Chapter 34: One Minute Invasion

Professor Vinson returned to his office and drank coffee leisurely, today must be the best day for the cybersecurity situation in the United States, because the hackers are participating in the competition, how long has it not been such a day? If you don't relax, you're failing God's gift.

Professor Vincent was drinking coffee here, but Feng Xiaotian on the other side of the world was still busy, after more than half an hour, he still found nothing, no way, this server is too powerful, even if he knows the feasible way, but the server itself refuses anyone's access to internal files, without a password, Feng Xiaotian can't enter the system to view the login log - this makes the problem go back to the starting point - if you want to control it, you have to defeat it first.

Feng Xiaotian asked himself if he didn't have this ability, and after a long period of observation, he found that this server was simply strong! The software matrix mode is to eliminate all the possibility of cracking, how do you crack a hundred sets of processing systems? Well, even if you attack them one by one, will the other party sit still and wait for death? This is obviously impossible! In general, the organizer will definitely monitor the changes in the server in real time, and no small change can escape their eyes.

Feng Xiaotian let out a sigh, he was still thinking, now he even had a faint feeling of excitement, when facing challenges, Feng Xiaotian always had an urge to overcome difficulties, of course, this was only limited to what he was interested in.

After more than ten minutes, Feng Xiaotian, who had been in a stupor, suddenly patted his head, only to hear him complain to himself: "Why did I ignore this?!" ”

With that, he logged out of the server with his computer, and then he logged in to the website where the publisher was located.

What did Feng Xiaotian overlook? The answer is very simple, he ignored the information of the organizer's personnel, the organizer of this hacker competition did not show up, it seemed quite mysterious, and the others didn't know who they were, Feng Xiaotian didn't care about it, what he cared about was the information of the organizer's relevant staff.

Feng Xiaotian wants to gain control of the server, but he can't break the server, so he can only start from the control of the server, since this website has released the news of the hacking competition, presumably the person who posted the news must have a close relationship with the organizer, if you pass this clue, maybe you can get the password of the server!

This is the most feasible way that Feng Xiaotian thought of, so he immediately took action, fifteen minutes after logging into this website, he obtained control of the website through his own ** reverse thrust program, and then he checked the information release record of the website, and in less than ten seconds, he found the answer he wanted.

Feng Xiaotian according to the information he had,Began to track down the publisher of the news,Three minutes later,The other party's computer was broken by him,Compared with that powerful server,This guy's personal computer is as weak as a baby,Feng Xiaotian through the system vulnerability,It is easy to control this computer,No way,This person's computer uses Windows 3.0 operating system,For this system,Feng Xiaotian is simply too familiar to be familiar with,He knows that this system has as many as thirteen vulnerabilities!

Then he began to browse the communication records in the computer, it seems that this guy rarely communicates with people on the computer, so there are only three people in the computer's communication log, Feng Xiaotian continued to track the IP of these three people, fifteen minutes later, he excluded two of them, and turned his attention to the person who was screened out.

Feng Xiaotian felt that he was getting closer and closer to the goal, and he accelerated his actions under the excitement, and within half an hour, Feng Xiaotian kept tracking, cracking, and then tracking and cracking in the network, and through his continuous efforts, he finally saw a glimmer of light - Feng Xiaotian found a very special computer, because this computer actually has a firewall installed, and it is exactly the same firewall as that server!

Feng Xiaotian can't break through the firewall of the server, that's because there are as many as a hundred firewalls on this server, and there are people on duty behind the server, but this computer is not like this, it is just a personal computer, and there is no special person on duty, that's all.

Feng Xiaotian faced the firewall of this computer, showing a smile of ambition, and then he began to act.

What is a firewall? It is actually a protective tool with isolation and filtering functions, to put it simply, it is through filtering, the threatening data is isolated from the core program of your computer, so that your computer can be protected from things such as Trojan viruses, if you want to break the firewall, you have to disguise your data, so that the firewall does not think your data is a threat, so that you can enter the other party's computer. (The Firewall appeared in 1993, with minor changes here)

How do I break a firewall? Feng Xiaotian's method is very simple, he directly wrote a deception program, hiding his real instructions in the middle of this program, and sending a data exchange application to the computer, as long as the firewall is deceived, the computer's operating system will be exposed in front of Feng Xiaotian, the operating system is still difficult for Feng Xiaotian?

At the same time, in the cave of Cheyenne Mountain, Colorado, USA, a piercing alarm suddenly sounded from the data monitoring center of the US North American Air Defense Command, and a staff member turned his head to look at the location of the alarm, and immediately changed his face: "Hurry up and inform Commander Lecce!" His personal computer is being hacked! In addition, the people of the Cyber Security Department will act immediately! Can't let this guy get his way! ”

As soon as these words were spoken, the staff in the room immediately became busy, and the full-time staff told the news to Commander Lecce through the internal phone, Commander Lecce was sitting in the office to process documents, after hearing the news, he was stunned for a moment, and then said to the receiver: "Although there is no confidential information in my computer, I still can't let this person hack successfully, otherwise this will be a shocking scandal!" Immediately organize a manpower operation to catch this reckless guy! ”

Hearing this, the full-time officer replied: "Your Excellency, Commander, we have already begun to move - oh, you wait for now, there is very important news to convey to you." ”

Commander Lecce said yes when he heard this, and then he heard this conversation coming from the receiver of the telephone:

Pete ...... The Commander's computer has been hacked......"

"What do you say? This...... How is this possible? It's been less than a minute since the alarm went off! ”

"It's a shame, but that's exactly what it is...... However, our security personnel are tracking this person's IP and believe he can't escape...... Pete, you'd better tell Commander Lecce this news......"