Chapter 501: Hacker Attack and Defense

Fashionably dressed girl, holding a stack of books in her hand, hurrying through the boulevard and heading straight to the school building, tall and straight Pakistani boy, riding a bicycle, making a rattling sound, and some people are sitting in the back seat with smiling girls.

This scene is very similar to that of universities in China. Seeing this, Mhammad seems to recall his college life, although the life of the military school is boring, but there is also a lot of fun, for example, every weekend, you can go to the medical university next door to see the girls there.

Later, Mhammad had a girlfriend, and now he can clearly remember that he looks eight points similar to Bai Xue.

In Pakistan today, due to a lot of contact with the West, the social atmosphere has become very civilized, and Mhammad likes to do this, gradually diluting those traditions and making Pakistan a modern country.

"That's the School of Computer and Information Engineering." The Minister of Education, who accompanied him, said that the construction of this university is a key project of the Ministry of Education, and he has been here several times to familiarize himself with the distribution here.

"Let's go, let's see." Muhammad said, leading the crowd towards the school building.

In later generations, it was generally called the School of Computer Science, and it was not until many years later that it joined the information engineering, only the computer, is not able to play all the functions, only combined with the network, become the computer network, can play its due function more.

Therefore, Pakistan's computer industry, after its establishment, attaches great importance to networking, and the computer systems of all universities in Pakistan are networked, with the backbone network of colleges and universities as the core, and a wide network covering the region has been established. Therefore, to learn computer knowledge, it is necessary to learn network knowledge.

It was class time, and Mhammad pushed open the back door of a classroom, walked in softly, and sat behind his desk.

There were probably more than a hundred students in front. They were listening intently to the lecture of the teacher above, and they were so attentive that they didn't notice that many people were listening to the lecture behind them.

Mhammad looked at the lecturer in front of him and was stunned, isn't this Kevin Mitnick?

When he first went to Grumman, Mhammad relied on this genius hacker to get the fire control source code of the Tomcat fighter from Grumman, which played a very important role in imitating the flat slit radar. Afterward. Mhammad just asked Pakistan's intelligence services to keep a close eye on this genius hacker and get him to Pakistan when necessary, but he didn't expect that he had already arrived?

"Everyone is welcome to take my course, the name of the course is called Cyber Attack and Defense." Kevin said, "The computer network is a great invention. When I put all the computers together through the network. It can promote the progress of our whole era, and there is no longer a need for telegrams, telephones, on the Internet, just send an e-mail when we have a meeting. Video conferencing is also possible via the Internet. Popularize the network in the army, and the president's orders can quickly reach the grassroots troops through the network system. Criminals are wanted by the police. It can be quickly spread throughout the country through the Internet. However, the network is not very secure, for example, on the network, there is such a person who specializes in invading other people's computer systems, called hackers, what we are learning now is the attack and defense technology of hackers. ”

"Teacher, are you a hacker?" One student asked.

"Yes." Kevin said smugly.

"Can you show us a little bit of that?" The student continued.

"Okay." Kevin said, "Now, I'm going to show you how to hack into a computer. ”

After saying that, Kevin sat down, and in this classroom, there was already a computer for teaching, and at the same time, there was also a projector, which was projected onto the big screen in front of the classroom.

Students who are close to the window close the curtains next to them and the screen becomes clearer.

In fact, the projector has been there for a long time, if you want to say the founding, I am afraid that it is the ancient shadow puppet play, even if it is the prototype of the projector, and the modern projector, from the fifties, the use of CRT technology, just like the TV, the volume is very huge, at the same time, the price is also expensive, Pakistan attaches great importance to education, only to invest a lot of money, to equip the university with this advanced equipment.

At this time, the lines of letters on it are constantly beating, and it is not yet the nineties, and there is no graphical operation interface at all, which is the simplest DOS system.

Time passed little by little, and when the headmaster, Adil, pushed open the door and came to Mhammad, the characters beating on the screen suddenly stopped.

"Let's see, what's on this computer." Kevin said, expertly typing in a DIR command.

