HK300 Premeditated SO Plan

PS: The new work is the first on the best-selling list, and the seventh on the overall best-selling list, and we have won again! Angel Council, hehe [I beg to subscribe, to measure the results of a book, it is a subscription to a book, I hope that the brothers and sisters who have the ability to support can donate generously, and the daily subscription costs one dime and eight cents to three cents and six cents, giving Makuyama a little support! ].

The official website of JFS has taken a very extreme setting, that is, the expansion technology of one-way link, one-way data transmission. There are advantages to this, but there are also significant disadvantages.

The obvious disadvantage is that normal users browse the official website of JFS and want to apply for any data, but the web server does not have the authority to send a request, so it can only passively wait for the internal data server to find out about the application and then give a reply.

As a result, the browsing speed of the JFS official website has been greatly reduced.

If it were other websites, if the browsing speed dared to be so slow, it would definitely be squeezed by similar websites. But where does JFS come from?

If I had to talk about peers, maybe the CNS and the CIA would be their peers. It's just that JFS wants everyone to go to the official websites of the CNS and CIA and cause confusion for them.

At the moment, the official website of JFS is under attack. And it is a very covert way of attacking, if it weren't for Shi Lei's very proficient computer skills, he probably wouldn't have found out!

After discovering that someone was attacking JFS, Shi Lei did not act rashly, but secretly followed behind to observe to see what their purpose was.

It's better to have something cheap to pick up!

Following the intruders, Shi Lei found that they had a total of more than a dozen offensive data streams. He secretly guessed in his heart, these guys who invaded JFS could it be the Night Dynasty?

Shi Lei picked one of the intrusion data streams and traced the IP address of the other party in reverse. After breaking more than 30 broiler servers in a row. Shi Lei finally discovered the real IP address of the other party.

It is the IP address of Xia Guo, the corresponding real address, Shi Lei did not check it carefully, he only knew that Lu Dao was in the capital!

It is rumored that the boss of the Dark Night Dynasty is a person from the capital.

Confirming the conjecture in his heart, Shi Lei became even more curious, could it be that the Night Dynasty had eaten the bear's heart and leopard gall, and actually dared to provoke JFS?

The JFS possess a lot of power, roughly and simply put, they are about twenty times larger than the Hacker League. If JFS wants to take down the Hacker Alliance. It is estimated that in the hacker alliance, in addition to the core members who can escape, they can take whoever they want!

Even the core members have a considerable chance of being tracked!

The Night Dynasty and the Hacker Alliance are both second-generation hacker organizations. How dare they provoke JFS?

But now that they're invading JFS, it means they're naturally relying on it. Otherwise, it would be impossible to send him to death directly, right?

Shi Lei didn't know the reliance of the Night Dynasty. But since the other party was willing to disperse the firepower of JFS for him, Shi Lei was naturally very happy. Last time in the International Intelligence Bureau of the Ministry of Foreign Affairs, in the classified information server, Shi Lei deliberately moved a folder called 'SO Scheme' in order to frame Raphael.

That SO plan made Shi Lei very interested!

After all, a robot plan. For Shi Lei's future development, it has brought an excellent heritage. If there is anything good that can be found in the International Intelligence Bureau of the Ministry of Foreign Affairs, then Shi Lei will definitely not be polite.

Attack of the Night Dynasty. JFS hasn't found out yet. As a compatriot, Shi Lei is embarrassed to pit them. Anyway, there is a very hidden alarm mechanism in the web server of the JFS official website, and they will definitely trigger that mechanism to attract the attention of JFS security experts.

Shi Lei only needed that time to sneak into the JFS internal network according to the backdoor of the system left before, and find what he needed.

While monitoring the actions of the Night Dynasty, Shi Lei connected to the internal data server of the Tokyo Earthquake Prediction Agency.

In the earthquake prediction agency, the plug-ins left by Shi Lei in the earthquake prediction software are still working normally. Through the records, Shi Lei found that the earthquake forecast in Kanagawa Prefecture had not yet appeared.

Instead, a felt earthquake was prevented, and the data was changed to an earthquake-free earthquake. The plug-in is working normally, and everything is executed according to Shi Lei's script.

Just when Shi Lei felt bored and was about to tease Haneda Airport, on the official website of JFS, the Night Dynasty triggered and activated the alarm mechanism.

Xia time, it is now 6:10 p.m., and the time of Vosan is 7:10, due to the cyber war between the two countries, JFS's security experts have not taken a break from work, but are holding their breath and are ready to rescue the cyber world of Vosan at any time.

The security experts of JFS have been teased repeatedly by Mr. M, and they have already been in a situation where they have nowhere to vent.

When the Night Dynasty triggered and activated the alarm mechanism on the official website of JFS, it was like stabbing a hornet's nest, and twelve formal security expert teams and twenty-seven preparatory expert groups were all killed.

