Shi Lei repeatedly investigated the clues that the supercomputer Lightning had been hacked. Originally he thought it was an internal crime, but through the security monitoring system, it was determined that the conditions for an internal crime were not met.
After ruling out an internal crime, Shi Lei could only reluctantly accept that the supercomputer Lightning had been invaded by an external party. Moreover, the external intruders had unknown means to bypass the external defense of the Endless Defense System and Yizuer's verification, directly
Enter the inside of the lightning supercomputer.
Shi Lei is very confident in the Endless Defense System and Yizuer. According to Shi Lei's prediction, even the top giant of the Angel Council cannot break through the super computer Lightning's defense.
So what kind of hacker force broke through the lightning defense of the supercomputer?
"Yizur, logically deduce the identity of the intruder." After investigating for more than an hour, Shi Lei still found no evidence, so he could only treat it like a dead horse and asked Yizuer to logically deduce the identity of the intruder.
Logical reasoning about the hacker's identity information mainly relies on judging the characteristics of the intruder's operation commands to determine the possible identity.
"Sir, based on the system's logical reasoning, the intruder may be the Big Penguin Company." Yizuer gave a possible answer.
Shi Lei frowned. Shi Lei knew the technical strength of Big Penguin Company clearly. It was absolutely impossible for them to bypass the endless defense system and enter the supercomputer Lightning.
If Big Penguin had such technical strength, they wouldn't have lost so miserably when competing with Dream Entertainment!
"How high is the possibility of this?" Shi Lei asked.
"It is impossible to give accurate data and there is no comparison benchmark. There is only one answer for systematic logical reasoning." Yizuer could not answer Shi Lei's question. This question could not be numerically quantified.
Shi Lei rubbed his temples. Although he did not believe that the big penguin had such technical strength, he was still prepared to investigate. At least this was an evidence clue.
In words, you can despise Big Penguin Company, but in action, you must not look down upon Big Penguin Company too much!
"Yizur. Integrate the resources of the IWN secret network!" Shi Lei operated the No. 1 server, obtained the resources of the IWN secret network, and entered the internal network of the Big Penguin Company from a secondary webpage under the Big Penguin Company.
The booth set up by Big Penguin Company was a bit big, and with Shi Lei's strength, he easily broke into their internal network. In the internal network, Shi Lei ordered Yizuer to search for information related to the supercomputer lightning.
If Shi Lei looked it up by himself, it would be as difficult as finding a needle in a haystack!
About two minutes later, Yi Zuer sent out a reminder that abnormal information content was found in the Penguin Company's internal network.
"Sir, a suspicious connection IP address was found in the system record log. After system comparison, the connection IP address is the network address of the supercomputer Lightning!"
Shi Lei was stunned by Yizuer's prompt. A display interface popped up on the screen of Server 1. It displayed the system log information Yizuer obtained from the Big Penguin Company's internal network.
Looking at a server of Big Penguin Company that was directly connected to the supercomputer Lightning, Shi Lei had a strange expression.
"Is it really the Big Penguin Company that is causing trouble?" Shi Lei said to himself. Yi Zuer found evidence that the Big Penguin Company's server was connected to the supercomputer Lightning. Shi Lei also began to suspect that the invasion of the Supercomputer Lightning had something to do with the Big Penguin.
Company related.
Shi Lei personally investigated the system recording logs of the server in Big Penguin Company's internal network. Shi Lei checked very carefully. Although the previous system recording logs had been deleted by the system. However, Shi Lei used deep disk recovery technology to recover the fragmented information.
Integrated technology and extracted most of the system logs.
By analyzing the system logs, Shi Lei discovered something suspicious.
That is, although the server of Big Penguin Company is directly linked to the supercomputer Lightning, it is not the source of the intrusion. It is just a transit server, that is, a broiler server.
Long before Shi Lei investigated the Big Penguin Company, the servers of the Big Penguin Company had been invaded and controlled by other personnel. If Shi Lei's data recovery technology was not brilliant enough to recover most of the deleted system log information, then the Big Penguin Company
will be completely framed, and Dream Entertainment and Shi Lei will only vent their anger on Penguin Company instead of continuing the investigation.
‘Insidious guy!’ Shi Lei snorted in his heart, and based on the server of Big Penguin Company, he once again began to investigate the black hand who framed Big Penguin Company.
Shi Lei didn't think that the other party was going to such great lengths just to frame Big Penguin Company. In this weird invasion, Big Penguin Company was just caught in the crossfire. It was just a cover-up used by the mastermind behind the scenes in an attempt to interfere with the subsequent investigation of Mirui Technology.
stumbling block.
The real hacker who invaded supercomputer Lightning is still hidden in the fog!
