Section 5: Tentative Attacks

readx;

The following is the text of the novel (Tianqing) provided for you, please enjoy!

For the latest reading, please arrive

All military fans should know that the name hunting and destroying system is mainly used for the fire control system of tanks, and it is generally called the hunting and destroying fire control system. Pen "Fun" Pavilion www.biquge.info

The so-called hunt-and-destroy fire control system mainly refers to the ability of the tank commander to read and observe the battlefield, search for targets, indicate targets to the gun commander, and control artillery shooting beyond the gun commander, that is, the commander is mainly responsible for "hunting", and the gun commander is mainly responsible for "annihilation", and its official name is the dual-command ceremonial fire control system. After adopting this system, there is no essential change in the working process of the automatic loader and the fire control system when the commander and gunner shoot at the gun, and the automatic loader still carries out fixed-angle loading, and the shooter can still aim and track the longitudinal aiming line when loading.

And the strange thing is that at this time, a computer system named after the "hunting system" actually appeared.

Sun Yunmeng has paid all his attention to the computer since he was a child, and he is not very interested in military affairs, and he almost never reads relevant magazines or articles. Therefore, when he saw the word "hunting and annihilation system", the instinctive reaction in his mind was just at a loss. It can be seen that even if you are a genius, there will be a blind spot in knowledge.

Although Duan Tianluo spent a lot of time studying gambling when he was a child, and devoted all his energy to computers, he personally drove a tank car because of his training in Siberia.

Therefore, as soon as Duan Tianwolf saw this word, he immediately understood, and sent it to Sun Yunmeng on SN, "There is no need to go to Siemens to find information related to the 'hunting and annihilation system' on the Internet, this system must be a special system made within the military industrial group." ”

"The military-industrial complex is self-made? How do you know? ”

"There is a fire control system on the tank, which is called the hunter-destroy fire control system." Duan Tianluo replied.

"Oh, I see, then I won't waste any time." Sun Yunmeng wrote this, hesitated for a while, and then wrote, "Time is limited, why don't I try to attack first, see if there is any opportunity to take advantage of, you just follow me and watch, don't make a move yet." ”

As soon as Sun Yunmeng finished speaking, Duan Tianwolf said, "Okay, just do it, time is limited, and we don't have time to study their system carefully." If I'm guessing correctly, they probably have such a system installed on the computer of the competition. Even if we can't succeed in knocking them down this time, it's good to be able to test their system's capabilities and vulnerabilities through this operation. ”

"Well, okay, then I'll start working, you take a good look." Sun Yunmeng said, clapped his hands, and began to dry.

Sun Yunmeng chose one of the people's computers and began to test the link of his surname. At this time, a small disaster broke out, that is, at the same time as he made a temptation, his behavior was immediately detected by the opponent's hunting system.

Here I would like to make a special introduction to this hunting and annihilation system of the military-industrial complex. As Duan Tianwolf said, this system is indeed a military system developed by the military industrial group itself, except for the secret troops of a few countries, it is not open to the public, and very few people know about it.

The hunting system is divided into two modes, peaceful mode and hunting mode, under normal circumstances, both use peaceful mode. The peaceful mode interface of the hunting and destroying system is much more comfortable and easy to use.

However, no matter how comfortable the interface in peaceful mode is, no matter how convenient it is to use, it cannot be compared to the NDS system, but it is a little safer, so it is not commendable.

The real power of the hunting and destroying system lies in the fact that in the event of a cyber war, it is necessary to choose the hunting and destroying mode to use.

For the hunting system, the hunting mode is equivalent to the security mode under the NDS system.

In Hunt mode, the Hunt System will have the extremely powerful ability to automatically analyze data from suspicious sources and find out its source. All this, the hunting system can be completed in an extreme time, so fast that hackers have no time to react.

Once the hunter system has successfully captured the attacker, it will immediately report this information to the attackers. At this time, the Hunter and Destroyer system will have a counterattack mode for the crew.

