Chapter 64: Counterattack
Chapter 64: Counterattack
With the sound of the alarm, the warning lights in the computer room also flashed with flickering red light. Sun Dongyang suddenly changed from an attacker to a defender. The offensive and defensive changes are changing too quickly. Moreover, the opponent's attack is not only fast but also very vigorous, otherwise ordinary small attacks will not trigger the alarm of the host firewall. Soon after receiving the alarm, three more technicians from the National Security Bureau walked into the computer room and sat in their seats, taking over the emergency plan formulated in advance and starting to deal with this wave of cyber attacks.
The energy level of this wave of cyberattacks is high. Soon the peak traffic climbed to 100Mbps and counting. This battlefield without gunpowder smoke was full of swords and swords in Sun Dongyang's eyes, and the bloody rain and bloody wind. Just now, I wanted to rely on the powerful amount of computing to form an iron fist to smash through the opponent's defense. Unexpectedly, the other party still formed a data storm of colors and huge data packets in a blink of an eye, and flocked to the host of the National Security Bureau with an overwhelming momentum.
"How's it going for you?" Sun Dongyang can't care about tracking down Internet rumors now. The key at hand is to protect the NSA's computer servers. You must know that a lot of important information in the city is stored here. There is no room for error in this machine. Number one is responsible for monitoring the firewall. Although the NSA has three hardware firewalls on its host, and it is very intelligent, it can deal with most malicious attacks. But no matter how intelligent a machine is, it can't compare to a human. Sometimes some of the tricks that can fool the machine can't escape the eyes of people. Therefore, man-machine cooperation can make the defense perfect.
At this time, No. 1 was flying his fingers, and his fingers rained down on the keyboard. Command after command came from him. Each command with a surname sends out a slightly smoother curve of traffic increases, but then it is drowned out by a larger number of data requests. Hearing Sun Dongyang's question, No. 1 didn't raise his head, and replied while staring at the screen to input instructions: "It's still under control, but the enemy's attack has not yet reached the limit, and the amount of data attacking the firewall is increasing." At this rate, our first firewall will last up to thirty minutes. Head, I don't think this is an ordinary hack, it's a premeditated and organized attack. ”
Sun Dongyang himself is also wondering if the attack on the National Security Bureau has anything to do with the hackers he tracked down? Are they the same person or organization, or do they just happen to catch another wave of people launching a large-scale attack while they are tracking down the hackers? After thinking for a while, Sun Dongyang turned his head and asked, "No. 2, how are you doing over there?" ”
Number Two doesn't do it as often as Number One, only with the occasional click of the mouse. He is in charge of monitoring the traffic. Hearing Sun Dongyang ask, he said: "The surrounding data traffic is not abnormal, and it is preliminarily judged that it is an attack launched by the city." ”
The city? Sun Dongyang was slightly relieved. In his own one-third of an acre, Sun Dongyang is not afraid of any hackers. No matter how good your computer configuration is. No matter how high the level of hacking is, it can't be. Because he is backed by the banner of the National Security Bureau, he can use all kinds of forces to deal with hackers. Your hacker level is high, and I can directly issue an executive order to cut off the power and network in the entire area. At the extreme, I make you can't even buy instant noodles. No matter how good your hacker level is, you have to eat. It's not a contest on the same level anymore.
"Number Two confirms the exact location of the source of the attack as soon as possible." Sun Dongyang ordered.
"Yes, now we can only confirm that the target is in Dongcheng District. I'll refine the goal further," replied No. 2.
"If the attack doesn't stop within 20 minutes, call Unicom and kick all broadband users in Dongcheng District off the network for one minute." If there were other hackers standing in front of Sun Dongyang at this time, they would definitely scold him for playing Laipi. But Sun Dongyang didn't mind. In his eyes, so-called hackers hide behind networks and computers, like rats in sewers. As a rat exterminator, he doesn't have to deliberately compare his ability to burrow with rats. When you usually have nothing to do, it's just a matter of practicing your skills. When you really fight, poison, rat traps, boiling water, anything can be used, as long as you can kill the rats.
