Supercomputer Yan's super-privileged user has been deprived of the protection chip, which is indeed very difficult to deal with!
It can even be said that it is impossible to handle!
However, Shi Lei is the world's top hacker and once controlled the supercomputer Yan. He knows the situation of Yan as well as he knows his own hands!
The developer of the du li protection chip is Intel, a well-known leader in the chip industry. Its quality is very reliable. It not only has an excellent hardware encryption system, but also has anti-static interference, current overload protection, etc., ensuring the safety of the chip itself!
However, precisely because of its thorough security, it provides a solution that can be exploited!
In his previous life, Shi Lei was also blocked by this du li protection chip. In a fit of anger, Shi Lei mobilized the software inside the supercomputer to manage power distribution, bombarded the du li protection chip with a huge current, and instantly caused the du li protection chip to enter current overload protection, and
Make the du li protection chip restart.
There is a gap of about three seconds from the automatic shutdown of the current overload protection to the restart of the duli protection chip. During these three seconds, the super-privileged user is in an unprotected state.
In previous lives, later supercomputers did not use du li protection chips for this reason. If current overload protection is set up, it is easy to be restarted by overload attacks. However, if current overload protection is not set up, it will be directly burned by the current!
The current overload protection method is a good way to protect the chip against duli. However, there should be only a few people who know this method now. Shi Lei also took advantage of his rebirth to know that this is not a loophole.
Every supercomputer is a behemoth. The mainframe of the supercomputer Yan occupies an area of two hundred square meters. The power consumed by each supercomputer is definitely a terrifying number. Therefore, inside the supercomputer, there is a du
Li's power management program allocates the power consumption of each area. Shi Lei carefully entered the supercomputer Yan's power management program and retrieved the power management subroutine of du Li's protection chip.
When he found it, Shi Lei immediately became happy!
Although the power management subroutine of the du li protection chip is locked, the entire power management program can be released through first-level authority, thereby unlocking the power management subroutine of the du li protection chip.
Shi Lei used his first-level authority without hesitation to unlock the entire power management program, and then opened the power management subroutine of the du li protection chip.
After finishing the preparations, Shi Lei did not immediately bombard the du li protection chip. Because the du li protection chip overload protection only lasted three seconds. Shi Lei had to upgrade the account he created to super privileges within three seconds.
, to prevent the du li protection chip from sending alarm information to the security personnel on duty. Otherwise, the success will be in vain and it is very likely to be discovered!
In his previous life, when Shi Lei bombarded the Du Li protection chip, it was at the time when hackers from the Xia Kingdom were invading the Wosang Kingdom on a large scale. The supercomputer Yan was even more of a priority. Although Shi Lei bombarded the Du Li protection chip, the Du Li protection chip
After the restart, a warning message was sent out. However, the security personnel of supercomputer Yan were busy dealing with Xia Guo's hacker intrusion and did not notice the warning message from the duli protection chip. Therefore, Shi Lei repeatedly bombarded the duli protection chip.
, finally seized the highest authority of supercomputer Yan, and manually cleared the alarm information of the duli protection chip.
In this life, Shi Lei doesn't have so many opportunities, he only has one chance!
Within three seconds, seize the super authority, and use the super authority to block the alarm information of the duli protection chip. All this must be completed within three seconds!
Otherwise, everything will fail!
The reason why Shi Lei took so much trouble to obtain super permissions instead of directly grafting the permission system inside the server system like he did with ACCESS Company's server group is because the system programs used by ACCESS Company's server group are not
It's not complicated, and Super Computer Yan's system is not only a professionally developed closed system, but also extremely complicated. Shi Lei doesn't have time to graft the permission system. Even if he has time, Shi Lei can't guarantee success!
Therefore, Shi Lei tried every possible means to obtain super permissions, and then used super permissions to modify the permission system within the system.
Shi Lei began to write malicious programs inside the supercomputer Yan. First, he intruded to elevate the privileges. He wrote his own first-level privilege user into the malicious intrusion program, so that after the program successfully invaded, it would automatically elevate the privileges and become a super privileged user.
.
Then I wrote a message interception program and connected it to the malicious intrusion program. After the intrusion program upgraded its level of authority to super authority, it obtained the authorization of the super authority user, intercepted the alarm information sent by the du li protection chip, and
Du li protection chip overload protection record deletion.
Finally, use the super-privileged user to retrieve the permission system within the system, and then change the permission system to hide your super-privileged user!
After the two small programs were completed, Shi Lei connected them together, and then clicked on the power management subroutine of the du li protection chip.
"From now on, whether you eat a lot of meat or drink the cold northwest wind, it all depends on you!"
