HK055 Swallow Returns on
In the room, Shi Lei's ten fingers on his hands, as if with an afterimage, were tapping quickly on the keyboard. Fortunately, the keyboard that Shi Lei bought was a silent keyboard, otherwise, the crackling sound would be connected in a line.
In the core server group of Aixin, Shi Lei has entered the system, and broke a system gap, injecting the permission system he wrote himself into the Linux system of the core server, replacing the original permission system.
For the Linux system, Shi Lei knows very well, and without causing the collapse of the overall system of the server group, he injected a new permission system into the server group system!
After having the new permission system, the original two super permission users were downgraded to first-level permissions, but their management permissions have not changed, and they are still the same as the previous super permission users. The only difference is that they can't retrieve the only super user newly created by Shi Lei in the permission group!
Unless they thoroughly inspect the server group system and find that the permissions system is being replaced. Otherwise, Shi Lei mastered the server group of Aixin Company, making this small supercomputer his own first-class broiler!
After successfully establishing his own super permission user, Shi Lei immediately used the super permission user to start changing the server group of Aixin Company and creating a system backdoor to facilitate direct access next time.
Due to the super authority user in hand, the security personnel of Aixin Company did not find anything wrong at all, so Shi Lei created the backdoor of the system. From then on, even if Shi Lei swaggered into the server group of Aixin Company, the security personnel on duty would not suspect it. Because, Shi Lei has obtained the super permission of the server group, and has changed from hacker invasion to normal access.
The server group of Aixin Company will be Shi Lei's first first-class broiler. The so-called first-class broiler is the general term for high-grade server broilers. The strength of a hacker is largely determined by the quality and quantity of broilers in his hands.
For example, a hacker has mastered a million ordinary personal computers, and as a zombie broiler, it is also quite terrifying! After all, this million zombie broilers are just launching the most primitive violent flood DDOS attack, which is enough for the average server to drink a pot!
Of course, it is unlikely that a violent flood would attempt to attack a supercomputer. Which supercomputer has a name and a name, but which one does not have a hardware firewall? FILTERING DDOS ATTACKS, THAT'S A BREEZE. Unless, you can unleash thousands of zombie broilers and attack them at the same time!
But if someone really controls more than 10 million zombie broilers, as long as this person is not a god, he will definitely be related to the state. Department harmony!
Cyber disorder is also based on the fact that there is no mortal threat to the country. If a hacker really threatens the core interests of the country, don't underestimate the strength of the country. The country is sincerely looking for a person, and there are really few people who can escape.
Even Shi Lei doesn't dare to say now that he can escape the pursuit of the state 100%. Because of the top strength in the hacker world, most of the first-generation hackers have transformed into network security experts, or accepted national recruitment as national network security personnel. The strength of the first generation of hackers is absolutely unfathomable!
It's just that if Shi Lei captures the supercomputer Yan, then he will be confident, and it will be absolutely impossible for anyone to seize his IP address!
Under Shi Lei's control, no one can break through the supercomputer Yan alone!
In the server group of Aixin Company, Shi Lei used super privileged users to modify the security policy of the server. Although Aixin also has its own network security experts, these experts are still far behind Shi Lei.
After modifying the security policy, Shi Lei copied the Panshi Firewall from the No. 1 server. The Norton Firewall of the Edsure Company has been pierced and destroyed by Shi Lei, leaving only an empty shelf. Shi Lei is ready to use the server of Aixin Company to directly infiltrate the supercomputer Yan, how can he not repair the firewall? …,
In case, his invasion of the supercomputer Yan is exposed, with the help of the server of the Edsure Company and the Rock Firewall, Shi Lei can still escape safely without being pursued by the supercomputer Yan and the world of the world!
Although the Norton Firewall was only left with an empty shelf, Shi Lei did not abandon it, but used this empty shelf to integrate the Rock Firewall into it. In this way, judging from the user interface of the firewall alone, it is still a Norton firewall. But in fact, its internal core source code is the Rock Firewall written by Shi Lei. Even if the security guards of Atrust turn on the Norton firewall, they will not find out that the firewall is already wrong!
After the installation of the rock firewall, Shi Lei checked the server group of Aixic Company once. Then, Shi Lei controlled the server group, extracted a project that needed data computing from Aixin from the server group, and sent a connection application to the supercomputer Yan.
Atrust applied for partial access to the supercomputer Tsubame from the Tokyo Institute of Technology, and they have a legal pass for the supercomputer Tsubame!
At the Tokyo Institute of Technology, after receiving the application from Atrust, the supercomputer Tsubame immediately searched for the permissions of Atrust and the system resources that could be used in the internal permission group, and then responded to the Atrust server group and allowed it to connect and enter.