'Who is he? Although the Big Penguin Company is not very powerful, it is not something that cats and dogs can bully. The other party can actually control the Big Penguin Company's server and use it as a transit springboard without being discovered by the Big Penguin Company, and can also deliberately
Leaving the connection IP address as a trap, this guy is definitely not simple!'
Shi Lei's brows had furrowed into the character "Chuan".
If you want to take advantage of Big Penguin Company, you need at least a world-class hacker master. However, if you want to silently invade the supercomputer Lightning, Shi Lei doesn't know what level of hacker can do it.
The world's top hackers definitely can't do it!
Even the world's top hackers among the first generation of hackers can't do it!
To put it bluntly, even if it is the birthplace of the Internet, DARPA Advanced Directorate cannot silently break through the endless defense system and deceive the advanced pseudo-artificial intelligence system Yizuer.
unless…
Shi Lei suddenly thought of a situation and his expression changed drastically!
Before the rebirth, 99% of the world's top 500 supercomputers used server CPUs produced by Intel, and supercomputers using AMD server CPUs were so rare that they were comparable to 'national treasures'.
It was precisely because of this situation that Shi Lei subconsciously ignored that the supercomputer Lightning was built using server CPUs produced by AMD.
In the last generation, server CPUs produced by AMD were hard to come by. They were mostly used in small and medium-sized enterprises. In a hacker technology discussion conference, a hacker announced his new discovery, that is, CPUs produced by AMD
Server CPU has a fatal hardware vulnerability.
That’s right, it’s a hardware vulnerability!
AMD's server CPUs have an extremely fatal hardware vulnerability. As long as they master this hardware vulnerability, hackers can directly enter. Servers built using AMD's server CPUs completely ignore any firewalls and security systems and directly disguise themselves as CPUs.
The core program avoids all troubles.
‘Is it that hardware vulnerability?’ Shi Lei thought in his mind. He tried hard to recall which hacker was the one who published the AMD server CPU hardware vulnerability.
Judging from the current situation, there is no doubt that the person who invaded the lightning supercomputer must be the hacker.
Although it was still several years before the other party announced the hardware vulnerability of AMD's server CPU, no one is sure when exactly the hacker discovered the hardware vulnerability.
Shi Lei's memory is very good. If it is important information, Shi Lei can remember it as long as he recalls it slowly.
"I remember! It's Maha Kamal!" Shi Lei's face showed a hint of joy, he put his hands on the keyboard and quickly entered the name of "Mahar Kamal".
This name is not the real name, but the hacker's "waistcoat" name.
"Yizur, search the Internet for information about 'Maha Kamal'! By the way, the other party is from the Inca country. He mainly focuses on investigating information in the Inca country." Shi Lei ordered.
Maha Kamal is an Inca, Shi Lei will not remember this wrong. In the original hacker technology discussion conference, every participant had to use a real vest to log in. Maha Kamal took the initiative to admit it when introducing himself.
He is an Inca.
The overall national strength of the Inca Kingdom is far inferior to that of the Xia Kingdom, but in terms of software technology strength, the Inca people are very powerful. They have built a world-renowned software industry chain and become the world's largest software outsourcing service provider.
After analyzing the possible suspects, Shi Lei breathed a sigh of relief.
Powerful enemies are not scary. What is truly scary is unknown enemies! Such unknown enemies can easily make people feel powerless.
"Mahar Kamal, hum!" Shi Lei's tone was filled with disdain. Maha Kamal's hacking skills have reached the world level, but they are far from the world's top level.
As long as Shi Lei knows the other party's methods, he is not afraid of the hardware-level vulnerabilities the other party has mastered. This vulnerability has been disclosed by the other party and Shi Lei has personally verified it.
In later generations, supercomputers and large servers using AMD server CPUs basically do not exist. This hardware-level vulnerability is very useless, so Maha Kamal announced it to increase his reputation.
Shi Lei tried to use the hardware vulnerability as a breakthrough to invade the supercomputer Lightning. Just as Shi Lei guessed, he easily entered the inside of the supercomputer Lightning, without triggering a counterattack from the endless defense system or triggering an alarm from Yizuer.
.
"As expected!" Shi Lei sighed.
After finding the crux of the problem, Shi Lei immediately began to investigate the hardware vulnerability of AMD's server CPU, wrote the corresponding defense auxiliary program, and used the defense auxiliary program to completely block the hardware vulnerability.
Moreover, once someone uses the hardware vulnerability again and attempts to enter the supercomputer Lightning, they will be counter-tracked by the defense auxiliary program until the other party's real IP address is found.
After handling the defense auxiliary program for hardware vulnerabilities, Shi Lei began to look forward to it. He wanted to see what Maha Kamal was capable of!
.
PS: Shanshan: I guessed the ending, but not the process! Germany won the championship, but it was in overtime! Damn the Asian Handicap! Set it to automatically update tonight, goodbye everyone, I’m going to the rooftop!