In the room, Shi Lei put his hands together, pretended to be a false believer, and prayed to gods and Buddhas all over the sky.
The power management subroutine of the du li protection chip has been adjusted to five times the normal level. Once Shi Lei presses the confirmation button, the du li protection chip will fall into current overload protection and restart.
Shi Lei connected two malicious programs to ACCESS's server group and used this server group to fight against supercomputer Yan. Capturing supercomputer Yan requires a server with excellent performance as a backing. It is precisely because of this
One step! Once the backing server has insufficient computing power to invade the super privilege group and elevate user privileges within three seconds, everything will be over!
"It must succeed!" Shi Lei muttered quietly, and with a nervous heart, he pressed enter to confirm!
In the first second, a large amount of data flashed across the computer screen and kept refreshing the screen.
In the second second, a large amount of data was still flooding the screen. Cold sweat broke out on Shi Lei's forehead. He prayed in his heart that ACCESS's server must be powerful!
In the third second, all data flows stopped, and two English words appeared at the bottom of the screen!
privilege.tion!
Privileges elevated!
Seeing these two words, even Shi Lei couldn't help but cheer!
Privilege escalation means that first-level privileges are upgraded to super privileges!
Capturing the supercomputer Yan was 99% successful!
As long as Shi Lei didn't suddenly become brain-dead, or take the wrong medicine, the supercomputer Yan would soon return to Shi Lei's arms!
After obtaining super privileges, the message interception program successfully blocked the duli protection chip from sending a current overload alarm and deleted this record.
Shi Lei first used a super-privileged user to clean up his operation traces in the system logs. Whether it was increasing the access to ACCESS, creating his own new account, and unlocking the power management program, all these operation records were
delete.
After deleting all traces, Shi Lei did not relax his vigilance. Instead, he began to use a super-privileged user to enter the system source code core, and then switched to system engineering mode to retrieve the system's permission system.
Having super authority in hand is indeed a very refreshing thing. The computing speed of super computer Yan finally allowed Shi Lei to regain a little bit of the feeling of the world's top hacker.
The system permission system is extracted by super-privileged users in engineering mode.
Shi Lei was very familiar with it. Just like modifying the server permission system of ACCESS, he modified the permission system of Super Computer Yan, completely hiding his super permission user so that Super Computer Yan's original super user could not discover it.
Then, open a system backdoor so that Shi Lei can enter and exit the supercomputer Yan freely. Even after ACCESS's computing tasks are completed, Shi Lei can enter and exit at any time.
After typing the code with a smile on his face, he established Super Computer Yan's new permission system and created multiple system backdoors. Shi Lei finally breathed a sigh of relief. At this point, Super Computer Yan was 99.9%
, belongs to Shi Lei!
The last 0.1% left is the system log in engineering mode.
This log is a special protection mechanism of a supercomputer and is also protected by du li hardware. Even if a super-privileged user is used, it cannot be modified!
However, that is only for ordinary people. Users with super privileges cannot delete the ri will in engineering mode. But Shi Lei now controls the supercomputer and is truly the world's top hacker!
Controlling the supercomputer Yan, Shi Lei directly used the supercomputer Yan to use the current overload protection routine again to trap the hardware that protected the engineering mode ri Zhi into self-protection from current overload, and then quickly deleted the records of his modification of the system permission system.
,At the same time, the hardware record that protects the engineering mode log is deleted.
When the last record was deleted by Shi Lei. He typed in the code and asked Super Computer Yan to list the permissioned user groups. His own super permission user was no longer displayed, and he could use Super Computer Yan's
Super administrative authority. This means that super computer Yan was successfully captured by Shi Lei!
In 2006, the ninth-ranked supercomputer in the world, the pride of Wosang Country, and the pride of Tokyo Institute of Technology, was successfully acquired by Shi Lei!
Thanks to Wosang Country and Tokyo Institute of Technology for helping Shi Lei take care of the supercomputer Yan, so that Shi Lei can use the ninth-ranked supercomputer in the world without paying a penny!
After capturing Super Computer Yan, Shi Lei cleared Super Computer Yan and the internal application records of ACCESS Company one by one. Then he returned to ACCESS Company and also cleared the internal records of their servers. However, Shi Lei did not put them away.
Through the server group of ACCESS.
After all, this is a server group that is comparable to a small supercomputer, so how could it be given up?
How can you eat something in your mouth and then spit it out?
After cutting off the network link with Wosang Country, Shi Lei returned to Server 1. He clicked on the music player with a smile on his face. From the speaker, pleasant music came out again. Again, Hua'er said it was a person
wait.'
"There is no choice but the flowers fall away, and the familiar swallows return..."