()ps: The new work has the first place in the best-selling list, the seventh in the best-selling list, we win again! Angel Council, haha.
The official website of jfs adopts a very extreme setting, which is the one-way link expansion technology and one-way data transmission. The advantages of doing this are, but the disadvantages are also obvious.
The obvious disadvantage is that normal users browse the official website of JFS and want to apply for any data, the web server does not have the permission to issue an application, and can only passively wait for the internal data server to find out the application, and then give a reply. ..
In this way, the browsing speed of the official website of jfs has been greatly reduced.
If it is another website, if you dare to browse so slowly, you will definitely be run by similar websites. But where are the peers from JFS?
If you have to talk about your peers, maybe S and Cia are their peers. However, JFS hopes that everyone will browse S and Cia’s official websites to cause confusion to them.
At this moment, the official website of JFS is being attacked. It is a very hidden attack method. If Shi Lei had not been very knowledgeable about computer technology, he would probably not have discovered it!
After discovering someone attacking JFS, Shi Lei did not act rashly, but followed behind secretly to see what their purpose was...
It's best to find any cheaper ones!
Following the invading personnel, Shi Lei found that they had more than ten offensive data streams in total. He secretly guessed in his heart, could these guys who invaded JFS be the Dark Night Dynasty?
Shi Lei selected one of the invaded data streams and reversely tracked the other party's IP address. After breaking more than 30 broiler servers in a row, Shi Lei finally discovered the other party's real IP address.
It was the IP address of Xia Guo, and the corresponding real address. Shi Lei did not check it carefully, only knowing that he was in the capital!
It is rumored that the leader of the Dark Night Dynasty, the capital is a person.
After confirming the guess in his heart, Shi Lei became even more curious. Could it be that the Dark Night Dynasty had taken the courage of the bear heart and leopard, and actually dared to provoke jfs?
The power that jfs possesses is roughly simply described, they are about twenty times larger than the Hacker Alliance. If jfs wants to take down the Hacker Alliance, it is estimated that in the Hacker Alliance, except for the core members who can escape, they will take down whoever they want!
Even core members have a considerable possibility of being tracked!
The Dark Night Dynasty and the Hacker Alliance are both second-generation hacker organizations. How dare they provoke JFS?
But now that they are invading jfs, it means they naturally have something to rely on. Otherwise, it would be impossible to die directly?
Shi Lei did not know the support of the Dark Night Dynasty. But since the other party was willing to disperse the JFS firepower for him, Shi Lei was naturally very happy. Last time, within the International Intelligence Bureau of the Ministry of Foreign Affairs, in the confidential information server, Shi Lei deliberately acted a plan called "Plan". It brought excellent background to Shi Lei's future development. If he could get anything good in the International Intelligence Bureau of the Ministry of Foreign Affairs, then Shi Lei would never be polite.
The attack of the Dark Night Dynasty.jfs has not been discovered yet. As a compatriot, Shi Lei was embarrassed to cheat them. Anyway, there is a very hidden reporting mechanism in the web server of the official website of the jfs website, and they will definitely trigger that mechanism and attract the attention of the jfs security experts.
Shi Lei only needs to sneak into the jfs internal network based on the system backdoor that he left behind to find what he needed.
While monitoring the operations of the Dark Night Dynasty, Shi Lei connected to the internal data server of the Tokyo Metropolitan Earthquake Prediction Society.
In the earthquake prediction agency, the plug-in left by Shi Lei in the earthquake prediction software is still working normally. Through the records, Shi Lei found that the earthquake forecast in Kanagawa Prefecture has not yet appeared.
Instead, it prevented an earthquake with a sense of earthquake and changed the data to an earthquake without shock. The plug-in worked normally, and everything was executed according to Shi Lei's script.
Just when Shi Lei felt bored and was about to tease Haneda Airport, on the JFS official website, the Dark Night Dynasty triggered and activated the reporting mechanism.
It is now 6:00 pm in Xia Kingdom time and 7:00 pm in WoSang Kingdom time. Due to the cyber war between the two countries, all the JFS security experts did not get off work and were holding back their anger and were ready to rescue the cyber world of WoSang Kingdom at any time.
The JFS security experts were teased by Mr. M and had already been full of ghost fire and had nowhere to vent.
When the Dark Night Dynasty triggered and activated the reporting mechanism of the JFS official website, it was as if it had stabbed a hornet's nest. Twelve formal security expert groups and twenty-seven preparatory expert groups all came over.
Before the people of the Dark Night Dynasty could react to what was going on, they were bitten by JFS security experts and desperately tracking their real IP address.
