June 4th, after midnight; South Vietnam, the National Security Agency, internal network.
Shi Lei used the method of "surrounding Wei and saving Zhao" to attack the internal network of the National Security Administration of South Vietnam, attracting all the power of the network security of South Vietnam, which was originally attacking the origin of the Dream Entertainment main server supercomputer.
Originally, the main server of Dream Entertainment, the origin of supercomputer, has suffered a computing resource attack of about 500tflops. This level of attack has put iwn secret network under great pressure.
Fortunately, such a huge number of attacks are also provided by distributed computing resources. Otherwise, the iwn secret network will not be able to stop it!
Shi Lei used his own strength to hack the official website of the South Vietnam National Security Bureau and put on a stance to tentatively attack the internal network of the National Security Bureau.
After the cybersecurity personnel from Nanyue returned, Shi Lei still had no intention of giving up. Even if many cybersecurity experts from Nanyue returned, Shi Lei was not afraid at all.
The cybersecurity experts from South Vietnam have indeed returned to the country and invested in protecting the internal network of the National Security Agency. In this way, the defense of the internal network of the National Security Agency has been greatly improved, and Shi Lei has to face more security defense forces.
It seems that it is more difficult for Shi Lei to invade the internal network of the National Security Administration.
In fact, this situation of one's rise and fall also exists for Shi Lei. From Shi Lei's perspective, the network security expert of Nanyue has returned to the internal network of the National Security Administration, and the origin of the main server supercomputer of Dream Entertainment.
The pressure was relieved, and the computing resources of the iwn secret network were idle. Shi Lei could call the computing resources of the iwn secret network to attack the internal network of the National Security Administration of the South Vietnamese Kingdom.
Overall, Dream Entertainment and the Nanyue Cybersecurity Expert are basically at the same starting point, but Shi Lei rescued the origin of supercomputers!
Jingyayuan.
Shi Lei put his hands on the keyboard and quickly typed lines of source code. Shi Lei is analyzing the vulnerabilities in the internal network of the National Security Bureau of South Vietnam. Yi Zuer currently controls the security of the entire Mirui technology system. The iwn secret network operates at high speed and cannot be temporarily
Provide more help to Shi Lei. Yi Zuer needs to adjust for a while before he can integrate the resources of iwn secret network.
Yi Zuer's performance is limited by hardware performance. The origin of supercomputer is only a calculation speed of 10 tflops. If the latest "gift" of Amd Company, a supercomputer with a design theoretical calculation speed of 320 tflops is completed, the assembly of the supercomputer with a calculation speed of 320 tflops is completed.
If you are controlled by Yi Zuer, Shi Lei doesn't have to worry about the main server being attacked by the South Vietnamese Kingdom!
It's just a pity. The supercomputer with a design theoretical calculation speed of 320 tflops is temporarily unable to be put into service. According to Amd Company's estimate, this supercomputer will take as soon as June 20 to complete.
The assembly location chosen by Shi Lei was placed in Liberty, and it was placed in the headquarters of Amd Company. The 300tflops calculation speed seems to be a lot at present. However, Shi Lei knew the future development, and this calculation speed was nothing in the future.
The territory of the Liberty does not matter.
Furthermore, Shi Lei attempted to express an attitude to the senior management of Xia Guo in this way, that is, if Xia Guo has any injustice to Dream Entertainment and Mirui Technology, Mirui Technology will not hang itself on this tree in Xia Guo.
!
"Yi Zuer, how is the occupation of iwn secret network?" Shi Lei asked Yi Zuer about iwn secret network while typing the source code information.
Yi Zuer quickly answered Shi Lei, "Sir, iwn secret network has been integrated and has idle computing resources. There are a total of 980 tflops, and the system can be called at any time."
Shi Lei showed a cold sneer, "Yuzun, prepare all idle computing resources on iwn secret network to upgrade the security level of the endless defense system to the highest. We want to have fun with the National Security Bureau of the South Vietnamese!"
"yes, sir!" Yi Zuer responded to Shi Lei.
Shi Lei held up the coffee cup on the computer desk with his right hand, took a big sip, and then said to himself: "Nanyue Kingdom, I don't believe that you have no secrets!"
The National Security Agency of South Vietnam, as a country's intelligence agency, Shi Lei is sure that there must be some confidential information in their internal network. Shi Lei wants to use the power of the iwn secret network to let Yi Zuer cooperate with him to break through the national security of South Vietnam together.
The bureau's internal network defense, so as to find the required information content.
At present, the cybersecurity experts of the South Vietnamese country are fully protecting the South Vietnam National Security Agency. It is more or less difficult for Shi Lei to break through the defense.
"Yi Zuer, gather the computing resources of the iwn secret network to send deception information to the South Vietnam National Security Bureau." Shi Lei ordered Yi Zuer. The so-called deception information is that the iwn secret network pretends to be a normal random network scan and test, although
This is also a kind of malicious query, but most defense systems will not pay attention to random network scanning tests.
According to Shi Lei's order, Yi Zuer began to send random network scanning tests to the internal network of the South Vietnam National Security Agency. As Shi Lei predicted, the internal network defense system of the South Vietnam National Security Agency did not scan the random network at all, and did nothing.
