Section 21 The Vicious Teacher Wang

As soon as he saw Duan Tianwolf's action, Wang Lian knew, "This kid knows that his IP is being monitored by me, so he wants to remotely control other computers to attack me...... But how can it be so easy? My server is in charge of the entire computer room, and any communication between two computers must pass through me. In other words, you have to connect to me and pass me before you can control another computer. I'm going to see, how do you get it? ”

After Duan Tianwolf turned on all the computers, he sat back down in front of his computer and started to get busy.

That's half an hour.

Half an hour later, Duan Tianwolf took a deep breath and lightly hit the enter key on the keyboard.

Then, Wang Lian saw a powerful stream of data, rushing towards the server, there is no doubt that this is a virus, and it is an extremely powerful and highly contagious extended surname virus.

"Oh my God, you can do this kind of thing." When he saw this data stream surging, Wang Lian suddenly exclaimed loudly.

It turned out that because Duan Tianwolf knew that it was impossible for any conventional hacking method to hide from Wang Lian's eyes. In this case, Duan Tianwolf has only one hacking method to choose from, and that is a virus attack.

Therefore, Duan Tianluo spent half an hour writing a very terrifying virus program that spread quickly through the Internet.

Generally speaking, when hackers carry out virus attacks, they use various clever ways to hide the virus and deliver it to other computers. Under certain conditions, the virus is activated. Once the virus is activated, the energy it generates is extremely terrifying, and it can easily destroy the target's entire defense system.

However, this method of virus attack can only deal with inexperienced rookies, and it is naturally impossible for Wang Lian to be effective.

What is a virus and what is not, how could Wang Lian not recognize it? Since this was the case, it was impossible for him to let Duan Tian Wolf deliver successfully. In this way, it is impossible for Duan Tianwolf's virus program to be activated in Wang Lian's server, so this virus is equivalent to writing in vain.

However, this was just an ordinary person's train of thought, and Duan Tian Wolf's train of thought was not like this.

The virus he wrote about didn't need to be delivered, it could have flare-ups.

Why? Because Duan Tianwolf did something that perhaps hackers in the world have never done before-between hacking others, he hacked himself first, and he activated the virus program in his computer.

Because Duan Tianwolf himself was also part of the LAN of the entire computer room, after he hacked himself, the virus in the computer would instinctively begin to spread wildly.

At this time, Wang Lian had two choices.

One option was to avoid it, and once he avoided it, the virus would immediately spread to the remaining forty-nine computers, and Duan Tianwolf would probably be able to control the remaining computers through this virus.

Once this step was achieved, Duan Tianwolf could use any of the fifty computers to attack the server, in that case, Wang Lian would not be able to target Duan Tianwolf to the death like he was now. Because he only has one pair of eyes, it is impossible to stare at fifty computers at the same time.

Another option is to use the authority of the computer room administrator to block the virus and not allow it to spread to other computers. And if that's the case, then the server is likely to be hacked by the virus.

Whether to let or block, Wang Lian must make a decision within a second.

Although, intellectually speaking, Wang Lian believed that the real purpose of Duan Tianwolf's move was to control the other computers in the computer room. However, in the end, Wang Lian still chose to avoid it.

Because what he was facing was not someone else, but Duan Tianwolf, this guy was a person who could do anything.

Since there is a backup move, there is no need to go head-to-head with him.

In this way, through this suicide attack, Duan Tianwolf quickly gained control of all computers in the computer room except for the server. In other words, these computers all became Duan Tianwolf's zombie computers, and Duan Tianwolf could use them for anything.

At this time, Wang Lian, who should have been depressed, raised the corners of his mouth and smiled lightly, "Boy, do you think you've got it?" It's not that easy. ”

As soon as he finished saying this, those zombie computers that had become Duan Tianwolf suddenly began to launch one of the most common and effective attacks on Duan Tianwolf at present-DDoS distributed denial-of-service attack.

It turned out that long before the start of the exam, Wang Lian had already copied a virus program in all 49 computers. As soon as someone tries to remotely control it through remote control, the virus program will immediately attack itself and launch a DDoS distributed denial-of-service attack on the computer.

Here, a small introduction to what is a DDoS distributed denial-of-service attack.

At present, the general protocol of the world network is the TCP/IP protocol, and its protocol basis is the connection-oriented TCP three-way handshake.

The process of the so-called three-way handshake is like this.

First, it is the user who makes an access request to the server.

This is the first handshake for the TCP/IP protocol, and the user asks for a handshake.

The server then confirms the user's identity, and after confirming that it can be trusted, he returns a message to the user and agrees to access.

This is the second handshake for the TCP/IP protocol, and the server asks for a handshake.

After that, the user will connect to the server.

This is the third handshake of the TCP/IP protocol, where the user and the server complete the handshake.

After the three steps are completed, the user is connected to the server, and the user can freely browse the content on the server.

The DDoS distributed denial of service attack is a malicious non-handshake during the third handshake.

If it is a human being, in this case, he may immediately scold, or rush to chase after you, but the server will not, he will stand in place and wait for you for a while, and he will not wait for you, so he will turn around and leave, which will cause the server to lag.

For a server, an exception from a user that causes one thread on the server to wait for a minute is not a big deal.

But if a malicious attacker, a zombie computer with a lot of abuse, deliberately behaves like this, then the server will consume a lot of resources in order to maintain a very large list of semi-connections - hundreds of thousands of semi-connections, even a simple save and compile will consume a lot of CPU time and memory, not to mention the constant retry of syn+ack on the IPs in this list.

This is the standard DDoS distributed denial-of-service attack.

In the face of this kind of attack, with a computer of Duan Tianwolf's level, there was no second way to go except to crash.

And this is Wang Lian's last move, which can be said to be not poisonous.

ps: Tonight at 12 o'clock in the refinement conference, welcome everyone to come, two hundred essences, until the light (a single ID can not be repeated to receive), the refinement conference will be held until two o'clock.

In addition, starting from today, we will implement a new rule of updating -- the third new book, one update a day, the second, two changes, the first and third changes, if it is on the weekly list, no matter how many people there are, four changes a day.

Some people may say, how to calculate the weekly point, my update speed is three or four times that of others, and I don't have a reason for the last week, so the weekly point does not count.

;