are insurance companies.

Through these connection attempts, Duan Tianwolf also wanted to know how the hunting and destroying system would react when faced with these connection requirements.

In short, Duan Tian Wolf's attack this time was to let the hunting and annihilation system expose almost all possible reactions, and then he would collect all these data feedbacks, and then analyze them to find his weaknesses.

After receiving so many high-intensity, high-density intrusions at the same time, this hacker of the military-industrial group was in a hurry all of a sudden, and the screen was full of reports sent by the hunting system asking for instructions, so that his hands couldn't even click on it.

In desperation, he could only set the hunting system to automatic and let the hunting system react automatically.

As soon as he finished all this, he saw Ma Luochen send him a sentence, "Nothing happened to you here, did you?" ”

The hacker immediately replied, "I'm not just in a situation, it's a very large situation, and suddenly a very rapid attack is coming at me. The intensity of the attack is no less than a small cyber war, and with my current computer hardware, I estimate that it will take me half an hour at most, and the system resources will be exhausted. ”

"Suddenly under a large-scale attack?" After Ma Luochen saw the hacker's reply, he was stunned for a moment, and then he suddenly came to his senses, "Go offline immediately!" Go offline now! Yes, it's testing your hunting system! ”

(To be continued)