HK434 The Power of Hackers!

PS: Youmu has a 'like'? The praise index is so low that it hurts.,I implore you to support and support!.

The country of Vassan is a country that is both strong and weak.

The scientific and technological level of the country is very developed, especially in terms of electronic IT products, which almost occupies half of the market in the summer country, and the local electronic IT enterprises in the summer country cannot raise their heads.

Not only electronic IT products, but also various industrial equipment, automobiles, and even home appliances, also make Xia Guo's local products powerless.

It is such a powerful country of Wassan, but when facing the country of Lijian, it looks like a servile groveling. In the country, there are many areas occupied by the Lijian State, and military bases have been established, which is equivalent to renting . The world is the same.

For example, the Futenma Marine War Base in Okinawa Prefecture, where nearly 100 gunships are deployed in the Futenma Base, and there are even the latest secret weapons.

Located in the heart of Ginowan City, the Futenma base, which occupies 25% of the entire urban area, has been met with serious protests from local residents, but the government of Vausan Province has been unable to do anything about it.

Originally, at the end of 2006, the government of the country of Wasan and the government of the country of Rikenguo reached an agreement that the Futenma base would be completely withdrawn from Ginowan City in 2014, but until Shi Lei was reborn, there was no action from the country of Lijianguo.

Perhaps the governments of the two countries have long known that the so-called final agreement is just a pretext for détente.

Because the Putianma base, between the Wosang Kingdom and the Lijian Kingdom, there are full of open or dark battles, so Shi Lei found the Putianma base to start!

At this sensitive time, when the withdrawal agreement was signed at the end of last year, the Futenma base was the most capable of provoking trouble!

Jing Yayuan, Shi Lei carried a wireless headset to maintain communication with Yi Zuer. Looking at the data on the monitor, I put my hands on the keyboard and make the most final preparations.

"Yi Zuer, copy the Endless Defense System to the supercomputer Mine, once the Thunder can't withstand it, immediately start the Endless Defense System, use the Thunder's SA super administrator privileges, get all the computing resources of the Thunder, and provide full support for the Endless Defense System." Shi Lei first considered the worst-case scenario, in case it was in the military network. After being discovered, the supercomputer Lei Tie will not be able to keep it, so it is better to insist on the last little time for himself, let Yishuer clean up the connection records, and protect his real IP address.

This is also the reason why Shi Lei wants to win the permission of another supercomputer. You can't lose the swallow, can you?

"Sir, the Endless Defense System has been installed. Ready for Thunder. Turn on the Endless Defense System. Eater responded.

"So, let's get started!" Shi Lei took a deep breath, put his ten fingers on the keyboard, and typed quickly into line of code.

The time in the country of Wassang is only slightly later than that of the country of Xia, and it is currently more than nine o'clock in the time of the country of Xia. It was more than ten o'clock on the side of the Wassang Kingdom, and the time difference between the two sides was not large, and it was still in the first half of the night, and the main control computer of the Putenma base. There should be security personnel on duty, so Shi Lei must be very careful.

Shi Lei's main attack, Yishuer's detection and defense, time passed minute by minute, and the firewall of the main control computer of Putianma blocked Shi Lei's entry.

Because in the military network, Shi Lei could not forcibly attack, so as not to cause an alarm from the firewall, so he could only keep looking for vulnerabilities in the system.

Xia Guo time, close to eleven o'clock in the evening, Shi Lei finally discovered a system vulnerability in the main control computer of Putianma, and successfully entered the main control computer of Putianma.

Inside the Putianma main control computer, Shi Lei kept testing the situation of the permission group, wanting to get the corresponding information from the permission group.

After some hard work, Shi Lei obtained some basic information.

The Futenma base, as an overseas base, has great autonomy. After all, if there is an emergency and the war situation is changing rapidly, you can't always consult the Ministry of Defense of the Republic of China for everything, right?

Although the information of the Futenma base can be transmitted to the Ministry of Defense at any time, it is impossible for the Ministry of Defense to respond to information anytime and anywhere.

Therefore, the supreme authority of the Futenma base's main control computer has considerable autonomy, especially in terms of automated weapons, and the supreme authority of the Futenma's main control computer can be directly finalized without the need to be confirmed by an order from the Ministry of National Defense.

Shi Lei found this information, and his heart became excited, his choice was indeed not wrong. As long as you get the highest authority of the main control computer of the Futenma base, that

How powerful are hackers?

For ordinary people, most hackers are as powerful as they are gone, especially broadband access users, because they are dynamically assigned IP addresses, and hackers with slightly worse skills can't help ordinary users at all. And hackers with deep skills will not attack ordinary users unless they are idle.

However, for business users, having a fixed official website and a fixed server address is very vulnerable to hacker attacks. Hacking is nothing short of a disaster for business users.

As for the general public, before December 20, 2006, hackers were just a term for them, representing cyber stabilizers with powerful computer skills.

