Section 12 Serial Bureau (Medium)

Although he was anxious, Sun Yunmeng did not rashly attack the server on a large scale again.

He had been cautiously probing with his surname, trying to attack it in various ways, and then watching how it reacted to determine the detailed function of this arson wall.

Normally, this is unrealistic, because the first rule of hackers is to be undetectable.

However, the current situation is different, this is a clear duel, so there is no need to scruple so much, Sun Yunmeng can test unscrupulously, what he has lost is just time.

At the same time, Duan Tianwolf was also acting, and while Sun Yunmeng was testing the server, he was also probing Sun Yunmeng's computer.

As a result, the data feedback of Duan Tianwolf's defense line was unimaginably slow. Here we need to explain what is meant by data feedback here -- any computer on the network, its data is bidirectional, flowing in and out, not saying that it is just flowing in or out.

Sun Yunmeng attacked through many springboards, and when Duan Tianluo asked Sun Yunmeng's computer for data feedback, it had to go through the springboards one by one, and then it could send the data feedback request to Sun Yunmeng's computer.

In this case, the data feedback speed is slow to this extent, which can only show that Sun Yunmeng, the springboard king, has more springboards to the extent of perversion.

In desperation, Duan Tianwolf began to use the countercurrent tracking method.

The so-called counter-current tracking method is almost the same as a hound catching prey, which is to follow the information left by the other party and trace it all the way according to the other party's route.

It's just that hounds are based on smells, while hackers are based on data flows.

It didn't take long for Duan Tianwolf to receive a receipt packet and return an IP address.

Seeing this IP address, Duan Tianwolf's brows couldn't help frowning, because this IP address was very weird, and it didn't look like an ordinary IP address at all.

Strangely, Duan Tianwolf once again sent a request to this IP address to identify the system, and as a result, soon, Duan Tianwolf saw the information sent back to the other party about the system-queenos.

β€œqueenosοΌŸβ€ Duan Tianluo touched the back of his head inexplicably, "What kind of system is this?" How come I've never heard of it? ”

Duan Tianwolf said this, handing the PDA to Wang Lian, who had been staring at the server intently, "Master, have you ever seen this system?" ”

β€œqueenosοΌŸβ€ Wang Lian's expression was as dazed as Duan Tianwolf's, "I've never seen it." It's not like an ordinary civilian farming system. It should be some kind of special system used by the military, satellites or scientific research institutions. ”

"Could it be that this guy is using a special system developed by himself, just like me?" Duan Tian Wolf pursed his mouth with a headache, "What can I do about this?" ”

That's right, Duan Tianwolf is a genius, but he is just a genius, not a god. If you can't even figure out how the other party's system works, how can you hack in?

"Could it be that the first hacking permission was wasted like this?" Duan Tianwolf thought to himself a little depressed, "Even if I am reluctant, but with only two hours left, how can I possibly figure out this strange system of his?" ”

Just when Duan Tianluo felt a little helpless, he suddenly heard Wang Lian shouting, "This kid, he finally started to do it." He's starting to attack our servers in the same IP segment. ”

It turned out that after testing for a long time with various means, Sun Yunmeng realized that this firewall was more powerful than any kind of firewall he had encountered before, and it also had many hidden functions that he could not detect for a while.

In this case, it would be foolish to rush to confront it.

In that case, it's better not to fight it.

After careful consideration, Sun Yunmeng decided to bypass this terrible firewall, enter the computer first, and then find a way to get rid of this firewall.

"Anyway, that guy just said that if I broke his firewall, I would win, and he didn't say that it was a frontal attack, or a side attack."

Sun Yunmeng thought so, so he started to do it.

Generally speaking, except for super sites like Google, it is impossible for websites to build their own computer rooms because of financial resources, and they must host their servers under the name of a server host.

And this server host can't have just one customer, they usually have dozens to thousands of customers, and these customers are likely to be placed in the same computer room.

The server host gives each of these customers an IP address, and the IP range of these IP addresses is the same.

According to the Windows mechanism, when two servers come from the same IP range, they will have a considerable degree of shared trust rights. It's a vulnerability that hackers can do a lot of stuff.

