HK1391 The war of hackers is never far away!
. It was nearly eight o'clock in the evening.
Tao Wenxian hacked into the internal network of the FBI and the CIA according to Shi Lei's instructions, and successfully contained the cyber defense forces of the FBI FBI and the CIA.
Shi Lei did not enter the internal network of the FBI with him, but took advantage of the CIA's CIA to support the FBI and kill him!
Shi Lei knows more about the CIA CIA, he knows the CIA's cybersecurity force, and when he acts, there is generally an action notice.
This notice of action usually explains the reason for the action, and the goal of the action. Of course, this action notification is an automatic deletion of information, which will be automatically deleted when it is read or stored for a predetermined period.
Shi Lei prepares to hack into the CIA's internal network in order to recover relevant notification information in the CIA's notification system.
As for whether it can succeed, Shi Lei doesn't know for the time being.
After all, the CIA's notification system is not an ordinary mechanical hard drive, in addition to having a strict defense strategy.
Under normal circumstances, the information is stored in memory for a while, and then written to the storage medium. However, the CIA's notification system needs to process a very large number of jù per day and needs to be highly confidential, so the CIA uses NandSSD storage technology.
This storage technology far exceeds the read and write speed of mechanical hard disk storage technology. It is the next generation of storage technology. And it will be widely used in the future.
Compared with HDD mechanical hard disk technology, NandSSD has many advantages, but for Shi Lei. This technology is incomparably pitiful under the current shape.
Because Shi Lei wanted to recover the number of jù and read the CIA notification message. The technology of restoring the number of jù is very convenient to put on the HDD mechanical hard disk, even if it is ten years ago, it is possible to read it.
But NandSSD technology is different, and the theory of storage number is different!
Want to recover fù number from NandSSD hard drive. This difficulty is very high, and Shi Lei can only hope that the CIA's notification system will be a number of servers. For the time being, it is possible to obtain the relevant data information if the number jù cleanup operation has not been executed.
Otherwise, it is really unlikely to recover deleted numbers from NandSSD hard drive.
Shi Lei instructed Yi Shuer to prepare to complete the calculation of resources. There was no immediate intrusion into the CIA's internal network. It's about looking for a better way to invade.
"Catch a CIA CIA hack into the Dreamers online payment system, using a broiler server." Shi Lei thought of a good way.
If you follow Shi Lei's habit in the past, he likes to start directly from the official website of the CIA and the CIA, and forcibly invade from the official website to break through the defense of the internal network.
This method seems stupid, but it looks like it is very easy to detect. Not really. Just a little camouflage, CIA security specialists. It will only be thought that this kind of intrusion is a temptation of unknown small hackers, and will not attract attention.
Although the method of direct invasion was safe, Shi Lei did not want to do that. Because, that way of intrusion, the probability of failure is the greatest, and once it is discovered, the CIA's CIA security experts will definitely track it down, which will produce a more troublesome anti-tracking problem.
Therefore, Shi Lei chose a more covert anti-tracking scheme, directly from the CIA's broiler server, following the CIA's CIA intrusion route, reversely tracing the past, and entering the CIA's computer that sent the intrusion.
This solution is more hidden, but it is also more dangerous!
Because the ultimate source of the intrusion must have been the CIA's security experts who were operating computers to hack into Dream Entertainment's Dreamer online payment system. The slightest mishandling could lead to discovery by CIA security experts.
Or shouldn't it be said that the CIA CIA security specialists!
Because, this part of the personnel, like the mysterious temporary workers of Xia Guo, they do not have the establishment of the CIA and do not have any identity records.
Even if Shi Lei accurately tracked their location information, there was no way to label them as CIA employees.
So in the face of these guys who are temporary workers, Shi Lei really only has to fight hard, instead of saving relevant evidence, and make a fuss.
According to Shi Lei's instructions, Yi Zhuer quickly grabbed an unimportant broiler server, and the number of jù streams transferred by this broiler server was not much.
About two minutes later, Shi Lei did not arouse the other party's vigilance, and directly killed the opponent's computer, and then used the opponent's computer as a springboard to naturally enter the CIA's internal network.
