HK948 Deep Invasion!

. June 4, just after midnight; South Vietnamese State, National Security Agency, Internal Network.

Shi Lei used the method of 'encircling Wei to save Zhao' to attack the internal network of the National Security Bureau of South Vietnam, and attracted all the power of South Vietnam's network security, which was originally attacking the origin of Dream Entertainment's main server supercomputer.

Originally, the main server of Dream Entertainment, the origin of the supercomputer, withstood almost 500 tflops of computing resources attack, and this level of attack put IWN Secret Network under great pressure.

Fortunately, such a huge number of attacks are also provided by distributed computing resources. Otherwise, IWN's secret network will not be able to stop it!

Shi Lei single-handedly hacked the official website of the South Vietnamese National Security Bureau, put on a posture, and tentatively attacked the internal network of the National Security Bureau.

After the return of the network security personnel of South Vietnam, Shi Lei still did not mean to give up, even if many network security experts from South Vietnam returned, Shi Lei was not afraid at all.

South Vietnamese cybersecurity experts did return to the country and worked hard to protect the NSA's internal network. As a result, the internal network of the National Security Agency has improved its defense power a lot, and Shi Lei has to face more security defense, as if it seems that it is more difficult for Shi Lei to hack into the internal network of the National Security Bureau.

In fact, this kind of situation also exists for Shi Lei. From Shi Lei's point of view, the network security experts of South Vietnam returned to the internal network of the National Security Bureau, and the origin of the main server supercomputer of Dream Entertainment was relieved, thus freeing up the computing resources of the IWN secret network, and Shi Lei could call the computing resources of the IWN secret network to attack the internal network of the National Security Bureau of South Vietnam.

Overall, Dream Entertainment is a cyber security expert with the South Vietnamese country. is basically at the same starting point, but Shi Lei has rescued the origin of supercomputers!

Jing Ya Yuan.

With his hands on his keyboard and quickly typing lines of source code, Shi Lei was analyzing the vulnerabilities in the internal network of the South Vietnamese National Security Agency. Yishuer currently controls the security of the entire Mirui technology system, and the IWN secret network is running at a high speed, so it cannot provide more help to Shi Lei for the time being. It will take a while for Yizhuer to adjust before the resources of IWN Secret Network can be integrated.

The performance of the Eater was limited by the performance of the hardware, and the supercomputer originated with a meagre 10 tflops of computing speed. If AMD's latest 'gift' to Dream Entertainment is assembled with a supercomputer with a theoretical calculation speed of 320tflops and handed over to Yi Zuer for control, then Shi Lei doesn't have to worry about the main server being attacked by the South Vietnamese State!

It's just a pity. The supercomputer, which was designed to have a theoretical calculation speed of 320 tflops, could not be put into service for the time being. According to AMD estimates, the supercomputer will be assembled by June 20 at the earliest.

Shi Lei's chosen assembly location is in Lijianguo, and it is located at AMD's headquarters, and the computing speed of 300tflops seems to be a lot at present. However, Shi Lei knows the future development of the Dao, and this calculation speed is nothing in the future. It doesn't matter if it's on the territory of the country.

Again. In this way, Shi Lei tried to show an attitude to the high-level of Xia Guo, that is, if Xia Guo did anything unfair to Dream Entertainment and Mirui Technology, Mirui Technology would not hang himself on the tree of Xia Guo!

"Yi Zuer, how is the occupation of the IWN secret network?" Shi Lei typed in the source code information and asked Yi Zuer. Information about IWN's secret network.

Yi Shuer quickly replied to Shi Lei, "Sir, the IWN secret network has been integrated, and the computing resources are idle." It has a total of 980 TFLOPS, which can be called by the system at any time. ”

Shi Lei showed a cold smile, "Yi Shu'er, prepare all the idle computing resources of the IWN secret network, and raise the security level of the Endless Defense System to the maximum, we have to have a good time with the National Security Bureau of South Vietnam!" ”

β€œYes,Sir!” Yi Shuer responded to Shi Lei.

Shi Lei picked up the coffee cup on the computer table with his right hand, and after taking a big sip, he said to himself: "Nanyue Kingdom, I don't believe it, you don't have any secrets!" ”

The National Security Bureau of South Vietnam, as a country's intelligence agency, Shi Lei is sure that there must be some classified information in their internal network. Shi Lei wants to use the power of IWN's secret network to let Yi Shuer cooperate with him to break through the internal network defense of the South Vietnamese National Security Bureau, so as to find the information content he needs.

At present, the cybersecurity experts of South Vietnam are fully protecting the National Security Bureau of South Vietnam, and it is more or less difficult for Shi Lei to break through the defense.

"Yi Shuer, gather the computing resources of the IWN secret network and send a deception message to the National Security Bureau of South Vietnam." Shi Lei ordered Yi Zuer. The so-called deception information is that the IWN secret network pretends to be a normal random network scanning temptation, although this is also a malicious query, but most defense systems will not pay attention to the random network scanning temptation.

In accordance with Shi Lei's order, Yi Zuer began to send random network scans to the internal network of the South Vietnamese National Security Bureau. As Shi Lei predicted, the internal cyber defense system of the South Vietnamese National Security Agency did not respond to random network scans at all.