Before the people of the Night Dynasty could react to what was going on, they were bitten by JFS security experts, desperately tracking their real IP addresses.

Shi Lei was waiting for this opportunity, taking advantage of JFS's security experts to bully the Night Dynasty, Shi Lei immediately sneaked into JFS's internal local area network.

The backdoor of the system, written in assembly language, sank into the bottom layer of the system, and it was really powerful, and many security experts in JFS did not find the existence of the system backdoor.

After Shi Lei entered JFS's internal area network, he quickly searched for their confidential information server. Last time, he had already found the confidential information server, but this time Shi Lei didn't spend too much effort to find the confidential information server.

After entering the confidential server, Shi Lei faintly felt something wrong in his heart. Came in because it was too easy, like a complete defense?

Inside the confidential server, Shi Lei first discovered the SO plan and various other confidential information. For example: South Vietnam Forest Planning, Indonesian Island Planning, Nanyang Planning and so on.

Shi Lei did not rush to open any data, but first analyzed the file system.

The first analysis is the SO plan, and nothing useful can be analyzed from the name of this plan. It's not like other schemes, where it can analyze some information to a greater or lesser extent.

For example, the South Vietnamese forest plan can be analyzed. It is related to the South Vietnamese State, but also to the planning of forests. South Vietnam is very rich in forest resources, and perhaps Vausang is paying attention to this.

Shi Lei had read a report before that there were many forests in the country of Wasang, but they did not develop their own forest resources, but imported timber in the country of Xia. This behavior not only satisfied the timber demand of the Wasan country, but also caused quite serious damage to the forest resources of the Xia country.

However, some people in Xia Guo couldn't see the facts clearly. He also tried to sell the timber to the country of Vausan.

Returning to the topic, Shi Lei analyzed the file system planned by the SO plan and found that it was restricted by the file system and could not be opened or deleted directly. It can't be moved, it can't be copied. In a nutshell. That's nothing!

For this kind of file. Shi Lei was very distressed!

It is bound to the permissions of the server by the file system, and if you want to get permissions, you have to hack the permission group of the server.

If it is an ordinary server, Shi Lei will kill all the privileged users of the permission group in minutes and become the only member of the permission group. But here is the International Intelligence Service of the Ministry of Foreign Affairs. Confidential Information Server!

Shi Lei didn't have to think much about it, he knew that the confidential information server was definitely connected to the JFS supercomputer.

You want to gain access to the confidential information server. I'm afraid I'll have to deal with JFS's supercomputer.

JFS's supercomputer is very powerful, and its performance is not much worse than that of the supercomputer Yan. Although Shi Lei has the supercomputer Yan, Shi Lei does not dare to fight with the supercomputer of JFS.

Shi Lei does master the supercomputer Yan, but Shi Lei can only borrow part of the performance of the supercomputer Yan. After all, the supercomputer swallow's system undertakes all kinds of large-scale tasks. If Shi Lei didn't restrict him and messed around with the supercomputer Yan, he would definitely be discovered by the security personnel of the supercomputer Yan.

Because of this reason, Shi Lei did not dare to fight hard with JFS's supercomputer, so he could only think of other ways.

Looking at the SO plan, Shi Lei cautiously inquired about the user situation of the permission group of the confidential information server.

From the permission group of the confidential information server, Shi Lei found that there were only three users who had the authority to transfer the SO plan.

After finding these three usernames, Shi Lei went to the JFS internal network to investigate the account information of each person in the network security department.

If you want to investigate their account information, the best way is to hack into the other party's computer and find relevant information in the other party's computer.

If you want to hack into the computer of a JFS security expert from an external network, it can be done, but it is quite difficult for them not to find out.

It's just that Shi Lei is now on the JFS internal network, and it is not so difficult to enter the computers of those security experts from the internal network, and it is not easy to be discovered.

Take control of the supercomputer Swallow and find the connection information of security experts in the internal network. Once you get into the security specialists' computers, you first search for the names of their computers.

A lot of people like to change their computers to their own usernames. Sure enough, in the computer name of the Cyber Security Department, Shi Lei found a username that was the same as the Confidential Information Server permission group.

Shi Lei carefully inspected the computer, and successfully extracted the computer login password from the computer's configuration file records.

With this password, Shi Lei now needs to gamble!

Bet that the password for this username can also be used in the confidential information server. If the password is universal, Shi Lei can naturally enter the confidential information server and take away the SO plan.

If the password is not universal, it should cause an alarm from the confidential information server based on the security level of JFS. Then the operation to steal the SO plan failed, Shi Lei still smeared oil on the soles of his feet, hurry up!

This kind of gambling behavior, Shi Lei would not be willing under normal circumstances. But if you don't gamble, you will have to face the supercomputer of JFS, and Shi Lei is not sure that he will kill the supercomputer in a short time and without attracting attention.

For today's plan, the only way to do it is to give it a go!

It's a matter of success or failure

(To be continued.) )