After reading No. 2, Sun Dongyang turned his head to look at No. 3's work. Three's job is to conduct internal self-inspections to prevent anyone from infiltrating the NSA's computers. However, the NSA's internal host firewall is very powerful, and it is almost impossible to infiltrate the computer without being detected by human monitoring. The No. 3 self-inspection is just a work step for the strict implementation of the emergency plan for the sake of safety. But what Sun Dongyang didn't expect was that there was no problem with No. 1 and No. 2, but something happened here on No. 3.
No. 3 frowned and looked at the monitoring screen and said to Sun Dongyang: "Head, there is no problem with the self-test results." But you look here. There seems to be something wrong with the memory side. ”
Sun Dongyang immediately rushed out to take a look, and sure enough, he found something abnormal. According to the contingency plan, once the alarm is issued, all people with super administrator privileges should be concentrated in the main control room. If you can't come, you can't log in to the host with super administrator privileges in other locations. Until the alarm is lifted. Now there are only four people in the room, but the host shows that there are five super administrators online.
That's why someone has to cooperate with the machine. It doesn't matter if there are five super admins or fifty super admins for a computer. As long as your login password is verified and the corresponding permission is obtained, the corresponding service will be provided to you. But this phenomenon immediately saw a problem in the eyes of Sun Dongyang and No. 3.
Displaying the processes in the memory one by one on a reading screen, Sun Dongyang immediately saw that the fifth super administrator was going in and out of the server, and even copying those originally confidential data. It's just that each of its commands is followed by a reverse command to eliminate the traces of the. So when the machine self-checks, you can only see the other four people's work, and in the machine's opinion, the fifth super administrator has nothing to do after going online. If it weren't for the fact that No. 3 had seen the anomaly from the changes in memory, he probably wouldn't have been able to spot it.
"Invaded!" Sun Dongyang immediately judged that the super administrator named baobao was a hacker who had invaded. It turns out that an attack on a firewall is just an illusion to attract attention. The real hackers had already sneaked inside the NSA's servers.
Sun Dongyang hurriedly pulled out his notebook and said to No. 3: "Quick, let's catch it together, we must not let it take the data out." ”
No. 3 had already fought Baobao before Sun Dongyang spoke. Both of them have super administrator privileges, and it's very difficult to compete for them within the same host. If you scratch my memory, I'll block your port and it's hard to solve for a while. This is the time to compete who understands the computer's instructions more thoroughly, and who can establish their own advantages and disarm their opponents faster and more accurately. In the case of everyone's level, the comparison is hand speed. Whoever can build more instructions in less time will have more computer privileges. Or remove the other party's permissions.
Hurry up, hurry up. Number Three hated himself a little bit for why he didn't change to a mechanical keyboard. He's being beaten back by that baobao. His hand speed was clearly not keeping up with his brain. But fortunately, Sun Dongyang will be able to join the battle to help himself immediately. Two people together don't believe in fighting, but this baobao.
Baobao also seems to know that No. 3 has a helper coming, and has significantly accelerated the frequency of attacks. No. 3, who was able to resist a little just now, immediately had a tendency to collapse. Sun Dongyang was about to help No. 3 take over the defense, when he suddenly heard an exclamation from No. 3, and then the whole person didn't move, staring at the screen.
"What's wrong?" Sun Dongyang asked. Before No. 3 could answer, he heard two more voices, exclaiming that they were from No. 1 and No. 2. Immediately afterwards, Sun Dongyang found that his keyboard and mouse were all out of order. Needless to say, No. 1, No. 2, and No. 3 exclaimed that they must have encountered the same thing as themselves. It turned out that baobao was fighting with Sun Dongyang and others for control of the server, and at the same time secretly hacked into their terminals. Remove the driver of the input device on their terminal. This time the bottom of the kettle is like cutting off Sun Dongyang's hands and feet, no matter how much ability they have, they can't use it. I can only watch as baobao takes over all the rights of the server.
It may only take a minute or two to re-launch the terminal, but this minute or two is enough for the other hacker to make waves. From the display screen, Sun Dongyang had already seen that baobao had begun to copy the file in a big way. Sun Dongyang immediately made a decision: "Cut off the internal network." ”
Sun Dongyang was still laughing at the hacker he was following just now and had to be chased and forced to disconnect the network, but he didn't expect it to be his turn now.
