typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK055 The Return of Yan

In the room, Shi Lei's ten fingers on each hand seemed to be carrying afterimages, and they were tapping quickly on the keyboard. Fortunately, the keyboard Shi Lei bought was a silent keyboard, otherwise, the crackling sounds would be connected in a straight line.

In the core server group of ACCESS, Shi Lei has entered the system and opened a system gap to inject the permission system he wrote himself into the Linux system of the core server to replace the original permission system.

Shi Lei knew the Linux system very well and injected a new permission system into the server group system without causing the entire server group system to collapse!

With the new permission system, the two original super-privileged users have been reduced to first-level permissions, but their management permissions have not changed at all and are still the same as the previous super-privileged users. The only difference is that they cannot be retrieved

In the permission group, Shi Lei is the only newly created super permission user!

Unless they thoroughly check the server group system and find that the permission system has been replaced. Otherwise, Shi Lei will take control of ACCESS's server group and make this small supercomputer his first-class broiler!

After successfully establishing his own super-privileged user, Shi Lei immediately used the super-privileged user to start changing the server group of ACCESS and creating a system backdoor so that he could directly enter without anyone noticing next time.

Since the super-privileged user was in hand, the security personnel of ACCESS did not find anything wrong at all, so Shi Lei created a system backdoor. From then on, even if Shi Lei entered the server group of ACCESS in a big way, the security personnel could not find anything wrong.

There is no doubt. Because Shi Lei has obtained the super permissions of the server group, changing from hacker intrusion to normal access.

ACCESS's server group will be Shi Lei's first level one broiler. The so-called level one broiler is the collective name for high-end server broilers. The strength of a hacker is largely determined by the quality of the broiler in hand, and

quantity.

For example, if a hacker takes control of one million ordinary personal computers, as zombies, that is also quite terrifying! After all, these one million zombies can only launch the most primitive violent flood DDOS attack, which is enough to attack ordinary servers.

Have a drink!

Of course, it is probably impossible to attack a supercomputer with a violent flood. Which famous supercomputer does not have a hardware firewall? Filtering DDOS attacks is a piece of cake. Unless you can launch tens of millions of zombies

Broilers, attack simultaneously!

But if someone really controls more than ten million zombie broilers, as long as this person is not a god, he will definitely be harmed by the relevant departments of the country!

Network disorder is also based on the fact that it does not pose a fatal threat to the country. If a hacker truly threatens the core interests of the country, do not underestimate the power of the country. The country is sincerely looking for someone, but there are really not many people.

Able to escape.

Even Shi Lei now dares not to say that he can 100% escape the country's pursuit. This is because most of the top forces in the hacker world, the first generation of hackers, have transformed into network security experts, or have been recruited by the country to serve as national network security

Personnel. The strength of the first generation of hackers is absolutely unfathomable!

However, if Shi Lei captures the supercomputer Yan, then he will be confident that it will be absolutely impossible for anyone to capture his IP address!

Under Shi Lei's control, no one can break through the level of super computer Yan alone!

In the server group of ACCESS, Shi Lei used the super privileged user to modify the security policy of the server. Although ACCESS also has its own network security experts, these experts are still far behind Shi Lei.

cut.

After modifying the security policy, Shi Lei copied the Panshi Firewall from Server No. 1. The Norton Firewall of ACCESS Company had been pierced and destroyed by Shi Lei, leaving only an empty frame. Shi Lei planned to use ACCESS Company's server

, directly infiltrated into the supercomputer Yan, how could it be possible without repairing the firewall?

In the unlikely event that his intrusion into Super Computer Yan is exposed, with the help of ACCESS's servers and the Panshi firewall, Shi Lei can still escape safely without being hunted by Super Computer Yan all over the world!

Although there was only an empty shelf left in Norton Firewall, Shi Lei did not abandon it. Instead, he used this empty shelf to integrate Panshi Firewall. In this way, from the user interface of the firewall alone, it is still Norton Firewall. But in fact

, its internal core source code is the Panshi Firewall written by Shi Lei. Even if the security personnel of ACCESS Company open the Norton Firewall, they will not find that there is something wrong with the firewall!

After the Panshi firewall was installed, Shi Lei checked the server group of ACCESS for the last time. Then, Shi Lei controlled the server group and extracted a project that ACCESS required data calculation from inside the server group, and sent it to the supercomputer Yan.

Connect application.

ACCESS has applied for partial use rights of supercomputer Yan from Tokyo Institute of Technology. They have the legal pass of supercomputer Yan!

At Tokyo Institute of Technology, after receiving the application from ACCESS, the supercomputer Yan immediately searched for ACCESS's permissions and usable system resources in the internal permission group, and then responded to the ACCESS server.

group, allowing it to connect in.

When Shi Lei controlled the server group of ACCESS and connected to the supercomputer Yan, he felt excited. In his previous life, supercomputer Yan was Shi Lei's first supercomputer chicken!

