Chapter 38: A New Discovery of 'Vampires'
(Thank you for your support from the book friend "I don't know"!) In Europe, in Lyon, France, a curly-haired young man is sitting in a brightly lit office with a personal computer in front of him, and at the moment, his hands are flying, constantly manipulating the computer to give various commands.
After a while, he stopped, and then he muttered, "Strange...... It's weird...... Every time I launch an attack, the flow of data gets bigger, and if I reduce the flood attacks, I get less attacks, what's going on? ”
If Feng Xiaotian could hear this, he would definitely say, "There is a computer on the server that is engaged in a tug-of-war, so you are the culprit." ”
The young man's name is Thatch, a researcher at a well-known research institute in France, his research topic is the security of computer networks, of course, this is just his identity on the surface, secretly he has another very loud name - vampire, the name vampire is very loud in the hacker world, Thatch used this code name to do a lot of earth-shattering things, such as breaking the internal network of the German company Siemens, causing the company to lose more than 12 million German marks, He was also responsible for the recent hacker attack on General Electric in the United States, which caused the company more than $8 million in losses.
Thatch's own skills are very good, and he also has the right to use a supercomputer in the institute, so he has always been invincible, in just two years, he has made a name for himself in the hacker world, but today, something strange happened to him, this thing made him a little confused, because the thing itself seemed incredible!
As a well-known figure in the hacker world, Thatch naturally didn't want to miss this hacking competition, but after the competition, he has not been able to break through the server provided by the organizer, although he has a supercomputer with a speed of more than a trillion operations per second, but this server is not vegetarian, through Thatch's observation, he found that he was extremely shocked - this server is actually composed of a hundred supercomputers! Although each of these computers can only perform 10 million calculations per second, a good tiger can't stand a pack of wolves, and only ten of these computers are needed to offset the supercomputer in Thatch's hand.
Thatch didn't flinch after knowing this, on the contrary, a throbbing rose in his heart, Thatch is not a fool, of course he knows that the host who can provide such a powerful server is not ordinary, but he has been in the hacker world all year round, making him eager to face a more powerful challenge, so he immediately controlled all the resources at his disposal, and launched a fierce attack on the server without stopping, within an hour, he was doing this, although it didn't have any effect, But Thatch wasn't one to give in easily, he attacked and waited - what were you waiting for? Naturally, he waited for other hackers to create opportunities for him.
Generally, this kind of competition, but all capable hackers can't help but participate, no matter what the strength of these people is, at least after they launch an attack on the server, it will increase the amount of information processed by the server, as long as this attack reaches a certain critical value, Thatch's opportunity will come, so he insisted, until the time specified in the competition does not come, he will keep going.
However, it soon became clear that there was a considerable chaos inside the server, which was naturally a good opportunity for him, so he did not hesitate and immediately seized the opportunity, Thatch controlled the supercomputer in his hand, and soon launched an attack on the server, this time, his attack finally worked - one of the server's computers was about to be taken down by him.
But at this time, something happened that puzzled Thatch: the computer was about to be unable to resist a complete rout, and at this critical moment, Thatch suddenly found himself attacked by someone else! Thatch didn't dare to slack off, on the one hand, he mobilized the resources in his hands to deal with these attacks on himself, on the other hand, he gathered all his remaining strength, and launched a fierce flood attack on the computer that was about to collapse, in Thatch's opinion, as long as he held on for a few more seconds, this computer would be taken down by himself, and then he would go all out to deal with this guy who attacked him, hum, I want him to know the power of vampires!
Thatch's idea was beautiful, but the reality was cruel, and when he launched the most violent flood attack on this computer, an alarm suddenly came from his own computer, and Thatch was completely stunned when he looked at it, and the content of this alarm was: Warning! Your computer is under intense flooding! Given that the attack is too powerful, please deal with it in time!
What's going on? I have a supercomputer that can do more than a trillion operations per second! If you can make it sound such an alarm, then the other party must at least have a computer of comparable strength, right? But looking at the world, how can an individual have such a computer, except for national institutions and powerful and well-known enterprises?
Thatch thought of this and immediately took action, he reduced the flood attack on the server, and instead focused on dealing with the attack he received, but when he reduced the attack on the server, he found that the attack he received was also smaller, Thatch, as a master hacker, instinct told him that there was something strange here, so he immediately controlled the computer to start the reverse tracking of the source of the data stream, when the results came out, Thatch was stunned!
- The IP he tracked down actually came from this server!
This...... How is this possible? This server is under attack from hackers around the world, how can it still have the ability to attack me? Could it be that the organizers of this contest have used other resources? Otherwise, why would this happen?
Thatch was stunned for a moment, and then he began to act, and after three minutes, Thatch stopped his movements, only to see his eyes wide open and his mouth stammering, "This, this...... Madonna...... The other party actually has a 'mirror reflection system'! ”
The so-called "Specular Reflection System", that's the name Thatch gave to his newfound software, and now he finally learns the truth! Through his continuous probing, as well as the results of the final analysis, the other party must have installed a new software on the computer he attacked, and the function of this software is to reflect all the attacks back!
It's incredible! It's amazing! Thatch only felt that his hacker values were about to be subverted! Is there still such software in the world? Who developed it?