A lot of things go bad, and they get worse. In the main computer control room of the NSA, there is a wrench that looks like a switch. It was a mechanical device that was manually disconnected. Once it is pulled down, the internal network will be physically disconnected from the external network. This is a purely mechanical transmission. It's also impossible for any hacker to control it remotely. However, when No. 3 pulled down the disconnection mechanism, he found that Baobao's action of copying files was still continuing. It doesn't seem to be affected by the internet outage.
Is the mechanism that is off the internet out of order? Three ran to the back of the cabinet to find the network cables connected to the outside world and pulled them all off one by one. At this time, time was pressing, and No. 3 didn't care about picking them one by one, and directly tore off all the network cables with violence.
But at this moment, I heard Sun Dongyang yelling: "No. 3, what are you doing? Disconnect from the internet! ”
No. 3 looked at the severed head of the torn network cable in his hand and said incredulously: "Head, the network has been disconnected." Disconnecting from the internet has no effect. ”
Sun Dongyang ran over in disbelief when he heard No. 3's words, and it was also incomprehensible after seeing the broken network cable in No. 3's hand. NSA computers do not have modules for wireless connectivity. Why are the network cables torn off, and the computer is still on the Internet?
If this situation is due to the failure of the disconnected device, it is understandable. But if the enemy has any other ways that Sun Dongyang doesn't know about can connect to the NSA intranet, then the problem will be complicated. And it's not something that can be found out in a short period of time. The primary issue now is to stop the NSA data from being stolen.
In the event that the network disconnection does not work, the most effective way is to shut down the computer and restart. However, the NSA's computer is not like a personal computer at home, it is responsible for a large number of computing tasks at all times. Even if you want to shut down and restart, you must coordinate with other departments in advance. Otherwise, a rash shutdown may result in significant losses due to the tasks being performed.
Sun Dongyang had no choice but to say: "On the third day, you go and report to the leader, and restart the server if necessary." No. 1 and No. 2 changed terminals and I pestered him online, and he couldn't let him take more information away. ”
Sun Dongyang picked up the notebook and went online again with a tragic mood. The danger level of this hacker named Baobao in Sun Dongyang's heart has risen one step further. In fact, this hacker named baobao is indeed very powerful. He was still able to cope with the attack of Sun Dongyang and other three people. Leng Buding will also sneak attack the computers of several people in Sun Dongyang. Either delete the driver of the mouse and keyboard, or make the screen black. Even though Sun Dongyang and several people have strengthened their terminals before going online again, they are still frequently hit. It seems that baobao has a special experience in attacking input and output devices. Sometimes it just disables the computer keyboard of Sun Dongyang and several people, and a Enter key. Without the Enter key to enter commands, it is equivalent to paralyzing the entire computer. forced Sun Dongyang and several people to change the machine again. It's a waste of time to go back and forth.
Sun Dongyang and his two subordinates are like fighting a super difficult arcade boss. is constantly being killed, and constantly renewing coins to challenge. Fortunately, although Sun Dongyang and the three of them were very embarrassed by Baobao, the three of them also greatly delayed the progress of Baobao's copy and download. When the time pointed to half past four in the afternoon, the exhausted baobao who had made Sun Dongyang and several people exhausted suddenly disappeared. Data attacks against firewalls are also stopping at the same time.
Sun Dongyang sat down in his chair physically and mentally exhausted. He knew that this hacker called baobao was finally gone. "What about our losses?" was asked. ”
"The other party did not destroy the content of the server. Class A secrets were also not stolen. In Class-B secrecy, two samples of the virus were copied. Number Two replied.
"The request to restart the server has not come down yet. If it weren't for the other side's initiative to withdraw, our losses might have been even greater. Number One said. He has the fastest hand speed of the three. But in the battle with Baobao, he was completely blown up. made him fully aware of Baobao's history. That's not the speed of command output that humans can achieve at all.
"Yes, thanks to the other party who took the initiative to withdraw. But why did he retreat suddenly? Sun Dongyang asked. Just now, baobao completely occupies an overwhelming advantage. Isn't it supposed to be a hacker in that case to loot more data?
What Sun Dongyang didn't know was that half past four in the afternoon was the time for Shengquan Kindergarten to get out of school.
End of Chapter 64
Author: Thanks to the two guest officers of lscase and literati scratcher No. 1 for their tips
;