When Shi Lei controlled the server group of Aixin Company and connected to the supercomputer Yan, he was excited. In his previous life, the supercomputer Yan was Shi Lei's first supercomputer broiler!
In this life, the supercomputer Yan is finally going to return to his arms!
After connecting to the supercomputer Yan, Shi Lei first transferred the computing tasks extracted from the server group of Aixin Company to the supercomputer Yan.
The supercomputer Yan chooses to accept the documents of the Aspire company, and the Yan will first automatically detect the security of the file, and then the security personnel inside it will manually detect it again. If there is no problem with the file, it will be handed over to the supercomputer to run the calculation in a sandbox environment.
Shi Lei did not do anything in the documents that needed to be calculated. After all, the other party will go through several tests, and if a problem is found, then the Tokyo Institute of Technology will definitely notify the company, and the company will suspect that they will not apply for any computing tasks from the supercomputer Yan. The only possibility is that the server has been hacked!
Therefore, the file uploaded by Shi Lei is really the calculation file of Aixin. Then, using the company Edcredible himself, he can connect to the legal channels of the supercomputer Yan, and directly go to the serious system vulnerability of the supercomputer Yan!
The most difficult step in capturing a supercomputer swallow, which is also the first step, is how to connect to a supercomputer swallow! If there is no normal way to connect, it will be rejected by the supercomputer swallow. If a hacker is used, it will alarm the opponent's security personnel.
Only like Shi Lei can find a legal connection way, swagger to connect to the supercomputer Yan, and then attack the serious system vulnerabilities of the supercomputer Yan!
After the supercomputer Yan is put into the field of business cooperation, there is a serious vulnerability in the system, and the cooperative business users can take advantage of the system vulnerability to enhance their own permissions!
In Shi Lei's previous life, he took advantage of this loophole to promote his authority to a super permission user!
After the documents of Atrust are inspected, they are sent to the sandbox environment of the supercomputer Yan and start to perform computing tasks. And Shi Lei carefully found that serious system vulnerability in the supercomputer Yanzhong!
After finding the system loophole, Shi Lei did not attack immediately, but tried to see if this was a honeypot trap. Although the defense of the supercomputer is very reliable, it is still not ruled out that the other party is on the perimeter of the server and sets a trap. …,
After some probing, Shi Lei was sure that this was the one that was the serious system vulnerability that he knew. Shi Lei directly followed the pre-set plan, tapping the code and attacking this vulnerability.
Since this vulnerability had been invaded in his previous life, Shi Lei easily drilled into the real interior of the supercomputer Yan from the vulnerability, rather than the space for external business cooperation!
After entering the interior of the supercomputer Yan, Shi Lei first exploited the vulnerability and began to elevate the privileges for the account of Aixin Company. When the authority of Aixin was promoted to the third-level authority and a new user could be established, Shi Lei immediately established a new user and reduced the authority of Aixin to an ordinary commercial cooperation user.
Then, Shi Lei escalated the permissions of the users he established to first-level permissions through loopholes, and then stopped immediately. This serious system vulnerability can only be promoted to first-level privileges, but not super privileges. If you use a vulnerability and try to elevate the super privilege, the super privilege user protection mechanism will be triggered, and the entire supercomputer will be alerted immediately!
After Shi Lei has a first-level user, he can enter the permission user group normally, and can also manage low-level users to a limited extent. With the first-level authority in hand, Shi Lei accessed the security policy of the system through the first-level permission, and began to change the system settings of the supercomputer Yan with the first-level permission.
The first step that needs to be changed is to remove the protection mechanism for superprivileged users, and the protection mechanism for superprivileged users must be removed with the permission of superprivileged users. If you do not cancel the protection mechanism for the superprivileged user, once the superprivileged user is attacked, the protection mechanism will be triggered, and an alert will be sent inside the supercomputer.
It's an endless loop!
No super permissions, no protection mechanism, no protection mechanism, no super permissions!
The protection mechanism of the super-privileged user is protected by an independent hardware chip, which is independent of the supercomputer system, is not affected by system interference, and only accepts the instructions of the super-privileged user!
Shi Lei looked at the super privileged user protection mechanism displayed on the computer screen, and showed a sneer!
————————————————————————————————————————————
PS: At present, the recommended votes are 9950+, and the goal is 10300, that is, today a day, to the extent of 600 votes! I hope you will support Shanshan and let Shanshan have more recommended votes! Reach the target 20:06 plus more!
Then, according to everyone's request, another issue of the book review area will be held, and the prizes will be a seven-digit YY account, an eight-digit penguin account, and a penguin couple account. For more information, please see the book review section, which will be made by this afternoon.
Ask for collections, recommendations, member clicks, tips, comments, everything!
——
【Reward thanks】Float in the wind, smile again, and reward 100
,