Chapter 24: First Encounter with Angel

In view of the fact that the Tianyan system is currently limited to Haidu, and the behavioral feature capture program will take time to complete, Li Chunfeng temporarily named the system "Haidu Eye".

Li Chunfeng was just in a hurry to set up the network, and now he has begun to further delete duplicate cameras, optimize the monitoring perspective, record the monitoring blind spot area, and then mobilize satellites to complete it.

When I was optimizing, I suddenly received a message from a server of NASA M that it was being intruded.

Originally, with the spread of kamikaze 2.0 on the Internet, there would be a large number of intrusion alarms and similar information all the time, and usually Li Chunfeng ignored them.

It's just that now I've just hacked a satellite system at NASA, so I'm more sensitive.

After all, the invasion of kamikaze 2.0 has not been discovered so far, so could it be that NASA has any black technology to discover kamikaze 2.0?

With questions, Li Chunfeng quickly started a perceptual attention thread and locked the server.

Immediately, it was discovered that there seemed to be an offensive and defensive battle between invasion and anti-invasion going on in that server.

Li Chunfeng found that there were three packets with different characteristics in the server, and two of them were constantly strengthening the defense of the server firewall and constantly filling in the system loopholes.

The other is constantly scanning the attacking system and seems to be looking for more vulnerabilities in the system.

It seems that the attacker is one and the defender is two.

Since you don't discover kamikaze 2.0, you can watch a hacker battle with your heart.

This is an unprecedented experience, and of course Li Chunfeng will not let go of this wonderful opportunity to move a bench and sit aside, just watch and not speak.

However, in case the two sides suddenly quit and ran away, of course, they were also curious, Li Chunfeng started another thread and began to track the real IP of the three hackers at the same time.

The attacker was named A by Lee Chunfeng, and the defender was named B and C.

The defender has a clear geographical advantage, and B and C are invoking firewalls or other tools at all times to accurately block A's offensive line.

In addition, Li Chunfeng found that C actually used another computer, and he had detoured to the springboard broiler behind A from the side.

Apparently preparing to copy A's lair.

A doesn't seem to notice, or doesn't care at all, that someone else is going to him through a broiler.

A seems to have discovered multiple vulnerabilities in the system through intensive attacks and powerful scans at this moment.

Almost as soon as C took control of A's broiler, A had already infiltrated the core of the system from one of the vulnerabilities.

B and C didn't even notice it, and they blocked A's attack at the firewall.

"Hehe, it's an old routine that strikes the West, but the routine is very useful."

Li Chunfeng smashed his mouth, very emotional.

At this moment, the tracking thread has returned information, and the IP addresses of B and C are displayed, which are indeed the same as the location of the server.

Apparently B and C are NASA's cybersecurity personnel, and the information is further fed back later.

B, real name Robert Hans, is the director of NASA's Information Security Division. C, whose real name is George Sewell, is a senior engineer in the Information Security Division of NASA.

Li Chunfeng immediately classified and stored the information of the two, and of course, the feature codes of the two on the Internet were indispensable.

Immediately after that, A's real IP address and related information were also fed back.

A, whose real name is Isabella Taylor, is 24 years old, and the most important thing is that she seems to have a hacker code name, which is actually called "Angel", and her abbreviation is also consistent.

Then, the camera already saw me.

The face was like a full moon, and a pair of light blue, delicate eyes were slightly bulging, forming a plane with the eye sockets, and at this moment, because of the success of the invasion, the eyes looked very excited.

This has short blond hair and a typical European and American beauty's face, but it is also worthy of the name "Angel".

At this time, the "Angel" had already completed the blitz, and it seemed that she was about to download something, and Li Chunfeng quickly copied the information package she was about to download.

After this information flow was fed back, Li Chunfeng found that this was actually part of the code program of the satellite positioning system.

This made Li Chunfeng quite puzzled, this "Angel" went to such great lengths to break into the NASA server, just for these codes? But Li Chunfeng really didn't see anything unusual about this code.

Then from the camera, I saw this short-haired blonde beauty excitedly shouting "Yes!" He also raised his right fist and waved it.

It looks like the code packet has been downloaded.

Suddenly, Li Chunfeng's mischievous psychology was committed, and his mind moved.

"Angel" shows a line of text on the laptop screen.

“Angel, congratulations on your success!” ("Angel, congratulations on your success!") For convenience, the following dialogue is in Chinese)

"Ahh Angel was so frightened that everyone stood up and took a few steps back, their eyes full of horror.

After waiting for a few minutes, Angel noticed that the computer was not moving further, so she walked back in, reaching out and pressing her chest against it, as if that would put her at ease.

Angel, who was slightly calm, sat down, quickly opened a clipboard, and quickly typed out a sentence on it, "Who are you?" ”

"I'm a kamikaze, didn't scare you, did I?"

Li Chunfeng did not write on the clipboard she opened, and it was still displayed directly on the screen.

Angel suppressed the huge shock in his heart, Angel is very confident in his hacking level, and it can be said that he can rank in the top ten in the North American hacker world.

I once dreamed of displaying text directly on the screen of the broiler that was hacked by myself, but it never came true, and I could only call the WordPad program to write a message.

But this kamikaze actually wrote the screen directly, and how did he hack into his computer?

You must know that in his computer, the defense software scans all kinds of external information all the time, how can he hide and dodge?

"How did you find me? How did it get into my computer? ”

"God is everywhere, wind is everywhere!"

Angel's hands suddenly moved, and the speed of his hands was amazing, and in the command line window that was brought up, the instructions were flying.

Apparently, Angel is trying to find Li Chunfeng, who has invaded.

Li Chunfeng happily watched her busy in front of the computer, and at the same time observed her operation to see if she had anything to study.

Li Chunfeng found that Angel did a good job of scanning the system, and after her scanning, basically most of the vulnerabilities would be found, and the intrusive data would also be hidden.

However, Li Chunfeng still found that the speed of this scanning program is really not ideal.

Because, by the time Angel finished scanning, an hour had passed.

At this time, Li Chunfeng found that George Sewell of the Space Agency had been forced over step by step through Angel's broiler springboard, and it was estimated that two more broilers would find Angel here.

Angel in front of the screen finished scanning the computer, and quickly filled in the newly found holes, and then breathed a sigh of relief.

Now she believes that the kamikaze should be kicked out of the computer by herself.

Still, she tentatively wrote on the clipboard: "Kamikaze, are you still there?" ”

"Well, you're done? It's too slow! Your 4899 broilers have left their tails, the space agency guys have come to the door, hurry up and clean up, we'll have a date later. Li Chunfeng replied.

Then I saw Angel with his mouth open, his eyes full of disbelief, and he muttered, "This...... No way! I've filled all my holes, why are you still here? ”

Li Chunfeng withdrew from the attention thread, anyway, all the information of Angel is in his own hands, and he wants to find her, and it is easy to locate it.

Angel looked at Li Chunfeng's message, waited for a while, and even asked a few more times, but did not get any feedback, and finally believed that this mysterious kamikaze had left his computer.

Then she quickly operated on the computer for a while, and then exclaimed, "Oh my God! The NASA guy really tracked him down, so I'm going to take him around in circles. ”

Angel's subordinates were operating, and they already admired the kamikaze in their hearts, not only was this person safe and sound under his own scanning, but he could also find that someone had tracked him down.

has been a hacker for so long, and he has always hacked others, and he will be hacked by others.

In response to that sentence, "You always have to pay it back when you come out." ”