Chapter 36: Feng Xiaotian's battle with the hackers
(Thanks to the "Zhewei" book friends for their tipping and support!) )
At this moment, on the other side of the earth, Feng Xiaotian has gained control of the server, the first thing he did was to kick out all the people hidden in the background of the server, after doing this, he began to check the core folder of the server, and soon, he obtained an IP address, it seems that this address should be the location of the computer behind the server.
Feng Xiaotian wrote down the IP address, and then checked the core folder again, after confirming that it was correct, he was ready to exit the server, since he had already obtained what he wanted, he was not ready to continue to consume it here, the hacker competition was still ongoing, as long as he did not get the final victory, he would not stop his steps.
But just as he was about to log out of the server, a window suddenly popped up in the lower right corner of the computer, showing the following message: "Warning! Warn! Unit 37 has been breached! ”
Feng Xiaotian was stunned when he saw this message, and then he understood: I have gained control of the server, so the server's alerts will be seen by me, but this seems to have nothing to do with the hackathon, so I don't have to participate, right?
As soon as Feng Xiaotian thought of this, another message popped up again: "Warning! Warn! Machine No. 5 has been breached! ”
This was followed by a message that popped up: "Warning! Warn! Machine 13 has been breached! ”
Alarm messages popped up one after another, in just a dozen seconds, several computers of the server were breached, Feng Xiao Tianzhi said, this should be the result of other hackers, lost the timely deployment of the maintenance personnel behind it, this server finally loosened under the attack of hackers.
Feng Xiaotian looked at the alarm messages that popped up one after another, and smiled slightly, he had such an idea in his heart: Why don't I take this opportunity to test the software program I developed?
In order to deal with the potential threat of hackers, Feng Xiaotian has developed two sets of software, one is called "Qiankun Great Shift", which is a firewall software, and the other is the "big bad wolf" software for flood attacks.
Feng Xiaotian only thought about it for a few seconds and made a decision: Anyway, he has obtained the IP of the computer behind the server, so it is better to test his results.
Thinking of it, Feng Xiaotian immediately took action, seeing that the matrix of the server had been lost one after another, Feng Xiaotian did not dare to slack off, he uninstalled the server's own firewall as quickly as possible, and then installed the "Qiankun Great Shift" on the server, this time only took less than a minute, that is to say, the server completely lost any protection in this minute time, it can only rely on its own hardware to carry it, when Feng Xiaotian installed the "Qiankun Great Shift", There are only a dozen machines left after the server is at its worst, and I have to say that these hackers are really powerful!
However, this situation quickly stabilized, and when the "Great Shift" was running, there was no longer a single machine lost in the server, and as for those computers that had been compromised, Feng Xiaotian immediately began the "Lost Land Recovery" operation.
Although these machines were breached, they did not stop running, they were just occupied by hackers, what Feng Xiaotian had to do was to snatch them back from the hackers, for others, this difficulty was not ordinary, but in Feng Xiaotian's opinion, it may not be, his "big bad wolf" has not yet appeared!
Feng Xiaotian directly gained a place on each machine through management permissions, and then he used this as a base to embed the "Big Bad Wolf" software into these computers, and as he activated the "Big Bad Wolf", the hackers who originally occupied these computers immediately discovered that something was wrong, and many people's first thoughts were: Why did my flood attack suddenly become weaker?
Their second thought was: Holy! How did my broiler disappear so quickly?
Their third thought was - no, it can't be called an idea, because these people have already scolded: "xxxx! What's going on? My broilers are gone! Ahh - and my computer! How did it crash?! ”
The whole process only lasted a few minutes, and then ...... Then many hackers' computers crashed, and even worse, their computers burned out because they were subjected to huge data processing in an instant, and the CPU burned out because they couldn't bear it!
Feng Xiaotian is for Lu, why would he achieve such a result? This is due to the hackers' attack methods and the characteristics of the "Big Bad Wolf" software.
First of all, these hackers are using the flood attack mode, in order to occupy the server, they can only delay the processing speed of the server through continuous flood attacks, and finally until the server crashes due to overload, they can completely control the server, but unfortunately, this server is a little different, it is a matrix composed of a hundred supercomputers, and the computing speed of each supercomputer is more than 10 million times per second, so even if the hackers launch a terrifying flood attack, None of these computers have crashed yet, and as for the server alerts, it's just because these machines can't do their normal jobs due to the huge flood attack, and that's what the system says they are breached.
This situation has completely changed since the operation of the "Big Bad Wolf" software, the "Big Bad Wolf" is specially developed to deal with flood attacks, it can transfer all the access applications of hackers to the hackers themselves, so that it is equivalent to the hackers themselves attacking themselves, the more huge the flood attack, the more obvious the effect of the "Big Bad Wolf", so the first hackers to rout down, it can be said that they are the most ferocious hackers, as for the hackers whose computer hardware was burned, They are actually the most powerful of these people.
With the operation of the "Big Bad Wolf" software, the server matrix returned to Feng Xiaotian's hands one by one, every time he got a computer, he immediately installed the "Qiankun Great Shift", after a while, the server was left with only nine machines still in the hands of hackers, although these machines ran the "Big Bad Wolf" software, but it didn't seem to have received any effect, Feng Xiaotian couldn't understand this: why didn't these hackers get kicked out of the server?
If you have any doubts, you naturally have to find out the reason, and five minutes later, Feng Xiaotian learned the reason for the incident, three of the nine machines have been completely lost, that is, they have completely broken away from the server and been controlled by hackers.
As for the other six, two of them have crashed because they are infected with a virus, and one is in a tug-of-war, this one is more peculiar, although the hacker also launched a flood attack, and the "big bad wolf" software is also running, but you have been in a stalemate between the two sides, Feng Xiaotian only looked at it for a while, and he completely understood: it seems that this hacker has a very powerful computer and can deal with the data flow lured back by the "big bad wolf" in a timely manner.
The last three machines are a little different, Feng Xiaotian has now gained control of the server, but when he wanted to enter these three machines, these machines actually refused his access application, obviously, these three machines have been snatched back by the organizers of this competition, they have the core code of the server in their hands, Feng Xiaotian is naturally unthinkable about this.