Chapter 111: Signal Hijacking

Across the highway, the spacing between high-rise buildings is much smaller.

Many buildings will steal the air area through the floating part of the air, which provides a lot of convenience for the three-person aerial work.

Unlike V, Jack quickly adapted to the special method of moving with two arms, and really looked like an orangutan.

Lille controls the signal jammer he strapped to his chest, which jams radar signals within a certain range.

Combined with the complex terrain of urban high-rise buildings, radar vehicles and drones are unable to detect abnormalities through radar systems.

Soon, the trio arrived at the Biotech Building's building in the Civic Center, where they could see that most of the buildings were still lit up.

The trio climbed the building steadily, and even could see through the glass some office workers who were discussing the status quo intensely.

The height climbs and finally reaches the top of the 400-meter-high building.

The massive aerial span built by the Biotech Building to show its prowess unfolded in front of them, looking like a bridge.

Looking at the huge structure that could not be seen at a glance, V sighed:

"I'll go. Looking down there, I just think this thing is really powerful, and standing here, I always feel as if this shouldn't exist in reality. ”

The bridge across the river is also suspended on both banks, but different structures are always visible around it to make the bridge stable.

The suspended structure of the Biotech Building seems to be a simple collapse of one building and then connected between two buildings.

Lille felt that the designers must have hidden some of the load structures under the exterior walls.

Still, given its length and appearance, this is quite a feat.

"It's a commendable building, but we're not there yet—notice there's a bumblebee drone in the building."

"Tsk, are they really afraid that someone will climb up?"

The long aerial structure has holes on the side for drone patrols.

Occasionally, a small bumblebee drone will fly out of the hole to inspect the structure of the building for anomalies.

Although biotechnology is not intended to use bumblebees as surveillance devices, there will definitely be a reaction when three people are seen running around the building.

"Maybe it's not to prevent people from climbing up, but if you think about it, drones and helicopters are parked on the tarmac on the top floor of the building every day.

It makes sense to deploy such an inexpensive drone at a high level to observe the state of the tarmac, or to command the staff.

Moreover, if there is a problem with this structure, it is a big problem, and the bumblebee should be part of the maintenance of the building. ”

Lille scans and counts the behavior patterns of bumblebees.

There are a total of 12 holes, and each hole will send a bumblebee to scan every 10 minutes, covering their respective sections at a time, which takes about 30 minutes.

After the scan, go back to the computer room through the hole to charge and access the data – it is clear that this is an automated system.

Automation systems are good, hackers love automation systems.

"So what do we do?" Jack asked a helpful question.

"The scanning is not very rigorous, this is not the key security part after all, look at the route."

The route spirals around this aerial structure, avoiding each bumblebee drone and avoiding detection by optical scanners.

In general, the course of action is still relatively concise and easy to understand, and the degree of fault tolerance is also very high-

But the key lies in how to get past the last bumblebee drone.

The final step of the path is not only to dodge the drone, but also to hijack the last drone.

Seeing the last point of the path map turn into an engagement icon, Jack and V asked, "I thought we were going to sneak in." ”

"Just to sneak in."

Lille then annotated the subnet topology he had guessed on their vision systems.

First of all, to be clear however, the three are now outside the building, and the Biotech Building just looks dirty than the building of other companies.

But in fact, the glass on its surface is still high-strength tempered glass.

If you want to break this kind of glass, the movement will be small, and it will also trigger the emergency state of the building.

That's why the company doesn't defend at the top – if you want to get in from the outside, you have to storm it, and the attack will trigger an alarm.

Moreover, there are not many weapons that can break this tempered glass.

The bumblebee drone will return to the nest to transmit data after each scan, and Lille can try to hack the bumblebee drone, and with the help of this logic, send information to the internal system of the biotechnology building.

With a way to exchange information, hacking can be attempted.

This is also the only vulnerability in security.

However, although the bumblebee drone itself is easy to hack, the data is transmitted back to the biotechnology building.

The data sent back by the bumblebee needs to be screened for protection by military-grade ICE.

