Chapter 818: Hacking the Host
readx;
/div>
From the point of view of the size of the state, Florida, located in the southeastern part of the United States, has a very special appearance, as if, as if some part of a man's body, only, is inserted in the territory of the United States, not high upward, but shrinking and hanging down. Pen~Fun~Pavilion www.biquge.info{{}}
On the top floor of one of the buildings at the University of South Florida, the largest educational institution in Florida, is the university's main engine room, where several IBM S/370 computers are working.
The computer room is relatively clean, in this era, the computer is a very sacred thing, in and out of the computer room, although there is no need to bathe and change clothes, but also need to wear a white coat and wear foot covers.
This is a cabinet-type mainframe computer, which was just installed in the early eighties, and belongs to the most high-end computer in this university, and I think that at the beginning, the Apollo moon landing program of the United States used the predecessor of this computer, the S/360 computer.
The air conditioning system is blowing cold air, and there is still some heat in the computer room, and the heat emitted from the cabinet is extraordinarily high in this summer.
"The project given to us by the tutor is really troublesome, and it is said that it takes three to five days on this kind of state-of-the-art computer in our college. {{}}" said a college student guarding in front of the computer, the program is written, you have to apply, after half a month, it was approved, the original passion has passed, and now, you have to guard in front of this kind of computer for a few days, and it is a bit of a headache to think about.
"yes, yes, it's going to take a few days anyway. Why don't we go out and play! Another black student said.
The two of them have a pair of eyes. There is the same god in his eyes, guarding this cold computer room. It's a waste at all, it's better to hurry up, go out and do activities, wait for the computer to calculate the results, and then analyze and look for program vulnerabilities. Very troublesome.
The glass door of the computer room was closed, and nothing special could be seen in the huge computer room, except for a few mainframes still running faithfully.
A tiny seven-inch monitor. Strings of data are pulsing.
Suddenly, on top of the monitor, a strange line of letters appeared, and the letters kept flashing, as if to imply something.
Soon, the letters were pushed to the top by the data that appeared below and disappeared.
In Los Angeles, in an ordinary neighborhood, a man uttered "***!" in his mouth. The word. {{}}
It's a community with internet access, in Los Angeles. The ARP network for civilian use is gradually being promoted, through which home computers are not only connected to companies and universities, but also to departments, and of course these computer territories will have passwords.
The man had rented a house in the neighborhood two days earlier, and he had nothing with him except a suitcase, as if he were a young man who had come to Los Angeles to wander around.
But. Unbeknownst to anyone, when he entered the room, he opened the suitcase, revealing something that could be flipped out with a screen and keyboard.
That thing, it's called a laptop.
This man, called Kevin? Mitnik.
It was really dangerous just now, Kevin didn't expect that he was just hacking into an ordinary university mainframe computer, because, according to his scanning, the computing speed of that computer was still a little faster, and it seemed that the security was very poor.
So, after two hours of his time, he successfully hacked into the computer, but when he implanted his own code program, the computer seemed to have a rejection reaction, and the confidence that came back let Kevin know that he was afraid that he was a failed invasion. {{}}
Fortunately, Kevin immediately tapped the keyboard quickly, opened another port of the other party, and finally successfully implanted his own code.
Now, that computer can be mastered for itself and used to attack the other party.
In this way, even if someone finds out, they only know that the computer did it, and it has nothing to do with themselves.
Of course, even Kevin didn't know that the broiler he controlled, it was a mainframe computer, and with the help of that computer, it was very fast to crack the Pentagon code... It may be half a month, or it may be half an hour, brute-force cracking, that requires luck, but fortunately, Kevin's luck has always been very good.
Kevin was using his own computer, hacked into the broiler, and then, let the machine, start working for himself as hard as possible, trying to find out the Pentagon password as soon as possible.
Kevin then tries to take control of several other computers in preparation for the start of the CIA invasion.
