Chapter 239: The War of the Three Kingdoms (II)

To use a simple analogy...... Presumably many people have played a classic Three Kingdoms game ---- Heroes of the Three Kingdoms.

The hacker's attack is very similar to the battle mode of Heroes of the Three Kingdoms.

The hacker is the main general, and the broiler is the soldier who follows behind. How to control these soldiers to serve themselves, how to let their own minions fight with other soldiers, and even directly kill the enemy's main general, this is a science.

Therefore, the types of troops under his command, that is, broilers, have a lot of exquisiteness. If all the data streams sent are spam, then this single attack method can easily be directly blocked by the other party.

To put it simply, a traffic attack is to send a command to the computer to request a connection, and of course there are various types of this command. However, they all use the vulnerabilities of the current computer software to send requests to the computer and request to contact them, but when the request is sent, the computer responds, and then the broiler's information deliberately does not respond, which will cause a part of the response time to the attacked computer, thereby consuming memory resources.

But there are many kinds of requests, and the above is just one example. If there is only one way, then it can be solved by shielding--- don't underestimate human wisdom!

So Chen Xu is now using broilers to stick to the other party, and at the same time by analyzing the data stream to find the location of several main generals on the other side.

Capture the thief and capture the king first, this sentence is the same everywhere you put it.

The position of the opponent's commander is easy to judge, because in the case of broilers, it is impossible for one person to manipulate thousands of broilers and give all kinds of orders at will like a real person. The attack mode of broiler chickens is single and does not have any variation, and it is completely computer-operated. And the human attack method is very weird and changeable, as long as you find their deity and then attack, and finally directly drive the other party out of the battlefield computer, or even destroy the host they control---- this destruction does not mean to blow up the opponent's computer, even hackers generally do not have this level to blow up other people's computers. This destruction is the use of software or something like to destroy the opponent's system and make the opponent's computer unable to work.

But you must know that you want to find the location of the other landlord from the countless data streams in front of you. It's not an easy thing to do.

Chen Xu resisted the attack of thousands of troops, the other party's data flow was very strong, and he didn't dare to take it lightly, but fortunately, he had his own broiler to help him share the pressure. Otherwise, if all the traffic is rushed to his computer, without a hardware firewall installed. The computer only crashed.

But the other side is not much better.

Chen Xudi's strength lies in his fierce attack. He's like an unsheathed knife. Indomitable. All the data streams that were touched by Chen Xu were cut into two by him!

"It's fierce!" Because this kind of data flow confrontation is not very intuitive. Rather, it is reflected through some software. So the other party can't see who is doing it. However, you can see the data flow of the other side as if it were a majestic sea. And the data flow on the cusp is the most powerful. Whenever it hits him, all the data streams are wiped out in an instant, and they disappear without a trace---- and in reality, they are. The incoming data stream from this port is immediately blocked!

Chen Xu seemed to have taken a Blue Dragon Glaive Knife. Ride in the ocean of data flows. His men are not afraid of death. And he is even more imposing! In the blink of an eye. Chen Xu has already solved most of the data of the attack. And at the same time. He's aiming at his target, too!

Generally speaking. Hackers will lurk behind broiler creeps to keep themselves safe. They are constantly changing their appearance. That is, spoofing the data flow packet. Or simply hide and peek around.

But data flow has its own manifestations, after all. It's like a person. No matter how easy it is. The smell of his body is the same. Chen Xu is now running several tracking software. It's like a well-being hound. Smell each other's land. Prepare to tear through each other's disguises.

This kind of tracking software is not usable at first, because it requires a lot of resources to analyze. The analysis software captures the data stream and then begins to analyze, first continuously analyzes hundreds of data streams, remember the key code---- you know, the attack of the broiler is not any fancy, very mechanical and very old-fashioned, the same task of the broiler attack method is exactly the same---- there are no two identical leaves in the real world. But in the virtual world, there are bunches of replicas.

The analysis software needs to analyze several fragments in the data stream, and then screen all the data stream fragments that come from the attack at once, and position the exact same as the broiler, and if there are different ...... Then it could be the other party's subject!