It's not so easy to get around, and if you make a mistake, you'll be burned into a pulp-

The ICE firewall at the headquarters, and Lille is unlikely to use the old computer-aided computing of another world, after all, even in terms of numbers, the Biotech Building must have more entities than he does to operate and maintain ICE.

However, Lille also has the accounts of several biotech employees, which makes it possible to bypass ICE.

"Understand the technical work, anyway, to hijack the drone - let's get started?"

"Listen to the instructions - start in 10 seconds, the countdown begins."

“10”

As Lille starts the timer, a countdown frame appears on Jack and V's visual system.

The two are ready to go, like athletes waiting for the starting gun to go off --

“1。”

Sou.

Jack and V were engrossed in running along the route marked by Lille.

With so much experience working together, both of them have developed a good habit of believing in Lille, and they only think about moving according to the path in their hearts, without distractions.

More pressure fell on Lille's side, who needed to make sure the trio was always within the loop.

Jack and V didn't disappoint him either, barely deviating from the best course of action, running and climbing along the way, even flying.

To keep up with his running speed, V will use the reinforced Achilles tendon to jump while on the side of the building, and then grab the wall.

Jack, on the other hand, uses his two strong arms to fly when he is under a building, suspended in the air.

The kilometer distance is not long, but considering that this is hundreds of meters in the air, it is the world's top super enterprise building, and this kilometer becomes a bit long-

But they're also top-notch.

The last level --

The bumblebee drone flew out of the hole below, and climbed all the way around the structure—

I happened to be caught by Jack!

"Start the jammer!"

Jack grabbed the drone, and just as the drone's blue light quickly turned yellow and then red, Lille quickly inserted the personal link!

The jammer prevented the drone from triggering the alarm signal, but Lille still had to put the drone back into the hole during the 30-minute patrol period and let it go back and return the data!

In addition to the 7 minutes it takes to fly up, and the time reserved for returning back, Lille has less than 20 minutes to hack!

Lille's brain heats up, and Jack quickly moves along the drone's original line, while V walks a little ahead.

As soon as he came into contact with the software, Lille figured out how the system was connected.

The bumblebee itself is not very secure, and it is clear that biotechs are more willing to put security resources on buildings, indicating that they have confidence in their ICE.

This makes it only average to hack the bumblebee, far from the level of military aircraft.

The red indicator flashes rapidly, turns yellow, and then turns back to blue, and the thruster power returns to normal.

Jack threw the drone at V, who took it, and Ann Weistein activated it, putting the drone back in its normal state.

The jammer turns off, the drone runs slowly, and then plugs into the data return port as usual.

Everything is the same as usual – the only difference is that Lille falsified the scans of the building's façade to actually establish a data transmission link.

Find the Bumblebee permissions, find the secure ports used for the permissions, compare them with the employee information and permission table that Morton gave him, and then

Enter the account number, reverse access to the internal operating system of the biotechnology building from the secure port, and obtain control permissions.

Successfully bypassed ICE in the Biotech Building.

"Employee ID #10039, Location, Area E, 56th Floor, Biotechnology Building, Position: Architectural Design & Safety Maintenance Engineer.

A-level permission floor: the public area of the building, the physical asset operation and maintenance department.

Level B Privilege Floor: Administrative Offices, Technology & Development Department. ”

You don't have to look at the remaining four permission levels - because the later levels don't have the permission to open windows.

Joanne Coch's office is on the 77th floor, and her closest technical and development department is on the 70th floor.

"Move to the 70th floor, and I'll find a robot to open the window."

Thank you for the fish man who never sleeps, and the book friend 20220514174132715, ? Poison?? Armor?? King??? The starting point of 10,000 coins is rewarded

Thanks to the grapes that eat turnips, the crumbs of the pigeon, and the book friends 2020627155728976 the 100 starting coins for the reward

Thanks to Marilyn Monroe the Ripper for the 400 starting coin tip

I'm stupid.,I thought about it yesterday and no one rewarded me to add a little bit down.,And then 3 bosses popped up.,I'm waiting here.,Okay.,Okay.

I don't have a manuscript left, so I'll try to finish it as quickly as possible

(End of chapter)