"Good!" Shi Lei saw Yi Zuer's tentative feedback, and he immediately controlled the computing resources of the IWN secret network, and conducted a large-scale tentative scan of the internal network of the South Vietnamese National Security Bureau.

As Shi Lei's scan progressed, the internal network of the South Vietnamese National Security Agency slowed down. Its defense system began to automatically retrieve the reason for the slowness of the system.

South Vietnamese security experts, who had retreated from Xia, cautiously discovered that the random network scans were abnormal. Under normal circumstances, the frequency of random network scanning is very low, after all, the entire Internet is so large, where can the internal network of the South Vietnamese National Security Agency be scanned frequently?

Cybersecurity experts in South Vietnam began investigating the unusual frequency of random network scans. They quickly determined that the internal network of the South Vietnamese National Security Service was being hacked. As a result, the cybersecurity experts of South Vietnam waited solemnly for Shi Lei's invasion.

β€œSir。 Random network scans have been discovered by the other party. Yi Shuer reminded Shi Lei.

Shi Lei's ten fingers were on the keyboard, and he entered the last line of source code, and then pressed the Enter key to hand over the source code he had just written to Yishuer for verification. Yishuer quickly completed the verification and gave Shi Lei feedback.

"Sir, the source code has been verified, do you want to execute the source code?" Yi Shuer inquired about Shi Lei's final order.

Shi Lei nodded with a smile, "Execute the source code!" ”

Regarding worms, the second generation of hacking groups in the country of South Vietnam. The leader of the Star of Annan, Big Pineapple, is an expert at the world level, but Shi Lei is not bad! Shi Lei also has a very deep research on worms, which may not have reached the peak level of the world, but it is definitely not bad.

The large pineapple can create a worm to deal with the Internet in the Xia Kingdom. Naturally, Shi Lei can also make worms. The worms made by Shi Lei are not much inferior to the Diablo made by large pineapples.

The only thing to be sorry for. There is no company like a big penguin in South Vietnam. If you want to spread the worm quickly, Shi Lei can't learn from the big pineapple's scheme.

Fortunately, the worms created by Shi Lei are not ready to be spread on a large scale, but only target the National Security Bureau of South Vietnam. Worms are not only highly contagious, they are also highly penetrating.

A worm named 'Stinger' by Shi Lei. With a very high penetration, Shi Lei spent a lot of time creating a 'stinger' to penetrate the internal network of high defense. and destroy the data of the internal network.

'Worms aren't my strong suit, but definitely not my weak point!' Shi Lei looked at the screen of Server 1, where Yi Zuer was injecting the source code into the internal network of the South Vietnamese National Security Agency.

The stinger erodes the internal network of the South Vietnamese National Security Bureau, but it has not succeeded for the time being, the other party's internal network defense is too high, Shi Lei is creating conditions for the stinger on the side, he tears open the internal network defense of the South Vietnamese National Security Agency, although it is only a small gap, but it is enough for the stinger to enter.

The Stinger also lived up to expectations and entered the internal network of the South Vietnamese National Security Agency!

State of South Vietnam, National Security Agency. Location, confidential.

Inside a mysterious underground base, cybersecurity experts from South Vietnam are dealing with Shi Lei's attack. One of them was middle-aged with bald glasses, and his bare forehead was densely covered with cold sweat.

This bald-eyed middle-aged man named Chen Guang is the chief technician of the South Vietnamese National Security Bureau, and he is also one of the few first-generation hackers in South Vietnam, but he has turned into a security expert.

Chen Guang is forty-seven years old this year, and his bald head is just due to too much exertion!

At this moment, Chen Guangzheng was nervously looking at the computer screen, and a shout came from the side: "Manager Chen, the pressure we are under continues to increase, and it has reached 300 tflops of computing attack. ”

Tran Quang was the chief technician of the South Vietnamese National Security Bureau, and because he was forty-seven years old, he was not married. Therefore, he was nicknamed Chief Chen by his colleagues in the National Security Bureau, which means the chief eunuch of the palace.

Chen Guang was not angry at this kind of ridicule. Chen Guang's temper is notoriously good, but he has no female popularity. Perhaps because Chen Guang put too much experience on hacker attack and defense knowledge, so that Chen Guang ignored other things. It is precisely because of this reason that Chen Guang's technique has reached the world level!

"Manager Chen, the other party's defense is still improving, and we are tracking the source of the other party's attack, but we can't find any IP address for the time being. The other party's connection IP address has also been protected! ”

The director of the National Security Bureau of South Vietnam, named Nguyen Kang, is also a first-generation hacker, but his skills are a little weaker, and he is only quasi-super-first-class. Ruan Kang is not as good as Chen Guang in terms of hacking skills, but Ruan Kang does a little better than Chen Guang, that is, Ruan Kang is good at employing people.

It's definitely not a difficult thing to do if you don't know it. As long as you can find someone who can do it, and use this person well, you can solve the problem!

"Lao Chen, is the current situation beneficial to us?" Ruan Kang asked quietly.

(To be continued......)

PS:PS:Yesterday's automatic update failed.,Today will add a chapter that was missing yesterday.,I'll send it up later.,Open an interval.。