Chapter 175: Sleepy Pillow (II)

Zhang Yang didn't go to the anubis forum, although the information in anubis may be more complete, but there are a lot of news like this in anubis, even if someone publishes some posts, I'm afraid it won't be too detailed, and some hacker forums in China are different, although these hacker forums may be relatively backward in learning materials, but in this kind of news, there are naturally people who have been irrigating the forum for a long time to release the latest news.

Zhang Yang didn't go to other places either, and with the Black Alliance Forum entering the formality, there should be a lot of this kind of news. After logging in to the Black Alliance forum, he searched for the latest post, and Zhang Yang quickly found his goal. The title of the post is called: The perfect analysis of the hacking incident.

Click on this post and read it.,Zhang Yang has a feeling of crying and laughing.,This post is very detailed.,It's so detailed that it's a little verbose.,But the main thing is not clear.,In general, it's just a bunch of nonsense.。 turned it off a little depressed, Zhang Yang found a few posts with similar topics, and then found a comment with the most replies and clicked in.

The introduction of this post is more detailed, and everything has been said, especially the things that Zhang Yang wants to know most also have a general report. When he saw the last part, Zhang Yang's face was unusually strange, and he didn't know how to describe it.

Is there really a situation where someone gives you a pillow when you fall asleep? Well, although Zhang Yang is not very satisfied with the outcome of this incident, at least in the analysis of these posts, the "invincible" image established by GSCSD in the hacker war has suddenly shattered a lot.

When that gscsd retreated, it was tracked by a few masters, and there must have been other hackers staring at that server at that time, and there were mostly domestic hackers, so it was not uncommon for someone to follow and watch the excitement, but these tracking masters tracked until a first-level broiler was gotten rid of by that gscsd, so difficult, at least in the eyes of these rookie hackers, it was quite difficult, in the eyes of these rookie forums, the great god should play seckill when he shot!

That's called the Great God! Whether it's getting rid of enemies or hacking servers, you should kill them in seconds to be called a god! Although in the eyes of Zhang Yang, this hacker can get rid of the tracking of seven or eight masters in such a short period of time, the strength of this hacker master who pretends to be GSCSD is already very good, even if it may be a little worse than Zhang Yang, but it is also because Zhang Yang has the technology that is several years ahead of the world, not the strength between the two themselves.

Of course, these rookies don't care like this, so the person who posted this post, although he explained the process of the matter, still showed a little "disappointment" with GSCSD. Zhang Yang's mood was a little strange, he had just finished pretending to be a god not long ago, and now someone was pretending to be him, although Zhang Yang believed that if it was him at that time, it should be better than this master's situation.

But these are not the most critical, the most critical, as soon as this master pretends to be, it is very beneficial to Zhang Yang's current situation! If Bai Su is an agent of national security, then Zhang Yang is really not in the dormitory at noon today, but eating outside, this is the biggest witness!

Of course, it would be even more perfect if that master could compare the retreat of the bull fork and get these people to follow. Zhang Yang thought a little. Of course, the depressed GOD didn't know that he not only didn't make GSCSD depressed, but inadvertently helped GSCSD the most.

When I did this, God didn't tell anyone, and in the end, I almost stole the chicken and didn't lose the rice, and I lost myself, even if I didn't finish it completely in the end, but I lost a first-class broiler, which was the biggest loss in the eyes of other hackers, so after coming back to my senses, God made a decision, he would never tell anyone about it, otherwise, it would be too embarrassing.

Of course Zhang Yang doesn't know God's depression, he is almost happy to pump at this moment, this is that baby, so solid, is it because God has reborn himself, and he has also regarded himself as the protagonist, so as not to make himself too ugly? That's why you made such a show?

After figuring out the truth of the matter, Zhang Yang ignored King and Gao Gang, and directly took QQ offline, Zhang Yang pondered for a while, and quickly turned on the No. 1 satellite, taking advantage of Bai Su's absence, Zhang Yang had to confirm Bai Su's identity, although he guessed that Bai Su should be an agent of the Internet Supervision Bureau, but Zhang Yang had no evidence to directly prove it, and some plans could not be implemented.

Zhang Yang did not directly pay attention to the national security server, in fact, the network utilization rate of the national security is not high, at least externally, but how many things inside it are through the network, Zhang Yang has no way to determine, the domestic is different from the United States, large-scale network applications are almost all over the entire country's military system.