As an aspiring hacker, overcoming the so-called impregnable CIA and Pentagon computer systems is the most difficult challenge for Kevin since his debut. {{}}
In contrast, the FBI's computer system is very easy to overcome, and while waiting, Kevin recalled that after he entered the FBI's system in a chic and free way, he found a very serious case, which was to investigate a hacker, but, when he went in, Kevin smiled, and he saw that he was taken very seriously by the FBI and became the number one hacker.
Now that he was there, Kevin was naturally unceremonious, he completely deleted all the information he had from there, and then, all the agents investigating his identity became fugitives.
If I go in this time, and if I change President Reagan's information to a forcible criminal, I don't know what will happen? Kevin's mind flashed through this thought.
"Knock, knock." Suddenly, there was a knock on the door.
Kevin's mood tensed up as he quickly unplugged the phone cord from his modem, closed the computer, put it in his briefcase, and placed it on the table.
Kevin calmly opened the door and saw a young man wearing a half-sleeved red sè uniform and a gray sè hat, with a Walkman headset in his ear. {{}}
Seeing Kevin open the door, he said, "Hello, the two burgers and fried chicken you just ordered." ”
It turned out to be a KFC delivery person, but he didn't order takeout? Kevin replied very depressedly, "You are on the wrong track. ”
"Isn't this 503?"
"Here's 403." Kevin finished saying this very upset and closed the door.
The face that was still smiling just now was stunned, he took off his headphones, looked at the house number carefully, and walked upstairs.
After this walk, he reached the sixth floor, and then, he pulled the line next to the headset and said, "The target is confirmed, it is indeed Kevin." ”
"Organize all of us and keep him safe." In a car two kilometers away, Bill replied.
Kevin was very bold and came here alone, but Bill absolutely did not agree, he had to protect Kevin's safety, but he couldn't disturb this genius, so he used most of Iraq's forces in the United States to carry out this mission.
Kevin's invasion must succeed and must not fail.
Kevin closed the door and turned on his computer again.
"There seems to be something wrong with our computer just now." At this time, the two people who had finished playing returned to the computer room and saw the data calculated on the computer, which was only a little smaller than when they left, could it be that the mainframe computer crashed?
"Maybe there's something wrong with our programming, so let's wait, maybe tomorrow." Another person said that if it was a problem with the program, then it must have started the process of endless bug adjustment again, or make do with it first, and both of them reached a consensus.
"It's time for us to go to dinner." The black brother said that he had a lot of fun playing just now, and at the same time he was hungry.
Two people came out of the computer room again.
Kevin turned on his computer and connected again.
Connected to the controlled computer again, Kevin suddenly became excited, his luck was too good, the Pentagon's password had been tried out with the help of that mainframe computer after three hours.
Of course, this has something to do with Kevin's careful planning in advance, although it is also a brute force crack, but Kevin did not let it test all the combinations of letters and numbers at will, so that a password of sufficient length will make all the computers crash when they add everything.
Kevin has prepared a tentative rule in advance, compiling the names of all continents in the United States, the names of the main leaders of the previous zhèngfu, the names of all the high-ranking people in the current zhèngfu and their families, and even the names of the national curses, etc., these important information are compiled into a codebook to test these combinations first.
Since you have successfully entered, the next thing is naturally to enter it first, browse it, and have what you are interested in, as for the information in the Middle East, you will copy it yourself depending on the situation.
Although the password of the periphery was tried, after entering the other party's system, Kevin still needed to use various means to finally break into the other party's large and tightly guarded database and find out the information from there.
Kevin's fingers were beating on the keyboard, since he had cracked the most difficult password on the periphery, and then entered the inside, this model of today's mainstream database, he couldn't help but be embarrassed.
At this time, Kevin was very excited.
New Jersey.
"We need to get into the Pentagon's computer to show that our combination is capable enough to rival Kevin." A sixteen-year-old boy said.
"Yes, Kevin was already in the North American Air Protection Command System when he was fifteen years old, and we have to do better than him!" Another teenager also said.
Hackers, it's an exciting profession, and seven teenagers from New Jersey, Van Pyer, Red Sè Bachata, Private Branch, N-J. Harker, Shak, Vault, and Beowov (all by their names), embark on their legendary journey as they get into Pentagon computers!
In later generations, it took them several months to get in. rq