Chapter VIII: Invasion at the Highest Level
In the multimedia classroom of Cheung Chau University, Professor Zhang Jun and the other three sat down in their chairs with a smile, and the computer in front of them had also returned to normal.
Professor Wei casually picked up a bottle of mineral water and took a sip, then complained: "Where did this pervert come from?" I haven't heard that there is such a person recently, is it the vest of a big guy? ”
Professor Qi took over the conversation: "It won't be the boss of the Hacker Alliance, Lao Zhang, aren't you familiar with the people of the Hacker Alliance?" See what's wrong? ”
Professor Zhang Jun smiled bitterly and shook his head: "I'm this age, and there are a few previous students in the Hacker Alliance, you know, we all teach theory, and our hands-on ability is not strong, those people practice every day, how can we be surprised by our old bones." ”
"Look, didn't the White side of the Hacker League ask you to give a lecture to their members last time? Although we usually don't practice much in class, if we don't work hard, we won't be beaten to the point where we can't fight back, right? This guy can hijack the universities and middle schools in Changzhou City, he must be a native of Cheung Chau, and outsiders don't often hack these schools, how could he hijack the school's server in an instant. Professor Qi frowned and analyzed.
As soon as Professor Wei heard this, he immediately felt that it made sense, and hurriedly continued: "Lao Qi is right, he can hijack the servers of so many schools in Changzhou City in an instant, obviously he has left a backdoor in the server before, and it is very likely that he is a native of Changzhou City." ”
"Even if you are not a local, at least you are studying or working in Changzhou City, otherwise you will even have a dark middle school for thousands of miles, and you will have enough to eat? Since it is from Changzhou City, not from the School of Computer Science, or from those software groups engaged in network security, Lao Zhang, do you want to inquire, which way is the fairy? ”
Zhang Jun raised his eyebrows: "What's the matter?" Are you still counting on the real world to find a place to find a place? Do you think of yourself as an underworld? ”
Lao Qi waved his hand and hurriedly explained, "Where do you want to go?" Losing is losing, and it's not a shame to be inferior to others, I want to ask how this guy managed to call so many school servers at the same time in an instant..."
Standing up and pushing the laptop in front of him, so that the two professors next to him could also see the screen, Professor Qi continued: "Look at this data, this is not a disordered DOS attack, each DOS instruction has at least three or more correct instruction sets, and the attack is very accurate, that is, to control our data terminal to finally obtain the IP address." ”
Professor Zhang Jun and Professor Wei are both professionals, and they can see the special features at a glance from the data, and they immediately frown and think.
Professor Wei touched his chin, as if talking to himself, and said: "It should be that the backdoor permission he left is very high, which allows him to call up a large amount of computing resources, and then he himself implants the built-in algorithm script he wrote in the server, so that he can achieve the purpose of precise attack just by sending instructions." ”
"That's right, but his scripting language must be very close to the underlying code, otherwise the server would not be able to perform such complex operations, it may be a script written in C language, or even assembly language..."
These people are all professors who teach at the university, although the actual hand speed operation can't keep up with the rhythm of young people, but as an old fox who has taught for decades, all of them have a vicious vision.
Professor Qi looked at the two people who were focused on the side, and said with a smile: "So, I just wanted Lao Zhang to inquire about where the monster came out, aren't we currently working on the topic of "Distributed Logic Operations of Intelligent Programs"?" Let this guy come over and teach us a lesson, and we'll learn from it. ”
"You mean...?" Professor Wei suddenly came to his senses.
Professor Zhang Jun stood up, but he opened his mouth and sighed: "Sure enough, society is the place to hone talents, a few of us guys have been thinking in the office for a few years to find out a little clue, and we haven't even fully realized it on the server of Changzhou University, but I didn't expect this guy to not only realize, but also have been applied to practice, okay, I'll ask the students in the hacker alliance to see if I can dig this guy out." ”
The other two professors also couldn't help but sigh that the computer industry is too youthful, the industry information changes too fast, and they are a little behind, and they will immediately be unable to keep up with the pace of the times.
— —
In the Cheung Chau Hotel, Li Mingyu was still lying on the bed in a large shape, but at this time, the computer screen in the hotel began to display a series of data.
Subsystem number: 1, the traversal is complete, and the return to the main program starts iteration.
Subsystem number: 2, the traversal is complete, and the return to the main program begins to iterate.
Subsystem number: 3, the traversal is complete, and the return to the main program starts iteration.
...
Subsystem number: 1578777, traversal complete, return to the main program to start iteration.
Subsystem number: 1578777, traversal complete, return to the main program to start iteration.
Subsystem number: 1578777, traversal complete, return to the main program to start iteration.
...
The first traversal of the subsystem is fully completed, and the second traversal starts...
— —
Leizhou City, a military base, inside the Network Information Security Center.
"Alert! Alert! External unfamiliar IP access, please confirm the permission..."
"What's going on?" A middle-aged officer heard the siren and immediately yelled loudly in the room.