One of the reasons for the strong combat effectiveness of the United States ~ army is the joint command combat system! The joint control capability of all arms of the armed forces surpasses that of any other country in the world at present, and this is an unavoidable disadvantage at home; in modern warfare, the joint command and combat capability is quite important and prominent, and the coordination of all arms of the armed forces is the king.

Therefore, the US military system has a common interface, even if the intelligence departments of countries such as CIA, FBI and NSA, their intelligence network systems are relatively readable, but they can also quickly access the military system at critical moments, and complete the complete deployment to provide intelligence support for troops at all levels operating overseas!

The advantage is that in today's relatively peaceful international environment, there is no unified system, and the speed of intelligence transmission is not much slower, but the price for the enemy to obtain intelligence is much higher.

Especially in terms of network security, the pressure on national security is much less, after all, his internal intelligence system is not unified, and even if hackers hack into an intelligence system, it is impossible to get all the information. That's one of the few benefits. At least there is nothing to do about publicity, domestic public opinion monitoring is actually quite powerful, unlike the United States, all departments are responsible to the people, so many of his intelligence department systems are almost public.

And some domestic intelligence department systems are not open to the public at all, if you want to hack these systems, you have to at least find them, right? The search process is more troublesome.

Therefore, Zhang Yang is not ready to invade the national security system, even if he invades the network system of the national security branch in H City, he may not be able to find his own information, Zhang Yang secretly invaded the public security system of H City.

In fact, the police academy cannot train the talents needed by the national security, so most of the national security talents are transferred from the army, then enter the police system, and finally assigned to the name of the national security.

Compared with the national security system, the network popularization of the police system is much more comprehensive and unified, it is not difficult to enter the public security system of H City, the difficulty is to get the advanced account of the public security system, Zhang Yang is not just as simple as intrusion, he must also get the system's high-authorization account, so as to find the information he wants in the public security system.

In fact, this is two concepts from the usual intrusion of the administrator account, since the invasion is successful, then it means that Zhang Yang has the administrator account of the system, but this system is just a server system, and does not represent the entire public security system, which is completely different.

To use the most vivid analogy, the system administrator account obtained by Zhang Yang's invasion is just to log in to your computer, but he wants to steal your QQ, not to know your computer system management account, but also to get your QQ number, and crack your QQ password.

Probably this is the case, the public security system is also divided into two, one is similar to the local area network like a large wide area network, all the public security organs in the country are in this network, and the other is in this wide area network in a data network library, the host of this system is in the data center of the Ministry of Public Security, and the local public security organs to access this database, what is needed is an account number and password.

Unless Zhang Yang hacked the server of the Ministry of State Security, otherwise, he still needs to hack this account, relatively speaking, it is much easier to hack the account than to hack the main server of the Ministry of Public Security. That server has confidential information from the Ministry of Public Security, and there are various security mechanisms in it, and it is not impossible for Zhang Yang to want to invade, but he has to consider the consequences of the invasion, and more importantly, if he wants to find information in it, he must invade quietly and leave quietly, which takes a lot of time.

Regardless of the country, the servers that store important intelligence data are extremely tightly guarded. In the public security system, Zhang Yang easily found the computer of the director of the H Municipal Public Security Bureau, in fact, it is not difficult to find this in the internal network.

It took less than twenty minutes,Zhang Yang used the infected insect to easily invade the computer of the director of the public security bureau,In 04 years,The popularity of the network is not particularly fast,More importantly,In this era,Qualified people who are the director of the public security bureau are probably over forty years old,H city is a municipality directly under the central government,And in H city,The director of the public security bureau must be one of the members of the Standing Committee of the municipal party committee,That is, provincial and ministerial officials,People of this age,At least forty years old,How many people of this age are proficient in computers and networks?

This provides a big enough loophole, you know, the director of the public security bureau of the municipality directly under the central government definitely has a high level of authority in the public security system, and these officials themselves may not understand network security, and can complete the basic work of computers, it is already the result of careful learning.

In the system, Zhang Yang easily found a login information, the director's personal computer security is the responsibility of the network supervision detachment of the public security, such as the personal computer of an official at this level must have a lot of important information, so the system has backups.

After retrieving the login information file, Zhang Yang found what he needed with little effort. With this login account and password, the rest is simple, directly use the director's computer as a springboard, Zhang Yang quickly logged in to the public security database, and then directly used the advanced authority of this account to retrieve.

(To be continued)