Chapter 39: Hello
Thatch has been immersed in the hacker world for many years, and he has grown from an obscure small role to a well-known vampire in the hacker world today. Is General Electric strong? It's not in his hands! But now, when he faced this mysterious opponent, Thatch suddenly felt small.
After a few moments, Thatch canceled the attack on the server, and almost at the same time, the attack on his own computer disappeared without a trace, and after sitting in his chair and pondering for a long time, he logged on to the server again, just to see if he could get some information about the "mirror reflection system", and that's it.
While Thatch stayed on the server and watched quietly, two other streams of data also quietly landed on the server, and all three parties discovered each other's existence, but neither interfered with each other, and it seemed that the other two were only here to watch the excitement.
Thatch ignored the two men, he just stared at the server with all his attention, and as long as there was the slightest abnormality in the server, he would analyze it as soon as possible in order to get the information he wanted.
After observing for a while, Thatch was disappointed, because he found that the server was now running autonomously, which meant that the other party had taken care of the server, so his desire to obtain information was frustrated.
Just when Thatch was extremely disappointed, the two people who were watching the excitement suddenly followed a stream of data, and Thatch, as a bystander, could see at a glance that these two people were all masters, and driven by curiosity, he followed the two to see what they were tracking.
Moments later, Thatch discovered something that stunned him - the two guys, along with the data stream they were tracking, had infiltrated an IP that Thatch was very familiar with, because it was the location of the US North American Aerospace Defense Command!
"Oh my God! Are these three guys crazy? How dare they do that? Do they want to provoke a global nuclear war?! ”
Every clever hacker knows that no matter how good your skills are and how powerful your abilities are, there are some things that you can't touch, such as North American Air Defense Command.
This department is one of the most powerful strategic institutions in the United States, there is no one! Because it is in charge of the US nuclear bomb secrets! What is a nuclear bomb? I believe that all earthlings know the consequences of once there is a difference...... It's scary to think about!
Thatch was shocked, as were the two people who were tracking Satan and the Angel, and they made an appointment to watch together, but when they noticed a stream of data exiting from the server, they immediately followed.
Although Satan and the angels are reluctant to directly conflict with the U.S. government, they have no such concerns about the organization that has compromised the server, and they want to see what kind of sacredness this organization is.
After a while, the two of them were stunned, this guy actually hacked into the local area network of the North American Air Defense Command without hesitation! What's going on? Doesn't this guy know the consequences of doing this?
Through private communication, Satan and the angels immediately made a decision: they must stop each other's actions! Because they have realized a very serious problem - what if this organization has bad intentions and triggers a nuclear catastrophe?
Satan and Angel are both top hackers, and they naturally know that there are many crazy people in the hacker community, and these people can do anything in the virtual world of the Internet! In addition, the two of them were Americans, and when they saw such a thing happening, they couldn't stand idly by, so the two immediately followed behind this data stream and also infiltrated the NORAD COM's local area network.
This person who was tracked by Satan and the angels was naturally Feng Xiaotian, he finished dealing with the server, and after confirming that it was correct, he withdrew from the server, the hackathgame is still going on, how could he stop before he completed his goal?
As for the IP of the North American Air Defense Command, this is actually the IP that Feng Xiaotian found in the core folder of the server, Feng Xiaotian didn't know what the address of Lu Dao meant, he just enjoyed the fun of challenging difficulties, so he didn't hesitate at all, and after exiting from the server, he sneaked directly into this address.
"Hmm...... There's only one supercomputer here, and if there are as many as a hundred servers, it's a bit of a trick. ”
Moments after landing at this address, Feng Xiaotian came to this conclusion through his own observations, but he obviously missed one point: why is there only one supercomputer here? Could it be that the hackathon's organizers are only focusing on servers? This is obviously very illogical, and if you think about it, how can they be so lax in the final battle arena when they are capable of providing such powerful servers?
The answer is simple, because the supercomputer is called "Bastion" and it has a processing speed of more than ten trillion times per second!
Feng Xiaotian didn't know anything about it, and after coming to a conclusion, he began his first tentative attempt, Feng Xiaotian's method was very simple, he directly sent a data exchange request to this supercomputer, to put it bluntly, this is the most ordinary access request, but the message sent by Feng Xiaotian is a little special, because he typed the word "Hello" in English, and even elementary school students know that the word "Hello" means "hello", Feng Xiaotian didn't do this because he was arrogant, he was just informing the organizers of the hacking competition: Pay attention, I'm here!
Less than three seconds after the news of Feng Xiaotian was issued, the base of the North American Air Defense Command suddenly sounded an alarm bell! The shrill sirens were like a doomsday death knell, stirring people's hearts into fear, and many people were looking horrified, all thinking about the same question: What is going on? Could it be that someone is attacking our base?
Unlike their horror, Feng Xiaotian was staring at the computer screen in front of him at the moment, and after sending a tentative message, he received a reply from the other party: "You don't have access. ”
A cold sentence, without any emotional color, this is the result that Feng Xiaotian saw, in the face of this news, Feng Xiaotian began to think, obviously, this computer must have set the conditions for access to the application, restricting the intervention of all strange IDs, so that things are a little complicated, if this problem cannot be solved, it is impossible for Feng Xiaotian to control this computer.
What to do? If you can't even exchange data, how can you control this computer?
Feng Xiaotian thought for a while, and already had a way to deal with it in his mind, but in fact, this method was very simple: since this computer refused to intervene with all unfamiliar IDs, then I would simply use its familiar ID to send out an application.
Feng Xiaotian can see at a glance that this computer is actually connected to many small computers, and they together form a local area network, what Feng Xiaotian has to do now is to capture a computer connected to it, and then use this computer to achieve the purpose of controlling the supercomputer!