At this time, there were still two young people who were dozing off in the information security center, and they immediately came back to their senses when they were yelled at by the middle-aged officer.
"Still sleeping! It's time for work! A young man with an inch head kicked the brother who was still staring in a daze beside him, and shouted in a low voice, and the other person immediately came to his senses.
The military base is different from other places, all the networks are internal networks, and the connection with the external network also has a special interface, any external network wants to access will be reminded by the base's alarm system to manually check the permission, just now it is obvious that there are non-authorized personnel in the network of the military base, triggering the base's alarm.
The two young men tapped on the computer screen for a moment, and then reported to the officer: "Team Zhou, a rookie with good skills, has just broken through our outermost firewall, but has not found the second firewall, and is about to be caught." ”
The middle-aged officer nodded, and then asked, "Have you found the IP address?" ”
"Now that the third-tier IP address has been found, it is a server of the school in Changzhou City, but I guess it is also a springboard, and the defense ability of the school server is not very strong, and it is easy to be hijacked." A young man with a stilt head replied.
"A school in Cheung Chau City? If the address is in a foreign country, call back, if it is in China, contact the police to see if it is a native or a foreigner, and see if the native is willing to work for the country, sign an agreement if he is willing to sign an agreement, and if he is not willing to give a verbal warning, just lock it up for a few days. ”
Team Zhou paused, and then said: "If it is a foreigner, it should be sentenced to a few years, and when the chief will come to inspect, I will go to prepare for the reception work, and you will handle it flexibly." ”
"Okay Captain, don't worry, I'll catch this little rookie before you come back." A young man with a young head said with a hippie smile.
As soon as Team Zhou walked out of the room, another young man with a young man with a smile said to his companion: "How can this little rookie be used, when Team Zhou comes back, the two of us will be able to catch him in ten minutes." ”
"You know a fart, I won't say a little longer, and then Team Zhou will definitely think that we are fishing, since we were specially recruited, neither of us has made serious contributions, so we must not behave well in front of the leader."
"As far as you know, I've deciphered his second-to-last IP address, and I'll be able to catch him in no time, huh?"
The young man with a hippie smile suddenly looked stunned.
"It's not good, this guy hid his strength before! Come help me! ”
"What's going on?"
"His IP address suddenly jumped to RB and he united thousands of servers to attack our firewall at the same time."
The other young man was immediately startled, this level of intrusion had reached the level of a national hacker spy, and he immediately joined in the encirclement and interception of unknown hackers.
"Oh no, he's about to get advanced access to the base's second-layer firewall, and he must be stopped! Quickly press the alarm! ”
For a while, the alarm bell in the base rang loudly, and Team Zhou, who had just gone out a few steps, ran back out of breath and scolded loudly: "What happened? Why did you go off the secondary alarm? ”
"Team Zhou, the other party has hidden his strength, and he has deciphered the IP address of RB, but he can't verify whether it is the other party's disguise, the other party will soon obtain the second-level authority of the base, I can't stop him!"
"Can't even stop you?" Team Zhou was surprised.
"Yes, the other party has hijacked thousands of enterprise-level servers as broilers, and the servers of the base are about to be overloaded, Team Zhou, please cut off the network connection to the outside of the base."
"Cut off the connection to the outside world? Not now, in order to meet the inspection of the superiors, the weapons depots of each base only shared data yesterday, and the data of new weapons has been transmitted for the past two days, and now the entire Eastern Theater will be affected if the connection is interrupted, is there a way to organize him? ”
"Yes! Supercomputer access, give me three percent supercomputer access, I can stop him. Team Zhou, be fast, I'll hold on for five minutes at most. ”
"This..."Team Zhou hesitated for a moment, then took out his mobile phone and made a call.
"Lao Xing, it's me, Zhou Tianmin, immediately allocate five percent of my computing power, I've been beaten here, yes, it may be a little devil, isn't this a weapon update, maybe there is a leak somewhere, these flies will smell it, you hurry up, a minute? Okay, I'll wait for you. ”
"Xiao Yang, the computing center has transferred the authority, this is the account password."
The fingers of the young man on the board were tapping on the keyboard quickly, and with the blessing of the supercomputer's computing power, the opponent's offensive was obviously much slower.
After a while, the young man stopped tapping his fingers on the keyboard, turned his head and said to Team Zhou: "Team Zhou, the other party noticed that we called the supercomputer and ran away, I didn't find the final IP address, only the server located in the Ivy League, but it should not be far from the final IP address." ”
Team Zhou frowned, and scolded in a low voice: "Stepping on a horse, Xiao Yang, can you be sure that it is a little devil?" ”
"This..."Xiao Yang hesitated slightly, but still replied: "Although the final IP address has not been found, but it is these little devils who are attacking, and they immediately retreated after they noticed that we were using supercomputers, it is likely to be civilian hackers, after all, their military also has supercomputers, and they will not retreat as soon as they see supercomputers." ”
"Okay, I know, give you two a task, hack all the IP addresses of the RB you found just now, don't get off work today if you don't hack it, it's not our style to let anyone fart when they hit their heads, do you hear clearly?"
