typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK257 Endless Defense!

ps: On June 1, the monthly ticket will be updated with five additional monthly tickets, and will automatically expire.

The newly written antivirus firewall, under Shi Lei, who is the world's peak hacker, has lasted for half an hour without crashing, which can already show its excellent xing capabilities.

But Shi Lei just ignored a problem. He always wanted to fight the anti-virus firewall head-on, but never thought of a different way to directly attack the anti-virus firewall?

In normal intrusions, many times, first target antivirus software and firewalls, breaking the firewall's defenses first, and then puncture the antivirus software to terminate all target defenses.

Shi Lei disguised himself as a normal access and entered the old laptop from port 80. He did not change other settings, but directly detected to the anti-virus firewall.

The newly written antivirus firewall, although it can protect all targets that need protection, is not able to protect itself!

Shi Lei invaded the anti-virus firewall, controlled the anti-virus firewall, modified and set the anti-virus firewall itself, changed the targets that needed protection, and also unzipped access restrictions.

The antivirus firewall that was changed without any defense was changed by Shi Lei successfully!

The entire process, in less than three minutes, the originally invincible defense has collapsed from itself and become extremely fragile.

Shi Lei frowned, exited from the old notebook, and then opened the source code of the anti-virus firewall to make new modifications.

The newly written antivirus firewall has insufficient defense power on its own, so Shi Lei has increased his power in this area. In addition, there is another "" most important disadvantage.

That is, you can directly change the settings of the antivirus firewall in your computer!

Is there a way to lock the settings of the antivirus firewall and prohibit modifying the settings of the antivirus firewall in your computer?

It is prohibited to modify the settings of the antivirus firewall on your computer. So how to modify the settings?

Shi Lei accidentally glanced at the high-definition camera on the server No. 1 case, and another light of inspiration flashed through his mind!

"Yes! Why am I so stupid? I live in Baoshan, but I don't know how to use it!" Shi Lei murmured to himself, and began to modify it in the source code of the anti-virus firewall.

It is prohibited to modify settings in a computer, and it is not really not allowed to modify settings in a computer. If you really do that, then what computer software is called?

The so-called prohibition of modifying settings in a computer is that it is not allowed to directly pass through the computer. Modify settings without authorization. Just like Shi Lei just did, by imitating normal access, after entering the system, the protection list and access rules of the anti-virus firewall were directly modified.

Shi Lei embedded a behavior dynamic capture program in the anti-virus firewall. The behavior dynamic capture program is used to make a solid shell to prevent it from being cracked.

If you want to modify the settings of the antivirus firewall, you must go through the authentication of the behavior dynamic capture program. That is to say, Shi Lei needs to use a high-definition camera to cooperate in reality, and the settings cannot be modified directly on the computer alone!

After making the behavior dynamic capture program into a solid shell, Shi Lei once again encapsulated the entire antivirus firewall and copied it on an old notebook through the USB flash drive for installation and debugging.

After confirming that the antivirus firewall was successfully running on the old laptop, Shi Lei once again passed the No. 1 server and began to invade the old laptop.

This time, Shi Lei entered the system through port 80 as usual, trying to modify the settings of the antivirus firewall.

Unfortunately, the hard shell made by the behavior dynamic capture program protects the antivirus firewall. If you want to change the settings of the antivirus firewall, you need to verify the behavior dynamic characteristics!

In other words, you must not only have to match the actions, but also have to match the dynamic characteristics of the actions before you can enter the settings page!

Shi Lei and the dynamic behavior capture program are on the verge of, and all kinds of means are used up, but these means are simply unable to enter through port 80.

Whether it is a virus, a Trojan, or a puncture, it has no effect at all.

Seeing that the antivirus firewall could not be solved, and after testing the invasion from the outside before, Shi Lei directly used the last resort to try.

The last method is to use huge data streams to impact the anti-virus firewall.

Although the anti-virus firewall is powerful, the machine power equipped with it is always limited. Shi Lei wants to see what will happen to an old laptop after it exceeds the limit load of the machine.

Through server No. 1, connect to the public server of Shuangqing University, draw resources from the public server of Shuangqing University, and join forces with server No. 1 to carry out a unified attack on the old notebook!

The public server of Shuangqing University's "hacker hk257 endless defense!", even if the campus security system occupies a large amount of resources, is far beyond the xing power of old notebooks.

Under the impact of huge data volume, the CPU usage rate of old notebooks has increased rapidly and the temperature has continued to rise. When the safety limit is reached, the old notebooks will crash directly!

Seeing the result of the crash, Shi Lei was not surprised. The old notebook was restarted and the anti-virus firewall was automatically started randomly, and he continued to perform his duties and protect the security of the old notebook.

