Chapter 135: The Hacker War (I)
After quickly turning around the major websites, Zhang Yang returned directly to Tencent's server, although Tencent has just been listed, far less than Zhang Yang's previous life, but even now, Tencent's registered users have exceeded 100 million, and if such a huge user profile is cleaned up, it is not just a loss for Tencent.
This is a slap in the face, a slap in the face of the entire Chinese hacker community, or the face of the whole of China! Zhang Yang can't afford to lose this person, but the other party is a large-scale invasion, and Zhang Yang's strength alone is extremely limited, and now he needs some masters to cooperate, such as God.
Zhang Yang doesn't have to think about it to know where God must have shot at this time, but if the cooperation is not good, this is the same as fighting, and it is easy to be broken by the other party.
After scanning Tencent's server, looking at the same dozens of other data streams, Zhang Yang didn't care about these hackers, anyway, I'm afraid they are just some hackers in China, and the technology is not high, as long as they can bring trouble to the other party. Soon Zhang Yang found an abnormality, and the entire Tencent server Zhang Yang has not checked, but some of the previous ports have been closed recently.
And the data stream of those attacks just now was quickly tracked by the other party, and it is obvious that these people also regard Tencent's server as the main battlefield. After hesitating for a moment, Zhang Yang started to do it directly, and now he doesn't have time to contact those people in King, and now there are some hackers who are launching flood attacks on Tencent servers, that is, DDOS tide attacks, but Tencent's servers are already quite a lot, and the surname can be equally powerful, if you can't find a sufficient number of super servers to attack collectively, it won't have any effect at all.
If you want to achieve this effect, I am afraid that you need a large data center to have about the server resources. Even the flamboyant 1 satellite is unlikely to do that.
Tencent's server uses the UNIX system, produced by IBM, and there is no doubt that the server capabilities of IBM Blue Giant are not bad, and the Linux system has its own strengths. After scanning, Zhang Yang quickly found the vulnerability, although these hackers are very powerful, and almost all the vulnerabilities of the Unix system have been marked, but unfortunately, the vulnerabilities that Zhang Yang has in his hands are not only the latest, but also many vulnerabilities that will be discovered after many years.
I don't know if anyone has found these vulnerabilities now, but he at least has at least three vulnerabilities on this system, Zhang Yang's intrusion ability is not the same as in the past, it is very convenient to have loopholes, in less than three minutes, Zhang Yang directly broke through the enemy's first layer of firewall.
As soon as he broke through the first layer of firewall, Zhang Yang found more than a dozen data streams active in the server, only three of which were obviously enemy and defensive, while the rest were offensive data streams, which seemed to be domestic hackers. A system that closes all ports and breaches is not invulnerable, but only reduces the chance of infiltration.
It's like the first layer of firewall just now, even if there are no loopholes, Zhang Yang has six or seven ways to break through its perimeter firewall, although these hackers have invaded Tencent's servers, but the firewall is still Tencent's own firewall, they just patched and closed some ports.
However, as one of the largest network service providers in China, Tencent's firewall is naturally not too strict, and there are some even if they are not system vulnerabilities, but hackers can take advantage of not only system vulnerabilities, but many normal access requests can be exploited by hackers.
Zhang Yang did not launch an attack on the second layer of firewall at the first time, he paid a little attention to the dozen or so data streams of domestic hackers, Zhang Yang soon found that four of these data streams were obviously together, and the cooperation was quite tacit, and two of the other party's three data streams were dealing with the attack of these four data streams.
Although the war between hackers is bloodless, the intensity will definitely not be inferior to the real battlefield, and the modern battlefield is different, here is more like the ancient kind of battlefield, the two sides are like two cavalry, after the charge, they collide together, and the countless codes entered by the keyboard under their hands are their weapons, it depends on who can give each other a fatal blow.
"Shenyue kills! You bastard, are you two okay, the other party's strength is very strong, I'm afraid it's at least within the top twenty in the world hacker ranking of Anubis! The four of us can't take this server. Lan Mo's voice quickly sounded in a chat room.
All the members of the pomegranate skirt group are all in the list, they don't have time to type and chat, and there are countless codes in their hands waiting for them to type.
"Eldest sister, you wait, how can it be so easy, although they don't have anyone here to defend, but we are fighting fires everywhere!" The sound of Shenyue killing in a hurry also sounded.
