In the room, Shi Lei's hands and ten fingers seemed to bring up afterimages, typing on the keyboard quickly. Fortunately, the keyboard that Shi Lei bought was a silent keyboard, otherwise, the crackling sound would be connected into a line.
In the core server group of Aikexin Company, Shi Lei has entered the system and has broken a system gap, injecting the permission system he wrote himself into the linux system of the core server to replace the original permission system.
Shi Lei knows very well about the Linux system. Without causing the overall system of the server group to crash, he injects a brand new permission system into the server group system!
After having the new permission system, the original two super permission users were downgraded to first-level permissions, but their management permissions have not changed at all, and are still the same as the previous super permission users. The only difference is that they cannot retrieve the only super permission users newly established by Shi Lei in the permission group!
Unless they thoroughly check the server group system and find that the permission system has been replaced, Shi Lei mastered the server group of Aikexin Company and made this small supercomputer his first-class broiler!
After successfully establishing his own super permission user, Shi Lei immediately used the super permission user to start changing the server group of Aikexin Company and creating a system backdoor to facilitate the next time he entered without realizing it.
Since the super permission user is in hand, the security guards of Aikexin Company did not find anything wrong at all, and Shi Lei established the system backdoor. From then on, even if Shi Lei swaggers into the Aikexin Company server group, the security guards would not doubt it. Because Shi Lei had obtained the super permissions of the server group, and changed from hacking to normal access.
The server group of Aikexin Company will be Shi Lei’s first first-class broiler. The so-called first-class broiler is the general term for advanced server broiler. The strength of a hacker is largely determined by the quality and quantity of broiler in his hands.
For example, a hacker has mastered one million ordinary personal computers. As a zombie broiler, it is also a terrifying existence! After all, these million zombie broiler are just launching the most primitive violent flood DDOS attack, which is enough for ordinary servers to drink a pot!
Of course, it is probably unlikely to attack supercomputers with violent floods. Which of the well-known supercomputers does not have a hardware firewall? Filtering DDOS attacks is a breeze unless you can launch tens of millions of zombie broilers to attack at the same time!
But if someone really controls more than tens of millions of zombie broilers, as long as this person is not a god, he will definitely be harmonious with the relevant departments of the country!
The disorder of the Internet is also based on the fact that there is no fatal threat to the country. If a hacker truly threatens the core interests of the country, don’t underestimate the power of the country. The country sincerely wants to find someone, but few people can escape.
Even Shi Lei dares not say that he can escape the pursuit of the country by 100%. Because, most of the top forces in the hacking industry, the first-generation hackers, have transformed into cybersecurity experts, or accepted national recruitment, and served as national cybersecurity personnel. The strength of the first-generation hackers is absolutely unfathomable!
However, if Shi Lei captured the supercomputer Yan, he would be confident that it would be absolutely impossible for anyone to catch his IP address!
Under Shi Lei's control, no one can break through the supercomputer Yan's level alone!
In the Aikexin company server group, Shi Lei uses super permission users to modify the server's security strategy. Although Aikexin company also has its own network security experts, these experts are still far behind Shi Lei.
After modifying the security strategy, Shi Lei copied the Rock Firewall from server No. 1. The Norton Firewall of Aikexin Company has been punctured and destroyed by Shi Lei, leaving only an empty shelf. Shi Lei is preparing to use the Aikexin Company's server to sneak directly into the supercomputer Yan, so how could he not repair the firewall?
In case his behavior of invading the supercomputer Yan is exposed, with the help of the servers of Aikexin Company and the Rock Firewall, Shi Lei can escape safely without being chased by the supercomputer Yan all over the world!
Although the Norton Firewall is left with only empty shelves, Shi Lei did not abandon it. Instead, he used this empty shelves to integrate the Rock Firewall into it. In this way, from the user interface of the firewall, it is still Norton Firewall. But in fact, its internal core source code is the Rock Firewall written by Shi Lei. Even if the security guards of Aikexin Company open the Norton Firewall, they will not find the firewall, and there is already a problem!
After the installation of the Panshi firewall, Shi Lei finally checked the server group of Aikexin Company. Then, Shi Lei controlled the server group and extracted a project that Aikexin Company needed to calculate data from the server group, and sent a connection application to the supercomputer Yan.
Aikexin Company applied for part of the use of the supercomputer Swallow from Tokyo University of Technology, and they owned the legal pass of the supercomputer Swallow!
At Tokyo University of Technology, after receiving the application from Aikexin Company, the supercomputer Yan immediately searched for Aikexin Company's permissions and system resources that could be used in the internal permission group, and then responded to Aikexin Company's server group, allowing it to connect and enter.