In this life, supercomputer Yan will finally return to his arms!

After connecting to the supercomputer Yan, Shi Lei first transferred the computing tasks extracted from the ACCESS server group to the supercomputer Yan.

If the supercomputer Yan chooses to accept a file from ACCESS, Yan will first automatically check the security of the file, and then its internal security personnel will manually check it again. If there is no problem with the file, it will be handed over to the supercomputer Yan.

Run computations in a sandbox environment.

Shi Lei did not do any tricks in the files that needed to be calculated. After all, the other party will go through several tests. If a problem is found, Tokyo Institute of Technology will definitely notify ACCESS, and ACCESS will suspect them.

There is absolutely no need to apply for any computing tasks from the supercomputer Yan. The only possibility is that the server has been hacked and exploited!

Therefore, the files uploaded by Shi Lei were really the calculation files of ACCESS. Then, he used ACCESS to connect to Super Computer Yan's legal channels and directly exploit Super Computer Yan's serious system vulnerabilities!

The most difficult step to capture Super Computer Yan is the first step, how to connect to Super Computer Yan! Connections without normal channels will be rejected by Super Computer Yan. If a hacker attack is used, the other party's security personnel will be alerted.

.

Only people like Shi Lei can find a legal connection method, connect to supercomputer Yan in a brazen manner, and then attack supercomputer Yan's serious system vulnerabilities!

After the supercomputer Yan was put into the field of commercial cooperation, there was a serious loophole in the system. Commercial users of the cooperation could use the system loophole to enhance their permissions!

In his previous life, Shi Lei took advantage of this loophole to upgrade his permissions to a super-privileged user!

After the files of ACCESS were inspected, they were sent to the sandbox environment of supercomputer Yan and began to perform computing tasks. Shi Lei, on the other hand, carefully found the serious system vulnerability in supercomputer Yan!

After finding the system vulnerability, Shi Lei did not attack immediately, but tested it to see if it was a honeypot trap. Although the supercomputer's defense was very reliable, he still could not rule out the possibility that the other party would set up a trap outside the server.

.

After some testing, Shi Lei determined that this was the serious system vulnerability that he knew about. Shi Lei directly followed the preset plan and typed in the code to attack this vulnerability.

Since he had already invaded this loophole in his previous life, Shi Lei was able to easily exploit the loophole and get into the real interior of the supercomputer Yan, not the external commercial cooperation space!

After entering the supercomputer Yan, Shi Lei first exploited a loophole and began to escalate the permissions for ACCESS Company's account. When ACCESS Company's permissions were raised to level three and new users could be created, Shi Lei immediately created

Created a brand new user, and reduced the authority of ACCESS Company to an ordinary commercial cooperation user.

Then, Shi Lei upgraded the user he created to first-level permissions through a loophole, and then immediately stopped. This serious system vulnerability can only be upgraded to first-level permissions, but does not obtain super permissions. If the loophole is used

, trying to elevate super privileges will trigger the super privilege user protection mechanism, and an alarm will immediately sound within the entire supercomputer!

After Shi Lei has the first-level permissions, he can enter the permissioned user groups normally, and can also manage low-privilege users to a limited extent. With the first-level permissions, Shi Lei accesses the system's security policy through the first-level permissions and uses the first-level permissions to start making changes.

System settings of the supercomputer Yan.

The first step that needs to be changed is to cancel the protection mechanism for super-privileged users. To cancel the protection mechanism for super-privileged users, the permission of the super-privileged user is required. If the protection mechanism for super-privileged users is not cancelled, once the super-privileged users are attacked

, the protection mechanism will be triggered, and an alarm will be issued within the supercomputer.

This is an endless loop!

Without super authority, the protection mechanism cannot be canceled. The protection mechanism cannot be canceled, and super authority cannot be obtained!

The protection mechanism of super-privileged users is protected by an independent hardware chip. It is independent of the supercomputer system and is not affected by system interference. It only accepts instructions from super-privileged users!

Shi Lei looked at the super privilege user protection mechanism displayed on the computer screen with a sneer on his face!

——————————————————————————————————————————

PS: The current recommendation votes are 9950+, the target is 10300, that is, today, it will reach 600 votes! I hope everyone will support Shanshan and let Shanshan have more recommendation votes! More updates will be added at 20:06 when the target is reached!

Then, based on everyone’s request, another small event in the book review area will be held. This time the prizes include a seven-digit YY account, an eight-digit Penguin account, and a Penguin couple account. Please see the book review area for details, and they will be made before this afternoon.

Ask for favorites, recommendations, member clicks, tips, comments, everything!

——

[Thank you for tipping] Let the wind blow wildly, smile again, and reward 100.

.

.

.

;


This chapter has been completed!
Previous Bookshelf directory Bookmark Next