In the CIA's internal network, Shi Lei scanned the notification information, but since the CIA CIA dared to release the notification information so boldly, and would also explain the reason and goal in detail, it proved that they were very confident in the notification system.
Shi Lei didn't find any notification information!
Fortunately, Shi Lei did not expect to get the information directly at first, he entered a string of codes on the keyboard with both hands, and Yi Shuer immediately scanned the number of servers of the CIA's notification system.
This particular number of servers does indeed use NandSSD hard disk storage technology. In just a few seconds, in view of the excellent performance of the NandSSD hard drive, the entire disk has been scanned.
However, no remnants of the notification message have been found!
Shi Lei personally scanned it, and also found no relevant information. In this case, it should be the number of servers that should be notified to the system to have NandSSD execute the Secure.Erase command, which is the Secure Erase command.
This command is a special command for NandSSD hard disks, which can clean up the number of SSD residues very cleanly, and will not be like ordinary HDD mechanical hard disks, even the number of jù ten years ago, can also be retained.
Shi Lei frowned and looked at the information displayed on the screen of the No. 1 server, if he couldn't get the information from the CIA's CIA notification system, would he only have to tear his face with the CIA CIA on the surface?
This is a situation that Shi Lei is unwilling to do!
'Oh, there's another way!' Shi Lei suddenly thought of a solution, not for the NandSSD hard drive, but a different way of thinking.
To be the world's top hacker requires not only great technology, but also a quick mind. Since you can't get the information from the CIA's notification system, why not get the information you need from the computers of the relevant security personnel who are receiving the notification?
Shi Lei smiled and returned the computer of the security expert who had connected to the broiler server before. In the era of 2008, although NandSSD technology has matured and been put into use, the cost is still very high, and the average computer is not installed.
The security specialist still uses a normal mechanical hard drive. It's not that he can't afford the cost of a NandSSD hard drive, it's that it's completely unnecessary.
If the CIA's notification message had remained in the CIA's internal systems and had been intercepted by hackers, it would be big news.
But this piece of information has flowed outside, and it is nothing at all!
Can the CIA be proven guilty because of a single piece of information? That's just hilarious! If there was such a simple thing, Shi Lei could forge a hundred relevant pieces of information every day to slander the CIA.
Although clues have been found, and the feasibility has also been determined. But Shi Lei suppressed his excitement and carefully scanned the security expert's computer.
Because this computer has been used by security experts, once there is a slight abnormality, or the security trap set by the other party is triggered, then Shi Lei will declare the operation failed.
Ordinary HDD mechanical hard disks have a big drawback, that is, whether the number of read jù or the number of writes jù will produce the hard disk light will always be on.
Shi Lei first needs to hack into the computer's motherboard BIOS system, and change the programs fixed inside the BIOS system, so that the hard disk can be read and written, and the hard disk light will be always on.
It's not an easy job!
If you just turn off the hard drive light, it's too simple. But if the security expert is using a computer, if the hard drive light is not on, and he is writing or reading the number of jù, isn't it clear that there is a problem?
Shi Lei carefully modified the information of the BIOS system, and it took about ten minutes to finally complete the program of controlling the hard disk light.
"Let me see why!" Shi Lei scans the security expert's computer hard drive, which is very slow for fear of alerting the security expert.
After waiting for almost half an hour, Yi Zuer finally finished scanning and recovered the deleted information, and at the same time matched the deleted information with keywords such as 'Dream Entertainment', 'Xia Guo', and 'Mirui Technology'.
After less than half a minute of screening, a message was displayed on the virtual transparent screen of the LIP lens information processor.
Shi Lei finally knew why the CIA was desperately biting the dream entertainment online payment system!
According to the latest information received, Dream Entertainment's Dreamer online payment system will provide convenient money laundering services for some criminals in our country. This information comes from the well-known hacker Raphael, which is highly credible. Perform a mission to hack into the Dreamers online payment system and confirm the source of funds and the relevant trader information for each transaction. ’
Shi Lei's expression was stunned, Raphael?.
(To be continued......)