When Shi Lei controlled the server group of Aikexin Company and connected to the supercomputer Yan, he felt excited. In his previous life, Supercomputer Yan was Shi Lei's first supercomputer broiler!
In this life, the supercomputer Yan is finally going to return to his arms!
After connecting to the supercomputer Yan, Shi Lei first transmitted the calculation tasks extracted from the Aikexin company server group to the supercomputer Yan.
Supercomputer Yan chooses to accept files from Aikexin Company. Yan will first automatically detect the security of the file, and then the security guards inside it will also manually detect it again. If there is no problem with the file, it will be handed over to the supercomputer Yan to run the calculation in a sandbox environment.
Shi Lei did not do anything in the file that needs to be calculated. After all, the other party will undergo several tests. If a problem is found, then Tokyo University of Technology will definitely notify Aikexin Company, and Aikexin Company will suspect that they will not apply for any computing tasks to the supercomputer Yan. The only possibility is that the server was hacked and exploited!
Therefore, the file uploaded by Shi Lei is really the calculation file of Aikexin Company. Then, he used Aikexin Company to connect to the legal channels of the supercomputer Yan and directly headed towards the serious system loopholes of the supercomputer Yan!
The most difficult step to capture the supercomputer Swallow is the first step, how to connect to the supercomputer Swallow! Without a normal connection, the supercomputer Swallow will be rejected. If a hacker attack is used, the other party's security guard will be alarmed.
Only like Shi Lei, you can find a legal connection, connect the supercomputer Yan in a swagger, and then attack the serious system vulnerability of the supercomputer Yan!
After investing in the field of commercial cooperation, there is a serious loophole in the system. Cooperating business users can take advantage of system vulnerabilities and improve their permissions!
Shi Lei used this vulnerability to upgrade his permissions to super permission users in his previous life!
After the files of Aikexin Company were detected, they were sent to the sandbox environment of the supercomputer Yan and began to perform the calculation tasks. Shi Lei carefully found the serious system vulnerability in the supercomputer Yan!
After finding the system vulnerability, Shi Lei did not attack immediately, but instead tried to see if this was a honeypot trap. Although the supercomputer's defense is very reliable, it is still not ruled out that the other party sets up a trap outside the server.
After testing it, Shi Lei confirmed that this was the serious system vulnerability he knew. Shi Lei directly followed the pre-set plan and tapped the code to attack the vulnerability.
Since this loophole had been hacked in his previous life, Shi Lei was familiar with the loophole and drilling into the real internal of the supercomputer Yan, rather than the space for foreign business cooperation!
After entering the supercomputer Yan, Shi Lei first used the loophole to start increasing permissions for Aikexin Company's account. When the permissions of Aikexin Company were upgraded to level three and new users could be established, Shi Lei immediately established a brand new user and reduced the permissions of Aikexin Company to ordinary commercial cooperative users.
Then, Shi Lei raised the permissions of the user he established to level one through the vulnerability, and then stopped immediately. This serious system vulnerability can only be raised to level one and cannot obtain super permissions. If you use the vulnerability and try to increase the super permissions, the super permission user protection mechanism will be triggered, and the entire supercomputer will immediately issue a jing report!
After Shi Lei has first-level permission users, he can enter the permission user group normally and manage low-level permission users to a limited extent. With first-level permissions, Shi Lei uses first-level permissions to access the system security policy and uses first-level permissions to start changing the system settings of the supercomputer Yan.
The first step to change is to cancel the protection mechanism of the super-authorized user. The protection mechanism of the super-authorized user must be the permission of the super-authorized user. If the protection mechanism of the super-authorized user is not cancelled, once the super-authorized user is taken, the protection mechanism will be triggered, and the supercomputer will issue a jing report.
This is a vicious cycle!
Without super permissions, the protection mechanism cannot be cancelled, the protection mechanism cannot be cancelled, and the super permissions cannot be obtained!
The protection mechanism of super permission users is protected by a hardware chip of du Li. It is outside the supercomputer system, is not affected by system interference, and only accepts instructions from super permission users!
Shi Lei looked at the super permission user protection mechanism displayed on the computer screen, showing a sneering look!
———————————————————————————————————————————————
ps: Currently, the recommended votes are 9950+, and the target is 10300, which means that today is 600 votes! I hope everyone supports Shanshan and make Shanshan more recommended votes! Upgrade to the target at 20:06!
Then, according to everyone's request, the book review area has another issue. The prizes will be made before this afternoon.
Please bookmark, recommend, click on members, rewards, comments, everything!
——
[Reward Thanks] Floating with the wind, smile again, reward 100.