But on December 20, 2006, the earthquake hacker EQ explained to everyone in the world how powerful hackers are!

Through hacking techniques, earthquake hacking EQ, the loss of the country of Wassang is unprecedentedly powerful!

Because of the earthquake hacker EQ, the general public in the world knows what kind of destructive power a top hacker, especially a crazy top hacker, can cause in this society called technology!

Now, Shi Lei is ready to let the general public in the world know what else hackers can do, and how huge the power of hackers is!

Shi Lei's hands tapped quickly on the keyboard, starting with the operating system of the main control computer of the Putianma base, and slowly encroaching on the authority of the operating system.

Although the operating system of the Putenma base is very powerful, Shi Lei is not only a top-level hacker in the world, but also has computer skills for the next six years.

Even if Shi Lei became a monk halfway, most of his skills were learned from the pseudo-artificial intelligence Abertier of the Angel Council, but Shi Lei was also quite powerful!

"Sir, an anomalous data scan has been detected, and it's tracking us down!" When Shi Lei was cracking the operating system of Putianma, Yishuer suddenly issued a warning message.

Shi Lei's heart tightened. I hurriedly started typing in the code to disguise my own data stream.

A moment later, in the internal network of Putianma, a data scan scanned, and no disguised Shi Lei was found. Shi Lei breathed a sigh of relief, as long as he wasn't discovered, it would be fine.

"Izuer, continue to monitor the entire internal network. If there is any situation, report it in time! Shi Lei commanded and continued to crack the operating system of the Putenma base.

'Nima, I've already gotten the information to describe it. Why can't you enter the permission group? Shi Lei thought to himself, and suddenly he had a flash of inspiration.

Typing a string of codes, when Shi Lei pressed the Enter key, the main control computer of the Putianma base immediately expanded the access permission of the permission group.

And so it was! It's actually a dual-system combined operating system, both Linux. There's Windows again, it's so insidious! Shi Lei secretly despised in his heart.

The range of dual-system applications is narrow. The main thing is that the combination of two systems is very troublesome. And the degree of secrecy is no better than that of a closed system. Therefore, the dual system is gradually being eliminated by the closed system.

Entering the permission group of the main control computer of the Putian base, Shi Lei first began to secretly retrieve all the user information of the permission group. When the situation is not clear, Shi Lei will not tamper with any information of the permission group without authorization.

After all, I don't know the protection status of the channel permission group, what if the information is tampered with and an alarm is triggered?

When retrieving a permission group. Shi Lei has already prevented no less than ten alarms, which can be seen from how tightly the security settings of the main control computer of the Putianma base are. It's just a user who retrieves a permission group. More than 10 alarms were triggered.

Once you actually get started with the permission group, how many alerts will it be fired?

It took a few minutes, Shi Lei finally retrieved all the users in the permission group, in order to prevent the existence of hidden users, Shi Lei checked three times repeatedly, confirmed that there were no other hidden permission users, and then began to analyze each permission user.

The main control computer of the Putianma base, Shi Lei simply analyzed each permission user and checked the corresponding permissions. Since this is a military network, Shi Lei did not use his own password dictionary to analyze the password of every authorized user.

The analysis method of the password dictionary is to test the possible passwords many times, and if the password is tested incorrectly many times, it is very likely to cause an alarm on the main control computer.

With the corresponding permissions of each authorized user, after the analysis, Shi Lei finally chose the highest authorized user. Only the most privileged users can call on all automated weapons at the Futenma base.

In order to obtain the highest privilege user, Shi Lei began to think about what he should do to obtain the highest privilege. According to the analysis of the corresponding code of the permission group, Shi Lei got a piece of information.

The highest authority user of Futenma's main control computer, because of his great authority, can directly use all of Futenma's automated weapons without going through the Ministry of Defense of the country.

Therefore, the password of the highest privilege account of the main control computer of the Futenma base changes every day. For example, today's password is ABC, then tomorrow's password is definitely not ABC, it may be ABD, or CBD.

The password will change again the day after tomorrow!

Every day, the password is different!

Since a new password is adopted every day, the security of the password is greatly ensured and prevented from being stolen by hackers.

In fact, changing a new password every day is really effective in preventing hackers. After Shi Lei learned this information, he was also quite distressed.

Even if he wants to get the password, it will take a lot of effort. Moreover, there is a certain chance of being discovered. The internal network of Futenma Base is included in the military network of the Liberian State. It is impossible for Shi Lei to operate unscrupulously in the military network, and he must maintain his own concealment.

'Damn Futenma base, it's actually a way to change the password every day, I hate it! ’

After complaining, Shi Lei began to carefully check the file system of the main control computer of the Putenma base, wanting to search for any clues from the file system.

However, Shi Lei found something that made him cry and laugh

(To be continued.) For mobile phone users, please go to read. )