Font
Large
Medium
Small
Night
Prev Index    Favorite NextPage

Chapter 57 Wingman(1/2)

Author: drinking luck

The doorbell rang.

Lin En was sitting on the outermost side of the sofa and was about to get up and open the door.

Sudden,

a click sound,

The door opened.

This door is electronic and can be entered by swiping a card. There is no external lock at all.

Don't know how to open it.

A very ordinary person stood in the middle of the door frame like this. He was of yellow race and had no characteristics at all. He was the kind of person who could be ignored at a glance in the vast sea of ​​people. But it was often this kind of person who was actually the scariest person.

Yisli became excited and said, "Oh, you are that one, that black guy who knows computer technology very well."

"I understand a little bit, I understand a little bit."

The ordinary man interrupted Isley and waved his hand humbly.

After hearing this, everyone present became excited. This is a hacker who understands network technology!

The positioning of hackers is similar to that of programmers in companies. They are both magicians who use the magic of "Internet" to complete magical operations. However, one focuses on intrusion and tampering, and the other focuses on compilation and protection. Both.

There is a high degree of overlap between the groups, but they are also equally powerful. The impression given to Linn is like a black magician and a white magician.

It is very different from the position of a craftsman like a machinist.

"Come in quickly, come in quickly"

These people were panicked and quickly invited this distinguished man to sit down.

"This gentleman is a hacker hired by me, Uncle Chen, and Master Suo Ruiwen through personal connections. He is a hacker who is registered in the Shantytown Programmers Association." Zhu La omitted the other party's name and began to make a brief conversation.

introduction, and then the topic was directly taken over by ordinary people.

"My visit this time is a personal matter and has nothing to do with the association." The man said, and then immediately got to the point: "I already understand the details. It just so happens that I have some personal grudges with Grundfos, so this time it will be the same.

and dealt with it.”

He began to describe his plan of action.

For network hackers, invading a database can be divided into five steps.

They are to collect information, detect vulnerabilities, check the authenticity of vulnerabilities, comprehensive analysis, and the final intrusion link.

Preparation takes up a lot of time.

"I looked at the temporary database of Grundfos. It uses a T2-level "deeply learned" defense environment. The defense is unexpectedly weak. As long as I perform normally, it can be said that it is effortless to defeat his entire defense system."

An ordinary man began to talk boastfully.

It turns out that the modesty just now was just an act.

"But, I happen to be unable to use my full strength right now!"

As soon as this person changed the subject, Lin En had a big question mark in her heart. Why can't she use her strength?

For things like weightlifting and e-sports, hand injuries will indeed have an impact.

But this is a profession that relies entirely on knowledge, so why can’t it use its full strength?

In the other party's narration, Lin En understood again.

"The arsenal of our association is on the Internet page, which is blocked by the wall of information. I can't open the arsenal at all, use advanced tools that are too suitable, and can't summon colleagues to help me remotely. I am now using

Some vulnerability detection modules on the Internet only have T2 level AWSscan, which is a bit cumbersome but still usable.”

"The most important thing is the censorship mechanism!"

"The intrusion module is very easy to be tracked and countered by the censorship mechanism. It is not feasible to use it to test loopholes. I can only act as a last resort to ensure success. But before that, there are quite complicated things to be completed, and I need someone to help me.

Error"

"I need a wingman!"

At this point, the hacker stopped talking.

Someone understood what he meant and frowned: "But none of us have ever been exposed to the Internet, and no one can cooperate with you like this."

"These are very simple things that you can learn now."

With that said, the hacker took out a thick book from his backpack and added: "I know you don't have a terminal and can't transfer data quickly, so I brought this paper book specially."

Lin En lowered his head and looked down, his eyes naturally attracted to it. He saw a few big words written on the cover of the book:

"Introduction to Hacking Technology"

"During this period of time, all of you will study this book, and then I will select the person who has the best grasp of it."

After that, the hacker left.

"These" people looked at each other, and I looked at you. In the end, it was Yisli who opened the book first.

He put his hands on the front and back cover of the book and opened a page in the middle at random, wanting to get a glimpse of the full picture of knowledge.

At a glance,

It’s all symbols!

The professionalism is not relevant at all, and he can't understand anything.

He couldn't help complaining: "This is too difficult. We don't have these foundations at all. How can it be so easy to learn from scratch?"

Uncle Chen said: "You should start reading from the first page. That person said it is a very simple job. You are all young and have a high ability to accept these things. Even though I am old, I haven't said anything yet."

.”

Uncle Chen is a well-known mechanical master. After hearing his advice, several people also calmed down.

Lin En was impatient for a long time. He turned the book to the first page and began to read it carefully with the others.

At first glance,

Can't understand anything.

Looking at it for the second time,

[Computer Science-Cyberspace Penetration:exp+1]

When I look at it for the third time,

Lynn understands.

Understand a little bit.

If you continue to read along with that point of understanding, you can continue to look at the fourth eye.

Then I understand more and more.

One minute later,

Linn already understood it.

He has already mastered all the knowledge on the first page,

So he raised his head,

I found that several people around the table had confused expressions on their faces.

Jura was still reading the first two lines.

Yisli's head moved little by little, and he was about to fall asleep.

Lin En scratched his head and suddenly felt a hint of loneliness as a master.

Next, a few people agreed to squeeze out time in the evening after work every day to study this book together.

On the first day, fifteen people came.

The next day, twelve people came.

On the third day there were only ten people.

Late at night a week later, Linn yawned, rang the doorbell and walked into the secret gathering place.

I don't know what's urgent today, and Zhu La suddenly informed everyone to get together.

So here we are.

this week,

Lin En used her mobile phone to input and copy the contents of the book, and studied at two o'clock in the morning every day. The level of the cyberspace penetration subject successfully reached LV2.

It can be said that he is the best among these elites.

As of now, there are very few people who can continue to persevere.

There were only five people in total.

But they have really basically mastered the work content, and they will probably not fall off the chain when the time comes.
To be continued...
Prev Index    Favorite NextPage