HK056 Swallow returns next

The supercomputer swallow is a super-privileged user, and the chip is protected independently, which is indeed very difficult to deal with!

It can even be said that it cannot be handled!

However, Shi Lei is a high-level hacker in the world, and once controlled the supercomputer Yan. I know as much about the situation of the swallow as I know about my own hands!

The developer of the independent protection chip is the well-known chip industry leader Intel, and its quality is very reliable. It not only has an excellent hardware encryption system, but also has anti-static interference, current overload protection, etc., to ensure the safety of the chip itself!

However, it is precisely because of its thorough security that it provides a solution that can be exploited!

In his previous life, Shi Lei was also blocked by this independent protection chip. In a fit of anger, Shi Lei mobilized the software inside the supercomputer to manage the power distribution, bombarded the independent protection chip with a huge current, and instantly let the independent protection chip enter the current overload protection, and make the independent protection chip restart.

There is a gap of about three seconds from the automatic shut-off of the current overload protection to the restart of the individual protection chip. In these three seconds, the super-privileged user is in the point of no protection.

In the past life, and later supercomputers, there were no independent protection chips for this reason. Set up current overload protection, which is easy to be restarted by overload attack. However, if you don't set up current overload protection, it will be burned by the current directly!

The current overload protection method is a good way to fight against independent protection chips. It's just that there should only be a small number of people who know the method of Lu Dao now, and Shi Lei also took advantage of rebirth to know that Lu Dao is not a loophole.

Every supercomputer is a behemoth. The host of the supercomputer Yan, covering an area of two hundred square meters. The amount of power consumed by each supercomputer is also an absolutely terrifying number. Therefore, inside the supercomputer, there is an independent power management program that distributes the power consumption of each area. Shi Lei cautiously entered the power management program of the supercomputer Yan and retrieved the power management subprogram of the independent protection chip.

When he found it, Shi Lei immediately rejoiced!

Although the power management subroutine of the independent protection chip is locked, the entire power management program can be dissolved through the first-level permission, so as to unlock the power management subroutine of the independent protection chip.

Shi Lei did not hesitate to use his first-level authority to unlock the entire power management program, and then open the power management subprogram of the independent protection chip.

After the preparations were completed, Shi Lei did not immediately bombard the independent protection chip. Because, the independent protection chip overload protection is only a short three seconds. Shi Lei must elevate the account he created to super privilege within three seconds to prevent the independent protection chip from sending an alarm message to the security personnel on duty. Otherwise, it will fall short and it will most likely be discovered!

In his previous life, when Shi Lei bombarded the independent protection chip, it was when the hackers of the Xia Kingdom invaded the Vosang Kingdom on a large scale. The supercomputer swallow is the object of key care. Although Shi Lei bombarded the independent protection chip, an alarm message was sent out after the independent protection chip was restarted. However, the security personnel on duty of the supercomputer Yan were nervously dealing with Xia Guo's hacker intrusion, and they did not notice the alarm of the independent protection chip at all. As a result, Shi Lei repeatedly bombarded the independent protection chip, and finally seized the highest authority of the supercomputer Yan, and manually cleared the alarm information of the independent protection chip.

In this life, Shi Lei doesn't have so many chances, he only has one chance!

Within three seconds, the super privilege is seized, and the super privilege is used to block the alarm message of the independent protection chip. All in three seconds!

Otherwise, everything will fail!

The reason why Shi Lei bothered so much to obtain super permissions was not to directly graft the permission system inside the server system like he did with the server group of Aixin Company. That's because the system program used by the server group of Aixin Company is not complicated, and the supercomputer Yan's system is not only a professionally developed closed system, but also complex to death, and Shi Lei has no time to graft the permission system. Even if he had time, Shi Lei didn't dare to guarantee success! …,

Therefore, Shi Lei needs to obtain super permissions in every possible way, and then use super permissions to modify the internal permission system of the system.

Shi Lei began to write malicious programs inside the supercomputer Yan, first of all, to invade and elevate permissions, and write his own first-level permission users into the malicious intrusion program, so that after the program invasion was successful, he would automatically elevate his permissions and become a super permission user.

Then, a message interceptor is written, which is connected to the malicious intrusion program, and after the intrusion program is promoted to a level of privilege to super privilege, it will be authorized by the super privilege user to intercept the alarm information sent by the independent protection chip, and delete the record of the overload protection of the independent protection chip.

The last thing is to use the super permission user, retrieve the permission system inside the system, and then change the permission system to hide your own super permission user!

After the two applets are ready, Shi Lei connects them together, and then clicks on the power management subroutine of the independent protection chip.

"In the future, whether you will eat meat or drink the cold wind from the northwest, you will watch it all once!"

In the room, Shi Lei clasped his hands, pretended to be a handful of hypocrites, and begged for the gods and Buddhas.

The power management subroutine of the independent protection chip has been adjusted to five times the normal level, and once Shi Lei presses confirm, the independent protection chip will fall into current overload protection and restart.

