Chapter 53: Buffer Spill Zone

"Huh? Why are so many IPs popping up in this server all of a sudden? A sound of surprise came out of the mouth of the eldest brother.

When the five of them fiercely launched all kinds of attacks on the IP source, the other party did not take any action, and even though the five of them bombarded indiscriminately, they still ignored it, and they all seemed to have some doubts in their hearts about whether this person was alive. Although I thought so in my heart, the actions of my subordinates still did not relax at all, all the way through the level, 1000 broilers were eroded and destroyed by them, and when they were attacking one of this person's broilers, a large number of IP source points suddenly appeared in this server.

"Did we fall for it?" The Cun Mang Group is famous, and it is a strange behavior of contacting this person to fight back, and some people in the Cun Mang Group are puzzled.

"Then why don't they attack?" Someone in the Cun Mang group expressed their doubts when they heard this.

"Don't worry about it for now, let's talk about it." At this time, the eldest brother in the Cun Mang group said.

When the words fell, everyone's attack flow appeared in front of the firewall of the Peking University server in an instant, and when it was about to be hit solidly, the three attack flows suddenly appeared in front of the five attack flows and the erosion flow, and the next moment, they collided in the eyes of everyone.

Duan Tao had an evil smile on his face at this time, he liked this style of the Cun Mang Group very much, and he started to attack without saying a word, which was also one of the reasons why Duan Tao chose the Inch Mang Group.

"Cousin, are you going a little too far?" Duan Xiao's eyes were full of surprise, he actually asked a hacker organization to bombard the server of Peking University's academic affairs system, undoubtedly this is a crazy move, you have nothing to do, and you can't bombard other people's educational affairs system.

"Cousin, who knew we did it?" Duan Tao also expressed the doubts in Duan Xiao's heart.

"yes, we really didn't do anything." Duan Xiao also understood at this time, and said with a smile.

After the two looked at each other and smiled, they tacitly chose to shift their eyes to the electronic screen, and watched this battle with great interest, which had nothing to do with the two of them.

The three attack streams over the virtual battlefield did not disappear at the moment of contact, and at the edge of the erosion of the attack streams on both sides, it was as if something was wriggling, and the beautiful beam of light also burst out at the moment of impact. The six attacks in groups of two and two were flying over the battlefield, and between the flashes, the erosion was also extremely hot, and the beams of light emitted from time to time at that time could be seen.

"Hiss..." Seeing this situation, everyone at Peking University also gasped in their hearts, as if the temperature around them also plummeted between breaths.

In front of the computer screen, everyone was dumbfounded. This level of attack is the first time I have seen it in my life, and compared with the battle between myself and Nankai, it is undoubtedly a few levels higher. Although he himself learned the knowledge of computers, he had never experienced this kind of scene of battle, and he had fantasized countless times that he had become an extremely rebellious hacker, but this fantasy also died when he became a hacker rookie.

At the same time, the remaining two erosion streams are rushing towards the firewall of the Peking University academic affairs system, constantly changing various different shapes in this rapid approach, but the state is extremely shocking to everyone, I don't know if the protection personnel of the Peking University academic affairs system can resist this sudden hacker attack, and look at this attack, the other party is obviously not a fuel-efficient lamp.

Boom...

A silent muffled sound sounded at the same time as everyone's hearts were frightened, and the eyes staring at the computer also contracted rapidly at the same time.

The erosion of the attack flow of the two sides came to an abrupt end with a flash of the screen, and everyone wondered who had won? Because under the erosion of the flickering back and forth between the two sides, the students of Peking University can't tell which attack represents which side. With his eyes full of doubt, he stared at the rest of the attack stream that stayed in the posture of a victor, as if the air was also slightly stagnant.

Obviously, this state is not sustained, and the rest of the attack flow is going towards the bombardment of the Great Firewall in an instant...

At this time, in the academic affairs system of Peking University, the usually black computer was shining at this time, and three of them were displayed in front of the display screen of the current moment, and the other two were quickly refreshing the data. Through the faint fluorescence emitted by the monitor, you can see the five people sitting in front of the computer, and there are some beads of sweat on their foreheads that seep through their pores and then converge.

Drip ...

Hearing the sound of dripping suddenly resounding throughout the room, the sound of tapping on the keyboard was significantly faster. After watching the progress of the firewall being broken from 20 percent to 80 percent after being attacked, the appearance of the five people in the ordinary day also disappeared, and was replaced by an incomparably dignified one.

"It's over, they have eroded to the second layer of the firewall, and the other layer is the firewall that completely destroys the education system, and at that time, the firewall has also become an ornament for them." A middle-aged man with a flat head said.

"They are so powerful, the second layer of firewall is encrypted with the encryption method of doll system files, and they were able to crack it in such a short time, which shows that this person is extremely familiar with this encryption method." A middle-aged man with glasses and unusually neatly combed hair said.

"Li Chen, hurry, carry out anti-erosion, if it continues like this, the consequences will be unimaginable." An unusually tall man shouted without looking back.