"Yes! When is it dark and when is it off. ”
In the evening of the same day, more than 30 universities and more than 130 middle schools in RB were all attacked by unknown hackers, and some school materials were seriously damaged, including some military research materials.
At this time, in the Cheung Chau Hotel, a piece of information appeared on Li Mingyu's computer: suffering from supercomputer defense, iterative interruption, seeking an alternative, the alternative has been drawn up, and the iteration is starting again...
— —
Country M, a secret military research center somewhere in Boston.
"Klein, there's a signal intrusion, Class A! No, it's S-class, contact the cybersecurity department immediately. ”
"Oh my God, S-class invasion, which madman is attacking us?"
In the military research center, all network intrusions will be divided into levels according to the intensity of the attack, generally speaking, they are ABCDEF sixth, F level means that it has an impact on the firewall but the degree of impact is not high, and by analogy, A level means that it can defeat the firewall, and S level means that the firewall will collapse immediately after the contact attack, and will be defeated by the other party at any time.
Generally speaking, only the use of supercomputers can cause S-class network intrusions into servers.
In the office of the security department of the military base, everyone was busy because of the sudden S-class incursion, and the white man with glasses stared nervously at the computer screen.
"How's Dodge? Could it be that the other party used a supercomputer? Which supercomputer in which country? I immediately applied for computing power from the National Supercomputing Center. A blonde beauty next to the white man asked anxiously.
Dodge tapped on the keyboard and replied differently, "The other party is not using a supercomputer." ”
"How can it be if it's not a supercomputer? The firewall of our research center is unlikely to collapse at all, and only the computing power of a supercomputer can overload the system. ”
The world's supercomputers are all public, once it is known which supercomputer is attacking, then the research center can immediately apply for permission accordingly, request its own supercomputer to defend, without information blind defense, it is likely to backfire.
"It's really not a supercomputer." Dodge retorted anxiously.
"The other party hijacked a large number of enterprise-level servers and launched an attack on us, I have fought back against more than 3,000 servers, but the system still has more than 300,000 servers to launch access requests to us, these 300,000 servers come from all over the world, there are enterprise servers, school servers, and even the servers of some private arms contractors in country M, the number of these servers has been increasing, and it is about to exceed 400,000."
Dodge took a deep breath and exclaimed in surprise, "We are being attacked by the whole world. ”
As he spoke, a shrill alarm sounded in the research center: "Alarm, alarm, alarm, server is about to crash, please disconnect the network immediately." ”
This is the highest level of intrusion in the base is the alarm sound of the system, and once this sound sounds, it means that the research center is about to be completely exposed to the public network for slaughter, and all research materials will be made public.
"Quick! If the network of the base is unplugged, the information of the research center must not be revealed. A white officer ordered.
When Dodge unplugged the base's network switch, a deep sense of powerlessness emerged in his heart, the other party's attack method was too arrogant, completely unreasonable crushing, he didn't know how many people there were on the other side, but it should not be a few, after all, it can manipulate 400,000 too enterprise-level server attacks at the same time, no matter how you look at it, it doesn't seem like one person can do it.
Seeing that the network of all the computers in the base was disconnected, the white officer breathed a sigh of relief, the other party's attack was too fast, and he was also very helpless to choose this hooligan counterattack, but these are not important, the data of this research center is too important, no matter what the price is, the security of the data must be guaranteed.
"Dididi~"
The phone rang in the quiet research center, and a young man in a white plaid shirt answered the phone, only to find a busy tone on the other end of the phone.
"Dididi~"
Another phone rang, and a blonde beauty in a dress also received a call without a sound.
Dodge was interrupted by two phone calls, and was about to say something to encourage everyone's morale, but as if he had suddenly found a demon, he rushed to the blonde beauty in the dress, snatched the phone and then fell to the ground, and the smartphone immediately shattered into several pieces.
"Quick! All phones are turned off! All computers are powered off! Fast! The other party is hacking with a mobile phone! ”
The white officer, who had just put his mind at ease, reacted immediately, and hurriedly ordered everyone to turn off their mobile phones, but the peripheral eye of his eyes still saw the faint file transfer progress bar on the computer screen.
97%, 98%, 99%, 100%, text transfer complete.
"It's over, the file leaked out." The white officer only felt that his brain was blank, and for a moment he was a little overwhelmed.
Dodge followed the white officer's gaze, and also found the faint progress bar on the screen, and suddenly a deep frustration welled up in his heart, he is the strongest hacker in Boston, this kind of control of the smartphone, through the smartphone to connect to the computer Bluetooth means of course he will, but to do all this in such a short time, but also to transmit such a huge amount of text information, in his opinion, it is simply a fantasy.
But his opponent not only did it, but did.