Revisiting Future Path

Chapter 15: Cyanobacteria

017 Hacker Jianghu

Start the reserved computer of the Internet cafe, Wei Dongsheng first input a string of high-strength passwords, aim at the microphone to recognize the voice characteristics, aim at the camera to recognize the facial and pupil characteristics, and smoothly activate the cyanobacteria lurking in the Internet cafe's subsystem.

Cyanobacteria is a computer intelligent life rooted in integrated circuit components, and contemporary hackers cannot escape from its five-finger mountain. However, the pursuit of network security offensive and defensive technology is not only to reject the enemy, but it is also an important part to counter the intruder to obtain the opponent's accurate IP address.

In order to confuse the intruder, the cyanobacteria encountered a hacker intrusion, first disguised as a home computer and directed it to the decoy computer Wei Dongsheng prepared for him. In the bait computer, there are stored many mainstream plug-ins, many unclear source programs, and many video files that seem to involve secrets. The bandwidth of the decoy computer is relatively low, and hackers will spend a lot of time whether they browse online or try to download. Wei Dongsheng found the exact IP address of the other party. If he has the power to mobilize local police or other forces, he can use the time difference to arrest the criminal on the spot.

Unfortunately, this hacker was very alert.

Cyanobacteria records show that he started the invasion at 12:10:11, flipped through the scattered source code files of the bait computer, and quickly exited at 12:13:46. The hacker stayed on the decoy computer for only three minutes and thirty-five seconds, and then frantically cleaned up the traces of the broiler springboard. Obviously, he was keenly aware that the decoy computer was a trap.

However, the technological gap is the technological gap.

The hacker tried to invade the Internet cafe at 12:10:11, and Cyanobacteria reversed the invasion at 12:10:15, leaving his real IP address in the record: somewhere in Harbin, Heilongjiang Province. Cyanobacteria are developing, and the current network security function modules are limited. It is not possible to quickly analyze the real identity of the hacker. It is only possible to know that he is online in a certain place in Harbin, Heilongjiang Province, but it is impossible to determine whether he is a local household or a guest.

Wei Dongsheng was analyzing the hacker from Harbin, and the red font suddenly warned that a new intruder had been discovered. Cyanobacteria automatically reversed the invasion, showing the real IP address of the new hacker: somewhere in Suzhou City, Jiangsu Province.

Wei Dongsheng is about to investigate hackers in Suzhou City, and the blue algae warns of the discovery of a new intruder: from a place in Chengdu, Sichuan Province.

Okay!

The decoy computer has become a busy city.

The hacker from Suzhou city and the hacker from Chengdu soon discovered each other, and the two started fighting. When the fight is getting fierce, the blue-green algae red font warns that another Yanjing hacker is coming. The Yanjing hacker is more powerful. He kicked the hackers in Suzhou and Chengdu like a dragon, and read the bait computers in an orderly manner. However, just like the Harbin hackers, the Yanjing hackers quickly discovered that the decoy computer was wrong. He only stayed for two minutes and 27 seconds, including the time he kicked off the Suzhou hackers and the Chengdu hackers, and then began to frantically wipe the traces of the broiler springboard. Fleeing embarrassed.

After you sing it, I will appear on the stage. After the Yanjing hackers, three more waves came one after another.

Wei Dongsheng faintly understood that these hackers did not rush together by chance, but consciously used social engineering. Generally speaking, if you need to eat lunch at noon and take a lunch break, the probability of staying in front of the computer is relatively low. For ordinary netizens, it is difficult to detect hackers in front of the computer. But the tricks between masters, attacking unguarded computers and attacking guarded computers, are definitely two concepts and two difficulties. These hackers overestimated Wei Dongsheng's combat effectiveness and consciously chose this time point collectively at noon.

The question is, why?

Why do game studios recruit so many hackers?