Response.
"Very good!" Shi Lei saw Yi Zuer's test feedback, and immediately controlled the computing resources of the iwn secret network and conducted large-scale tentative scanning of the internal network of the South Vietnam National Security Bureau.
As Shi Lei's scanning progressed, the internal network of the South Vietnam National Security Agency became slower. Its defense system began to automatically retrieve the reasons for the slow system.
The security experts of the South Vietnamese country who retreated from Xia State carefully discovered that the random network scanning was abnormal. Under normal circumstances, the frequency of random network scanning was very low. After all, the entire Internet is so large, where is the internal network of the South Vietnam National Security Bureau?
May be scanned frequently?
The cybersecurity experts in South Vietnam began to investigate the abnormal random network scanning frequency. They quickly determined that the internal network of the National Security Agency of South Vietnam was being invaded. Therefore, the cybersecurity experts in South Vietnam took it seriously.
Waiting for Shi Lei to invade.
"Sir.Random network scanning has been discovered by the other party." Yi Zuer prompted Shi Lei.
Shi Lei's ten fingers entered the last line of source code on the keyboard, then pressed the enter key, handed over the source code he had just written to Yi Zuer for verification. Yi Zuer quickly completed the verification and gave Shi Lei feedback information
.
"Sir, the source code has been verified. Will the source code be executed?" Yi Zuer asked Shi Lei's final order.
Shi Lei nodded with a smile, "Execute the source code!"
Regarding worm virus, the second generation hacker organization of South Vietnam. The leader of Annan Star Big Pineapple is a world-class expert, but Shi Lei is not bad either! Shi Lei has also had a profound research on worm viruses, and may not have reached the peak of the world.
The level is absolutely not bad.
Big pineapple can create a worm virus to deal with Xia Guo’s Internet network. Shi Lei can naturally also create worm viruses. The worm virus created by Shi Lei is no less than the diablo made by Big pineapple.
The only thing worth pity is that the South Vietnamese country does not have a company like a big penguin. If you want to quickly expand the worm virus, Shi Lei cannot learn from the big pineapple's solution.
Fortunately, the worm virus produced by Shi Lei is not prepared to expand on a large scale, but is only targeted at the South Vietnam National Security Agency. The worm virus is not only highly contagious, but also highly penetrating.
The worm virus named "Stinger" by Shi Lei has very high penetration. Shi Lei spent a lot of time specifically creating "Stinger" to facilitate penetration of high-defense internal networks. And destroys the
Information about the internal network.
'Worms are not my strength, but they are definitely not my weakness!' Shi Lei looked at the screen of Server 1, and Yi Zuer was injecting source code into the internal network of the South Vietnam National Security Agency.
The stinger eroded the internal network of the South Vietnam National Security Agency, but it was not successful yet. The opponent's internal network defense was too high. Shi Lei created conditions for the stinger. He tore open the internal network defense of the South Vietnam National Security Agency.
Although it is just a small gap, it is enough to allow the stinger to enter.
The Stinger did not disappoint and entered the internal network of the South Vietnam National Security Agency!
South Vietnam, National Security Agency. Location, confidential.
In a mysterious underground base, cybersecurity experts from the South Vietnamese country were dealing with Shi Lei's attack. One of them was a middle-aged bald man with glasses, and his bare forehead was covered in cold sweat.
The middle-aged bald glasses are named Chen Guang. He is the chief technician of the National Security Agency of South Vietnam and one of the few first-generation hackers in South Vietnam. He has only become a security expert.
Chen Guang is 47 years old this year, and his baldness is just because he is too tired and has aging before he grows old!
At this moment, Chen Guangzheng looked at the computer screen nervously, and a shout came from beside him: "Mr. Chen, the pressure we are under continues to increase, and it has reached a computing attack of 300tflops."
As the chief technician of the National Security Agency of South Vietnam, Chen Guang was not married yet because he was 47 years old. Therefore, he was nicknamed General Manager Chen by his colleagues of the National Security Agency, meaning the eunuch general manager of the palace.
Chen Guang was not angry about this kind of joke. Chen Guang's temper is famous for being good, but he is not favored by women. Perhaps it is because Chen Guang put too much experience on hacker attack and defense knowledge, so that Chen Guang could not help.
Ignore other things. It is precisely for this reason that Chen Guang's technology has reached world-class level!
"Mr. Chen, the opponent's defense is still improving. We are tracking the opponent's attack source, but we cannot find any IP address for the time being. The opponent's connection IP address has also been protected!"
The director of the National Security Agency of South Vietnam, named Ruan Kang, is also the first generation of hackers, but his technology is a little weaker and only at a quasi-first level. Ruan Kang is not as good as Chen Guang in hacking technology, but Ruan Kang is better than
One thing Chen Guang did better is that Ruan Kang was good at employed people.
Things you don’t know are definitely not difficult. As long as you can find someone you know and use this person well, you can solve the problem!
"Old Chen, is the current situation beneficial to us?" Ruan Kang asked quietly.
.(To be continued...)
ps:ps: Yesterday’s automatic update failed. Today I will add a few chapters yesterday. I will send them later to set aside a gap.