Under this mechanism, the hacker only needs to select the weakest defended server in the same IP segment and compromise it, and then he can use this shared trust to create a low-level account with the server provider he wants to attack.

Creating an account on a server is the hardest and most complicated part of the offense.

Sun Yunmeng's offensive method had long been expected by Duan Tianwolf and Wang Lian.

There is no doubt that this is the most labor-saving method, but Duan Tianwolf and Wang Lian have no way to stop him from doing this, so they can only watch him do it.

The firewall made by Duan Tianwolf is like an extremely advanced security door, and it is extremely difficult to enter through the door. But unfortunately, one of his neighbors was so careless that he even forgot to close the door. At this time, the thief enters through the door of someone else's house, and then climbs from his balcony to your balcony to achieve the purpose of entering your house.

Unless Duan Tianwolf broke into the server that Sun Yunmeng had invaded now to fight him, he couldn't stop it at all. The firewall only protects itself, not the servers in the same computer room.

And even if Duan Tianluo broke in at this time to prevent Sun Yunmeng from successfully invading that computer, he could imagine that Sun Yunmeng would definitely immediately command his huge botnet and launch an attack on all the servers under the same IP segment at the same time.

Even the greatest general could not command a scattered peasant army against a million-strong army.

The same is true for Duan Tian Wolf, even if he has three heads and six arms, it is impossible for him to protect these servers that are not organized by an effective security system with the power of one person.

Wang Lian was also clear about this, he smiled and said, "Heavenly Wolf, in fact, this person is not as arrogant as he shows. At the very least, he knew that he should not attack by force, but by a more labor-saving method. ”

Wang Lian was unintentional, but Duan Tianwolf was the listener's intention, and he muttered to himself: "Yes, a more labor-saving method of attack...... When it comes to special operating systems, Siemens is one of the largest developers of electronic equipment in Europe, and they must have a lot of information about special operating systems. I have a back door there anyway, so why don't I check it out? Maybe I'll be able to get some useful information there. ”

As soon as he said this, he heard Wang Lian beside him say: "It is one time to deal with this golden holy dragon, and it is another time to enter Siemens again, but you have used up the permission to invade twice this time." ”

Listening to Wang Lian's words, Duan Tianwolf thought for a while, breathed a sigh of relief, and said, "Okay, it's worth spending two malicious intrusion permissions for this person. ”

After Duan Tianluo finished speaking, he immediately used the back door to enter Siemens' system.

After entering the system, Duan Tianwolf immediately began to search for the directory, and after about a minute, he saw a message, and its directory was clearly written - quuenos.

As soon as he saw this, Duan Tianwolf's eyes suddenly lit up, "Such a coincidence? This system turned out to be developed by Siemens? ”

After exclaiming, Duan Tianwolf immediately opened this catalog and began to read.

Quuenos is a new operating system developed by Siemens in the first half of 2006. It was specially produced for the American CNN broadcast network, a state-of-the-art television relay satellite.

The system has a multi-working mode, a multitasking mode, and can handle trillions of requests at the same time.

It has a maximum bandwidth throughput of more than 3000G and has three sets of security firewalls with read power.

The first set of hardware protection walls with reading power CPUs can withstand massive data attacks of more than 3000G.

The second set has the latest attack virus firewall developed by the European consortium for the A47 spy satellite. This firewall can initiate an autonomous backup power supply to scan the hard disk and internal memory for all suspicious code and remove it in all system shutdown mode.

The third set, the spy identification system, the latest security identification system developed by NASA, is divided into pupil mode, fingerprint mode, voice mode, password mode, and DNA mode. There can be multiple combinations of modes to achieve authentication.

After reading this short introduction, Duan Tianwolf finally understood that this IP address was not Sun Yunmeng's IP address at all, but a satellite of the CNN radio and television network in the United States.

And it is one of the most heavily defended satellites in the world today.

After understanding everything, Duan Tianwolf couldn't help but high-five, first, he praised the American company for being really rich, and second, he praised Sun Yunmeng's technical strength was really strong, and he actually used such a perverted satellite as a springboard.

What is called luxury, students, this is called luxury.

(To be continued)