"I also think, I don't have time to do any anti-erosion, I'm reinforcing the third-layer firewall, and now they are not moving, they should be collecting information from the third-layer firewall, so I must now adjust the third-layer firewall data and disrupt the data collected by the other party, only in this way can the other party's erosion time be prolonged." Li Chen, a middle-aged man with a flat head, also replied.

"Lin Tian, the three of you take the initiative to attack, if you just wait for others to attack, this is too passive, and it will not do us any good for our defense." At this time, another person who cooperated with Li Chen's defense said.

"Okay..."

At this time, on the battlefield, the three attack streams emerged again, that is, in the eyes of everyone, they collided with the attack flow of unknown hackers, but this time there was no previous erosion, and the three attacks in Peking University disappeared in an instant and disappeared on this battlefield between the collision with the opponent's attack stream.

The remaining three attack streams were straight towards the crumbling Great Firewall...

"It's not good, Li Chen, quick, turn on the hard disk connection in the data buffer overflow area..."

The other party's three attack streams are undoubtedly much stronger than before, so that the anxious state did not appear, obviously the remaining three attacks are also the five people who change color, if they are hit by the solid bombardment of these three attack streams, then the firewall of Peking University is obviously unable to withstand it.

Buffer overflow area is a kind of hard disk proxy that grafts the opponent's attack data to its own side and is ready for the other party to attack, and through a specific program it can produce a connection between the firewall and this hard disk, and after this connection is opened, 60% of the opponent's attack flow will be transferred to the proxy partition of the hard disk, so as to reduce the strong damage of the attack flow to the firewall. After the hard disk is attacked, it will generate high temperatures in order to process the data stream, which will cause great damage to the hard disk, and the worst thing is that when the temperature reaches the limit temperature of a hard disk, it is possible to burn out.

"Lin Tian, you turn it on, now the other party's erosion hand is also extremely eroded, and I must not free my hand here." Li Chen also said quickly when he heard this.

"It's already on, quick, the three of us try our best to unload the remaining forty percent of the attack data." Before Lin Tian could finish speaking, he opened the connection program in the buffer overflow area, but the buffer overflow could only overflow sixty percent of the attack data, and the remaining forty percent still had no power to withstand the current state of the firewall.

Therefore, forty percent of the attack data flow is still a great threat, and the only way to completely resist it is to resist it, so Lin Tian immediately said to the remaining two. When the two of them heard Lin Tian's words, they were also slightly shocked in their hearts, and they did not say anything against it, and the speeding keyboard tapping sound was the best response.

Unloading the remaining 40 percent of the attack flow,In fact, it's not too difficult,It's just that the attack flow needs broilers to resist,Although it's not too difficult,But this is a dangerous surname with a great exposure of identity,But this dangerous surname is a fatal wound for other hackers,But for people who take the defense of Peking University's educational affairs system as a profession,There is no doubt that there is no danger at all。

The three of them quickly moved their IP source points from the periphery of the server to the penultimate layer of firewalls, and when the three of them just arrived at the backdoor after the second layer of firewall was eroded by the other party, then the attack flow came as scheduled, bombarding the human firewall forged by the three of them...

Presumably, the opponent's erosor also handed over the eroded backdoor to the attacker, and attacked directly from the backdoor, which can reduce the attack flow and cause unnecessary losses in the new destruction of the firewall. Therefore, Lin Tian and the others also chose to use their IP to block the eroded vulnerabilities in the firewall.

At the moment of the bombardment, the three of them also saw the broiler that disappeared rapidly, and they were also slightly heartbroken, after all, it was the broiler that they had worked hard to find, and they were destroyed by the other party's attack flow, and they were really unwilling in their hearts, but was there a better way to solve the dilemma in front of them.

The broiler melted like a snowflake, and it also stopped abruptly in a few breaths, and the three of them looked at the remaining number of broilers in a daze, and they also had some guesses about this result in their hearts, but they were still extremely shocked, Lin Tian's five hundred broilers were only more than ten left, and the other two eyes were a little dull, because their true IP had been exposed, but this was also irrelevant, and it had no impact on the battle.

"Huh? Not broken yet? Resisted? "The eldest brother who took the lead was also a little puzzled at this time, and the three extremely not weak attack streams were completely resisted by the other party?

"Big brother, they used the buffer overflow area to graft 60% of the attacks, and the remaining 40% of the attacks were also offset by the opponent's broiler at the backdoor of the second layer of the firewall, so those three attacks did not touch the third layer of the firewall in the slightest." An erosive hand also explained.

As for the reason for the silent disappearance of the attack flow, there is no doubt that the erosive hand who was already in the server of Peking University knew very well, and when the eldest brother asked, he responded.

"Oh, I see? If it's a grafting artifact like a buffer overflow zone, then I'll see how much more attack data streams you can spill over me? The eldest brother who took the lead also said jokingly.

ps: My mother had surgery, although during the care, because there was no bed, I also stayed in the Internet café for two nights, which is called a tired, and I don't want to be more, sorry.