After passing the brute force test, Shi Lei was very satisfied with the antivirus firewall's xing ability.

What else is not satisfied with?

At least Shi Lei cannot break through the defense of this antivirus firewall. No matter what method is used, it will be either deleted or rejected by the antivirus firewall.

As a world peak hacker, can anyone else break through the antivirus firewall that Shi Lei cannot break through?

Shi Lei dares to say that such a person does not exist!

In other words, such a person, the world's peak-level hacker that Shi Lei knows will definitely not be able to break through!

The newly written antivirus firewall is a defense that is unsolvable. Even if it gets into the system, it cannot prevent the operation of the antivirus firewall.

Once you touch the defense rules, you will be cleaned up directly!

Take the moon virus as an example. Although the moon virus can be browsed normally through the browser and then enters the system in the form of cached temporary files, when it wants to form a resident virus or infect other image files with protected files, it will be deleted by the anti-virus firewall!

Shi Lei is full of absolute confidence in this newly written antivirus firewall.

Compared with the Rock Firewall, the newly written antivirus software is many times more powerful!

Shi Lei named the newly written antivirus firewall Endless Defense!

It means that the defense of this antivirus software has no end, only endless defense!

After confirming the available xing for Endless Defense, Shi Lei immediately encrypted the source code of Endless Defense using the behavior dynamic capture program and stored it separately on the USB drive.

On server No. 1, the Rock Firewall retreats behind the scenes, with brand new endless defense, providing the latest defense support.

Seeing Endless Defense installed on Server 1, Shi Lei yawned a big yawn and stood up to lock Server 1. At this moment, it was already dawn outside the window. Shi Lei washed up a little and then lay down on the bed and fell asleep.

After staying up all night, I can't afford to hurt!

In the country of WoSang, Raphael set up many traps on the Internet, waiting for Mr. M to appear. After waiting all night, he didn't even see Mr. M's ghost!

Raphael, who was in vain, decided to wait a little longer.

Raphael was on the other side of the world, and the time there was exactly the opposite. The whole night in the Kingdom of Vosang, the Southern Dynasty and the Kingdom of Xia was just a daytime in Raphael.

A daytime is nothing to Raphael. Raphael is also preparing to wait for another "entertainment show". According to Raphael's idea, Xia Kingdom, Vosang Kingdom and Southern Dynasty Kingdom are daytime. Maybe Mr. M likes to act during the day?

The second generation of moon virus broke out around nine o'clock during the daytime in Wosang Country!

Time flies, and it is almost five o'clock in the afternoon. Shi Lei, who has been in the middle of the night, finally got up in a daze. On the other side of the world, Raphael is already near five o'clock in the morning.

Raphael, who was furious, couldn't help it, controlled his supercomputer thunder, easily captured the official website of nhk TV station, leaving an inexplicable announcement.

‘Mr. m, you damn despicable thief, now solemnly sue you and return the stolen things to me quickly. Otherwise, no matter where you are, I will find you and tear you into pieces!’

Without any signature or any sign, Raphael does not want to cause trouble in the country of Vosan. After all, the International Intelligence Bureau of the Ministry of Foreign Affairs is not simple. If they are targeted, Raphael will also feel annoyed.

nhk TV station is considered unlucky!

NHK TV was repeatedly injured many times, and every time a hacker invaded, I can never forget the official website of NHK TV.

This time Raphael also subconsciously used the official website of nhk TV. Maybe he also thought that the official website of nhk TV was the best invasion!

When Shi Lei finished washing up, he unlocked the dynamic capture program of server No. 1 and checked the situation of the moon virus in Wasang Country, he also checked the news on TBS TV.

From the news on TBS TV, Shi Lei discovered the information that the official website of NHK TV was hacked again, and also found Raphael's message.

From Raphael's message, Shi Lei instantly judged that it was Raphael!

Shi Lei once snatched Raphael's fruit of victory in the Sumida District of Tokyo, and thus became a feud with Raphael. Fortunately, the vest used by Mr. M at the beginning, otherwise it would be a good thing to be kept in the Angels Council!

However, after the development of Endless Defense is successful, as long as the supercomputer Yan is in hand, Shi Lei doesn’t seem to be afraid of Angel Parliament!

Endless Defense, unlike Rock Firewall, has no characteristics. It only knows two moves, deletion and denial of access. In other words, if there are no corresponding characteristics, you will not be afraid of exposure!

Even if the International Intelligence Bureau of the Ministry of Foreign Affairs besieged Shi Lei again, Shi Lei can calmly use endless defense to resist the International Intelligence Bureau of the Ministry of Foreign Affairs.

As long as you run an endless defense server, xing can be superior enough to withstand any attacks!

"Raphael, do you want to have fun? Then let's have fun!".

(To be continued.)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next