The operator can set a certain counterattack mode in advance, or set a combined counterattack mode, and when there is no setting, it will automatically identify it as a manual state.

The counter-attack mode of the hunting mode is as follows:

First, DDS attacks.

This method of attack has appeared more than once in the book, so I will not repeat it here. To put it simply. This kind of attack is actually to delay the hacker's communication with the outside world, slow down his speed, and give you time and a good environment for your counterattack.

If you use the scene of war as a metaphor, the DDS attack is equivalent to the fire covering, so that you can't lift your head, you can only lie on the ground and crawl forward inch by inch, while he can run over and hit you.

Second, screen bomb attacks.

This method of attack can turn your computer monitor into a blue screen in an instant, and you can't see anything on the screen except a clear blue screen. This practice is no different from cutting out all other people's telephone lines in a war. Without a phone, you can't receive any messages, and you can't issue orders.

Of course, there are exceptions to everything, and if you can remember all the data and processes completely, and you don't need a screen at all, and you just use the keyboard blindly, then this kind of attack will not work against you. It's like someone cutting a phone line and you pull out your phone and give an order, and no one can take you out.

Third, the data crash bomb.

This counterattack method is the most brutal and complete of the counter modes - it is used to crash your system. Once you eat this bomb, you have nothing to do but reload.

If we also use the analogy of real war, this method is equivalent to overturning your headquarters, and you have no other way out than to rebuild the chain of command.

First, data delay bomb attacks.

This counterattack can make the entire network communication of hackers very slow, not ordinary slow, very slow, slow like a snail crawling. Even if you download a P3 song, it may take you all day.

This method of counterattack is graphic enough in itself, and I will not make any more analogies here.

As mentioned earlier, as soon as Sun Yunmeng connected to one of the hacker groups of the military industrial group, his hunting and annihilation system immediately detected Sun Yunmeng's invasion. Then, it immediately reported the message to its owner.

After receiving this report, the hacker was stunned, and while reporting to Ma Luochen, he immediately gave the command of the screen bomb.

The speed of this hunting and annihilation system is not ordinarily fast, after receiving the order, he immediately let his horse run wildly, Sun Yunmeng's bunch of springboards seemed to be a void in front of it, and after a while, Sun Yunmeng's springboard army was trampled to pieces, and rushed straight to the satellite where the wolf was stuck last time before he stopped and began to forcibly calculate the password.

At this time, Sun Yunmeng immediately sent a message to Duan Tianlang, "Have you seen it?" Do you see that? This system is so vigorous, if I hadn't been prepared, my computer might have a blue screen by now. ”

"The reason why this system was developed should be specifically used for the military to conduct cyber warfare, and it is reasonable to be vigorous. But it's really a bit ...... to be like this" Duan Tianwolf wrote here, and he couldn't find the words to describe it.

"The reason why I'm still alive is because of that satellite. However, during the P game, the hacker conference stipulated that when we defended, we could not use other hardware. When the time comes, won't we all lie down when we are bombarded like this? Sun Yunmeng said worriedly.

Duan Tianwolf thought for a while and said, "This system is not without weaknesses, I'm sure it must need extremely powerful hardware support. Ordinary civilian hardware, which simply cannot support it for too long, is about to collapse. ”

"However, it is now clear that they are crushing us with resources. Don't even think about it, since they will use this military system, they will definitely use the military's integrated server against us. Speaking of this, Sun Yunmeng said indignantly, "Usually I use resources to bully others, but this time I have to get retribution, and I was crushed to death by others with hardware." Alas, with this kind of person, you have to come to the yin, the real knife and real gun competition, it is really too much of a loss. ”

After reading Sun Yunmeng's words, Duan Tianluo, who was sitting against the wall, thought for a while, and then said, "It doesn't matter, we can modify our system for their system." ”

"But we only have twenty minutes now, how much can we know?" Sun Yunmeng asked.

"Know as much as you can. The more you know, the more you have a chance of winning, you take a break first, and then let me taste the taste of the hunting system. ”

(To be continued)