Shi Lei was waiting for this opportunity. Taking advantage of the JFS security expert to bully the Dark Night Dynasty, Shi Lei immediately sneaked into the JFS internal LAN.
The system backdoor written in assembly language has been sunk into the bottom layer of the system, and it is indeed very powerful. The many security experts of JFS have not discovered the existence of the system backdoor.
After Shi Lei entered the JFS's internal LAN, he quickly searched for their confidential information server. The last time he had found a confidential information server, but this time Shi Lei did not spend too much effort to find the confidential information server.
After entering the confidential server, Shi Lei felt something was wrong in his heart. He came in because he was too easy, as if he had no defense at all?
Inside the confidential server, Shi Lei first discovered the So plan and also had various other confidential information. For example: the South Vietnam Forest Plan, the Indonesian Island Plan, the Nanyang Plan, etc.
Shi Lei did not rashly open any information, but first analyzed the file system.
The first analysis is the so plan, which cannot analyze anything useful from the name of this plan. It does not, like other plans, can analyze some information to a greater or lesser extent.
For example, the South Vietnam Forest Plan can be analyzed. It is related to the South Vietnamese country and is related to the forest plan. The South Vietnamese country has very rich forest resources, and perhaps the Wosang country is paying attention to this.
Shi Lei had read a report before that there were many forests in the country of Wosang, but they did not develop their own forest resources, but imported timber from Xia. This behavior not only met the timber needs of Wosang, but also caused considerable damage to the forest resources of Xia.
However, some people in Xia Kingdom couldn't see the facts clearly. They tried every means to sell the wood to Wosang Kingdom.
Returning to the topic, Shi Lei analyzed the file system of the so-planned file system and found that it was restricted by various files, cannot be opened directly, deleted, cannot be moved, cannot be copied. In short, that is nothing!
Shi Lei was very upset about this kind of document!
It is bound to the server's permissions by the file system. If you want to obtain permissions, you have to invade the server's permission group.
If it is an ordinary server, Shi Lei will kill all privileged users of the permission group in minutes and become the only permission group member. But here is the International Intelligence Bureau of the Ministry of Foreign Affairs. Confidential Information Server!
Shi Lei didn't have to think too much about it, just knowing that the confidential information server was definitely connected to the JFS supercomputer.
If you want to obtain permissions to a confidential information server, you may have to deal with the jfs supercomputer.
JFS's supercomputer is very powerful, and xing is not much worse than the supercomputer Yan. Although Shi Lei masters the supercomputer Yan, Shi Lei dare not fight with JFS's supercomputer.
Shi Lei does have the supercomputer Yan, but Shi Lei can only borrow some of the supercomputer Yan's xing energy. After all, the supercomputer Yan's system undertakes various large-scale tasks. If Shi Lei does not restrict and randomly mess with the supercomputer Yan, he will definitely be discovered by the supercomputer Yan's security personnel.
Because of this reason, Shi Lei dared not fight with JFS's supercomputer, and could only think of other ways.
Looking at the so plan, Shi Lei carefully checked the user status of the confidential information server permission group.
From the permission group of the confidential information server, Shi Lei found that there were only three users who had permission to mobilize the so plan.
After finding these three user names, Shi Lei investigated the account information of the Network Security Department and everyone in the JFS internal network.
If you want to investigate their account information, the best way is to hack into the other party's computer and find relevant information in the other party's computer.
If you want to hack into the computer of JFS security experts from an external network, although it can be done, it is quite difficult not to be discovered by them.
However, Shi Lei is now in the jfs internal network, and it is not that difficult to enter the computers of security experts from the internal network, and it is not easy to be discovered.
Controlling the supercomputer Yan, he found the connection information of security experts in the internal network. After entering the security experts' computer, he first searched the names of their computers.
Many people like to change computers to their own usernames. As expected, in the computer name of the Cybersecurity Department, Shi Lei discovered a username with the same permission group as the Confidential Information Server.
Shi Lei carefully checked the computer and successfully extracted the computer login password from the computer's configuration file record.
With this password, Shi Lei needs to take a gamble now!
The password of this username can also be used in the confidential information server. If the password is universal, Shi Lei can naturally enter the confidential information server and take away the so-called plan.
If the password is not universal, it should be calculated based on the security level of JFS, which will cause the confidential information server to report. Then, if the action to steal the So plan fails, Shi Lei will still apply oil to the soles of his feet, so get out of here quickly!
Shi Lei would not usually be willing to do such gambling behavior. But if he didn't gamble, he would have to face the JFS supercomputer. Shi Lei was not sure that he would kill the supercomputer in a short period of time and did not attract attention.
For the sake of the present, I can only give it a try!