Shi Lei connected two malicious programs to the server group of Aixin Company, and used this server group to fight against the supercomputer Yan. Capturing a supercomputer swallow requires a high-performance server to back it up, and that's exactly what happened! Once the backing server does not have enough computing power to hack into the super permission group and elevate user privileges within three seconds, then it's all over!

"It must be successful!" Shi Lei muttered quietly, and with a worried heart, he pressed Enter to confirm!

In the first second, a large amount of data flashed on the computer screen, and the screen kept swiping.

In the second second, a large amount of data was still swiping the screen, and a cold sweat broke out on Shi Lei's forehead, praying in his heart that the server of Aixin Company must be powerful!

In the third second, all data flows stopped, and at the bottom of the screen, two English words appeared!

Privilege.Escalation!

Elevated privileges!

Seeing these two words, even Shi Lei couldn't help but cheer!

Permission escalation means that the first-level permission is promoted to super permission!

Capture the supercomputer swallow, 99% successful!

As long as Shi Lei is not suddenly brain-dead, or he has taken the wrong medicine and is doing nonsense, the supercomputer Yan is about to return to Shi Lei's arms!

After obtaining super privileges, the message blocker successfully blocked the current overload alarm from the independent protection chip and deleted this record.

Shi Lei first used the super privilege user to start cleaning up his operation traces in the system's logs. Whether it is to elevate the permissions of iTrust, or to create your own new account, and to unlock the power management program, all these operation records are deleted.

After deleting all traces, Shi Lei did not relax his vigilance, but began to use super privilege users to enter the core of the system's source code, and then switch the system engineering mode to retrieve the system's permission system.

With super authority in hand, it is really a very refreshing thing, and the computing speed of the supercomputer Yan has finally made Shi Lei finally get back a little bit of the feeling of a peak-level hacker in the world.

The system permission system, in the engineering mode, is extracted by the super permission user.

Shi Lei is familiar with the road, just like modifying the server permission system of Aixin Company, he modified the permission system of the supercomputer Yan, and completely hid his supercomputer users, so that the original superusers of the supercomputer Yan could not be discovered. …,

Then, the back door of the system was opened, so that Shi Lei could freely enter and exit the supercomputer Yan. Even after the calculation task of Aixin is completed, Shi Lei can come and go freely at any time.

After typing the code with a smile on his face, establishing a new permission system for supercomputer Yan, and making multiple system backdoors, Shi Lei finally breathed a sigh of relief. At this point, the supercomputer Yan has been 99.9 percent and belongs to Shi Lei!

The last 0.1% of the system log is the log in engineering mode.

This log belongs to the special protection mechanism of the supercomputer, and it is also protected by independent hardware, even if the super privilege user is used, it cannot be modified!

However, that's just for ordinary people, and users with super privileges can't delete the logs of engineering mode. But Shi Lei is now in control of the supercomputer, a veritable pinnacle-level hacker in the world!

Controlling the supercomputer Yan, Shi Lei directly used the supercomputer Yan to use the current overload protection routine again, and the hardware that protected the engineering mode log fell into the self-protection of current overload, and then quickly deleted the record of his modification of the system permission system, and at the same time deleted the hardware record of the protection engineering mode log.

When the last record was deleted, it was deleted by Shi Lei. He typed the code and asked the supercomputer Yan to list the authorized user groups, his own super-authorized users were no longer displayed, and he could use the supercomputer Yan's super administrative rights. This means that the supercomputer Yan was successfully captured by Shi Lei!

In 2006, the world's ninth-ranked supercomputer, the pride of Wasang and the pride of Tokyo Institute of Technology, was successfully won by Shi Lei!

Thanks to Wasangguo and Tokyo Institute of Technology for helping Shi Lei take care of the supercomputer Yan, so that Shi Lei can use the world's ninth-ranked supercomputer without paying a penny!

After capturing the supercomputer Yan, Shi Lei cleared the supercomputer Yan, the internal application records of the Aixin company, one by one, and then returned to the Aisure company to clear the internal records of their server. It's just that Shi Lei didn't let go of the server group of Aixin.

After all, this is a group of servers comparable to small supercomputers, so how can it be abandoned?

How can there be a reason to eat it in your mouth and spit it out?

Cutting off the network link with the Wassang country, Shi Lei returned to the No. 1 server, and he clicked on the music player with a smile on his face. In the speakers, pleasant music came out again.

'Flowers bloom for whom, spring goes to spring and comes again, flowers say it waits for a person. ’

'Helplessly, the flowers are gone, and the familiar swallow returns'

β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”β€”

Friendly recommendation: Become An Yehou, Zhao Jin!

[bookid=2703696,bookname="Mixed Element Empire"]

PS: The recommended ticket task is still a little short~ but everyone will definitely be able to achieve it! Ask for recommendations, favorites, clicks!

Are there any tips and reviews?

The second phase of the small event, I don't know what's going on, the post is locked, the review is not passed, wait for the review!

β€”β€”

【Reward thanks】The big shopkeeper of the Chamber of Commerce, reward 200

,