It is not easy to find the main body in countless data streams and countless clones, so Chen Xu is frantically slashing and killing garbage broiler soldiers, while letting his eagle dog search for the whereabouts of the opponent's main general.

"This guy is so fierce! Does he have no defense at all?! ”

Chen Xu's brave spinach team screamed in front of the computer, and Chen Xu was like Zhao Zilong who was seven in and seven out of Changbanpo. No one can stop him! It's basically a chop one by one. Come two and cut one

So wild!

It's been a long time since I've met a player of this style.

Because the most important thing for hackers is to protect themselves, which is the first creed of hackers. It's not uncommon for brave hackers like this, but often nothing ends well.

Because it's so easy to find him!

Such a ferocious data stream, seeing one and destroying the other, this clearly exposes his location!

But he seemed to be fearless!

This is also too arrogant!

But Chen Xu believed that behind his back, Zhan Jing, who was in charge of the Chinese army camp, could not let him have worries.

Chen Xu had such a very strong feeling, he believed in Zhan Jing as if he believed in Xiao Min!

Chen Xu's bravery surprised both teams here, but there were always people who were not convinced, braised spinach and cold spinach rushed up at the same time, because solving the broiler chicken is not a skill---- just like the Three Kingdoms Heroes turned inside, even if it is the military general with the lowest force value--- that is, the civil official in history, like Cao Zhi, the history records are completely powerless rookies, and they can also kill a group of small soldiers by themselves---- that is not a skill, the real strong man is definitely not against a computer, but a person!

So they rushed up, and felt two ferocious streams of data collide, one attacking port 5001 and the other attacking port 3043. The cooperation between the two was intimate, and Chen Xu immediately realized that this time the opponent was no longer those very rigid broilers, but masters!

Chen Xu immediately came to the spirit, ha, you are fierce? Then let's see who is the real fierce brother!

Chen Xu's hand speed soared instantly, and he crackled on the keyboard to type instructions. At this time, the firewall starts to alarm, and there is a data stream that has been invaded! But Chen Xu didn't panic at all, because he knew that it was normal for someone else's data to be entered in this kind of hacker confrontation, and what if the other party entered his own computer? He had to change his system to win. But Chen Xu won't give them a chance!

Because at this time, Chen Xu's attack was also launched.

Three waves of the Yangtze River!

A wave is higher than a wave!

Chen Xu doesn't care if others will take down his computer at all, because he doesn't have that time to care! What he has to do now is to kick the other party out before his computer falls, and kill him directly!

So what Chen Xu chose was to counterattack from the port invaded by the other party!

One-on-two!

This is a very high requirement for hand speed!

Because the other party is very smart, both of them attack in different ways, so the other party must deal with it separately. And when it comes to counterattacking, different methods must be used for different attack methods.

No single set of commands is perfectly applicable to all means of attack.

But, the style is different!

Chen Xu quickly typed the command, because when the enemy entered his computer at this time, it was impossible for his IP to do anything to hide, unless, of course, he was still using a broiler at this time. But even if you use broilers, the other party will have no chance to clean up the traces and retreat at this time!

In other words, the current situation is already difficult to ride a tiger, and the so-called two tigers will inevitably be injured. Someone is bound to quit this game next!

"Zhan Jing help me!" The siren sounded again, and Chen Xu could see that the other party was already querying his registry, at this time he shouted, and Zhan Jing, who had already been prepared, quickly connected to Chen Xu's computer to help him defend himself!

With Zhan Jing on the defensive, Chen Xu could completely rush up to attack without reservation, and he had completely surrendered his back to Zhan Jing to protect at this time.

And Chen Xu rushed to the front, and quickly analyzed and cracked the other party's IP address...... Day, or Australian, one of the broiler groups!

But don't worry, Chen Xu immediately went to check the connection record on the broiler, so he touched the vine, and finally found the last address---- Dalian, China!

"Boy, kill you!" Chen Xu was like a bamboo, and rushed in directly, at this time, the opponent who was blindly attacking found that his computer had been invaded, and shouted: "I was tricked!" ”

But just then, a dialog box pops up on his screen: "Your firewall is dead. ”

Then, the screen went black!

Solved one! Well, there's a third chapter, which is done when it comes to words.