Suddenly, a large pile of documents jumped out, and Kevin read: "Government Work Report, Free Government Annual Financial Summary, Report on Increasing Production in the Karashan Mining Area." Ladies and gentlemen, we are now invading the office computers of the Free Government of Afghanistan! ”

These documents are indeed in the computers of the Afghan Free Government! In order to facilitate the office of the Afghan Free Government, the Pakistani side provided a number of computers, and also laid the network, all the way to Jalalabad, I really didn't expect that now it was invaded by Kevin in front of my eyes!

Fortunately, Pakistan's military network is separate from civilian use, otherwise, Pakistan's army would have no secrets!

"I'm sorry, President." Adil felt his forehead, and immediately broke out in a cold sweat: "This lecturer is what we recently invited. ”

Hacked into the computer system of the Afghan government, if any secrets are leaked, I am afraid that I will become a wanted criminal!

"Smack, smack, smack." Mhammad took the lead in applauding.

All the students applauded, and some of them turned their heads and looked at the people who came in at some point, why did they look so familiar?

"President Mhammad!" A girl screamed, she recognized it, it was the president of Pakistan!

Mhammad smiled and greeted Kevin in front of him, and the two could be regarded as having a friendship.

"He was rescued from the United States when we did this year." After gaining contact with the intelligence system, Mhammad heard the report of his aide to himself.

Kevin Mitnick, the most famous hacker in history, was not idle at all, followed Mhammad to Grumman, hacked into the system there, Kevin felt very enjoyed, and later, successfully broke into the "North American Air Protection Command System", and turned the target to other websites, such as the communication network system of the famous "Pacific Telephone Company" in the United States, and even the network system of the Federal Bureau of Investigation.

After entering the FBI, Kevin browsed through the information and found that the FBI was investigating a hacker, and he was shocked to find that the "hacker" was himself. So, Kevin finally knew that the FBI couldn't do anything about himself, and he was even more excited, and the fragile network system was the target of his attack! He can find endless fun in it! In a short period of time, he hacked into the networks of five large companies in the United States one after another, and damaged the network systems, causing huge losses to these companies. As a result, this year, the FBI finally arrested him, and Pakistani intelligence officers, before the FBI officers arrived, rescued Kevin and brought him to Pakistan.

Now, in a conference room at the university, Mhammad gave Kevin a warm welcome.

"Kevin, you're very welcome to Pakistan." "We had a great time working together in the United States, and now we can finally work together again," Mhammad said. ”

Kevin looked at Mhammad in front of him, although he is a hacker, it does not mean that he does not understand the world situation, the person in front of him is simply a person who has repeatedly created miracles, which is why Kevin came here from the distant United States, he feels that only here can he better realize his ambitions.

"I'm happy too." "Otherwise, I'd be in FBI jail right now," Kevin said. However, when I came here, I could only teach students, not practice, so it didn't mean much. ”

Kevin's lifelong interest is in invading, and if he can't be a hacker, his life will be very boring, which is why he came here to teach students about network invading, and he can only find a trace of satisfaction from the adoring eyes of those students, especially, there are some female students whose hot eyes make him very comfortable.

"Kevin, you can hack into any network in Pakistan." "I'm not going to give you an arrest warrant, but there's one rule, you can only hack, you can't break it, and after the invasion, you need to tell the other party that there is a loophole in the computer, and you have to figure out how to fill the loophole," Hammad said. ”

What Mhammad said is naturally the task of information security experts. Many information security experts have been hackers.

Pakistan's computer network, of course, is also fragile, and in later generations, cyber attack and defense will also be a form of warfare, so Mhammad allowed Kevin to do this, test Pakistan's various networks, find vulnerabilities and fill these vulnerabilities.

In this way, Pakistan's network is more robust than that of the United States.

"Okay, then you're welcome." Kevin said: "I promise you, only invade, not destroy, but also find a solution." ”

"At the same time, you are also welcome to continue teaching here and teach students offensive and defensive knowledge." "We need more people to learn about cybersecurity," Mhammad said. ”

Among these students, there will definitely be talents, and in a few years, at the right time, a special information unit will be formed to deal with the Americans! (To be continued......)