"God, did you find the other party?" Lan Mo asked hurriedly.
"Scanned, the other party's IP is all over the world, and at present I can find a total of thirteen people, and everyone's strength is almost the same as ours, there are only seven of us, counting the two people in the national security, we only have a total of nine people, which is not enough to stop each other, and I have a hunch that the other party still has a trump card that has not been taken out, don't forget, we are not completely resolute about the assassin virus at present." God's slightly deep voice quickly uttered his analysis.
"Don't worry about these for now, god, you come over to help, let's get Tencent's server back first, no matter what, we can't let the other party steal all Tencent's user information, and then publish it, right?" Lan Mo said quickly.
"I see, give me 1 minute." God said quickly.
Zhang Yang didn't know that these four people were Lan Mo, Orange Years, plus the two brothers of cumin mutton and roast whole sheep, while Shenyue Kill and Lone Bamboo Remnant Dream were in charge of other portals, so let's get these portals back first.
Zhang Yang didn't take the initiative to attack, he was analyzing the actions of these people, looking for the best opportunity, the second layer of firewall Zhang Yang has already analyzed, there are not only firewalls in it, but also many honeypots and traps, once it is not handled properly, I am afraid that it will be bitten directly by the other party's tail, and if you can't get rid of the other party's tracking, you can only withdraw from this battle, let alone attack the other party.
But now, Zhang Yang didn't have time to analyze these honeypots, and after thinking about it, Zhang Yang quickly copied his firewall into several of his springboards, and turned on all the functions of the firewall, especially in terms of anti-tracking, Zhang Yang has turned on the two tracking viruses embedded in the firewall to the maximum. If anyone dares to track it, come and try it.
Zhang Yang is no longer ready to care about those honey pots, he is ready to directly "break into" those honey pots, track them down, Zhang Yang has enough confidence in his firewall, just in case, Zhang Yang copied the mother nest to the second layer of springboard, if the other party breaks through the outermost broiler, then in the second layer of broilers, the honey pot they planted will not escape the mother nest.
All this just took Zhang Yang more than 20 seconds, just after doing all this, the four data streams in Zhang Yang's monitoring suddenly cooperated with the fierce start to attack a vulnerability, the sudden rapid increase in attacks made the two defenses scramble, Zhang Yang's eyes lit up, almost didn't think about it, his hands instantly flowed quickly on the keyboard, and countless codes began to swipe the screen almost instantly.
The moment he launched an access request to the system, Zhang Yang directly opened a port through an internal vulnerability, and then he directly used this port as a springboard, and instantly entered the second layer firewall.
Almost after Zhang Yang used that port, the four data streams were captured instantly, and Zhang Yang almost got into it with his heels in front and back.
"Wow! God, you're so brave, I love you to death. In the chat room, Lan Mo let out a cheer.
"What's wrong?" God's strange voice rang out.
"What's wrong? Broke through the other party's second firewall, when did you become so powerful, and the timing was so accurate. Lan Mo said quickly.
"Wait, you've broken through the second layer of firewall? I didn't do it, I was just about to do it. Didn't I say I needed a minute? God was stunned for a moment, then immediately spoke.
"Not you? Who is that, this person's strength is also very strong, and we all know everyone who can do this in China. The cumin mutton instantly realized what God's words meant, and immediately asked.
"It's GSCSD!" After being stunned for a moment, God and Lan Mo almost shouted out in unison, only gscsd, a new person who came out of the people they knew, should have this strength, and now gscsd, which has never invaded any website, has finally made a move, and it is so sharp as soon as it strikes.
"Lan Mo, your vision has always been very accurate, analyze it, how is the strength of GSCSD? Especially in the Red Domain? God asked quickly.
"It's very powerful, I thought it was you who did it, the other party didn't contact us at all, and should have been hiding next to us, just at the moment when we just attacked, he directly captured our suddenly increased data flow, and launched an attack directly. And it seems that he has a system vulnerability, and it takes no effort to open a port with a big threat, and then directly drill into the second layer of firewall, and more importantly, he doesn't care about the number of honeypots and traps that the other party has placed in the second layer of firewall, and almost all of these things are triggered, which saves us a lot of things. Lan Mo paused, and then gave his opinion.
(To be continued)