It’s a pity that cyanobacteria have been around for too short a time. Wei Dongsheng mainly guided it to load voice feature recognition, face recognition, pupil recognition and other encryption function modules last night and this morning. In terms of network security, only a few simple function modules such as permission control and IP tracking were loaded. It is difficult to fight back against those cunning and smart hackers. Like the Harbin hackers and the Yanjing hackers, they noticed that the decoy computer was inappropriate within two or three minutes and immediately erased all traces of the broiler springboard. It is difficult for Wei Dongsheng to use his own network security attack and defense technology to fight against them.

Wei Dongsheng was depressed, and Cyanobacteria suddenly warned that another hacker from Shenhai had come and tried to download all sensitive content stored on the decoy computer.

Wei Dongsheng was stunned: Ah, he was very stunned, he started downloading as soon as he walked in, and the target was all sensitive content.

However, Wei Dongsheng glanced at the detailed address of the Shenhai hacker and suddenly felt familiar: "Huh?"

Wei Dongsheng once again confirmed the detailed address of the Shenhai hacker, and couldn't help but complain: "I'm going, this is the master!"

The real IP address of the Shenhai hacker is surprisingly the headquarters of the legendary operator Shanda Networks. Obviously, Wei Dongsheng became famous for some reason, alarming a group of hackers, and also alarming Zhengzhu Shanda.

Wei Dongsheng has never dared to underestimate the network security energy of large Internet companies. You must know that the elites of hackers will go ashore to wash their lives for their ideals. The security departments of various Internet companies are often their best destinations.

Tracing back to the history of hackers in China, the Green Corps, established in 1997, is a key word that cannot be bypassed. It is known as the Whampoa Military Academy for hackers in China. In July 2000, the Green Corps split due to internal differences, and its personnel were scattered everywhere. In April 2002, the Internet Society of China announced that it would stop organized attacks, denying the so-called Red League gathered in the patriotic banner, and hackers have since become hackers. The vast majority of hackers are unwilling to dormant in the dark, and have come out to find new sources of trust.

Whether it is a hacker or a white guest, the technology is real.

After this group of top hackers landed, they were immediately invited by Internet companies.

For example, Tencent, the former big brother of an Internet company, is the leader of his Xuanwu Security Laboratory, Yu Yang, who was a medical student and nicknamed the "gynecological master" by netizens. Yu Yangyuan worked for NSFOCUS, and the predecessor of NSFOCUS was the famous Green Corps.

Another example is that Netease News quoted the five great hacker masters propagated by the Eastern Evil, Western Poison, Southern Emperor, Northern Beggar, and even the most controversial and even mocked Wan Tao as "ping him to death." Entertain yourself. After Wu Jue, there are two other sons Chen Sanyan who are particularly famous, one is Chen Sanyan, and the other is Chen Danian.

Chen Danian is the younger brother of Chen Tianqiao.

Chen Tianqiao is the head of Shanda Networks.

Wei Dongsheng will never underestimate the network security technology of Shanda Networks.

Wei Dongsheng has limited achievements in his previous life. Although Xiaofu Xiaogui has his own career, he has no channels to contact Chen Tianqiao and Chen Danian. Having never communicated in-depth, or infiltrated their circles, Wei Dongsheng naturally did not know their details. Wei Dongsheng was unable to determine whether Shanda Networks was coming, whether he wanted to recruit Wei Dongsheng with good intentions, or he planned to kill the game studio from the source with malicious intentions?

The art of war is clear, and expect the enemy to be wide.

Regardless of the purpose of Shanda, Wei Dongsheng decided to raise his own value first and increase the decision-making cost of the other party.

Technicians want to increase their value, but to show their technical level in confrontation, so that Shanda Network understands that Wei Dongsheng is not an ordinary plug-in producer, but the top hacker at the top of the food chain. Wei Dongsheng's own network security offensive and defensive technology cannot do this, but he has a black technology that transcends the times-computer intelligent life cyanobacteria.

Wei Dongsheng ordered the cyanobacteria to invade the opponent's system, quietly gaining the highest authority. The opponent uses a laptop and installs a Linux system. It is slightly different from the Windows system. The txt notepad familiar to Windows system users corresponds to vi in ​​the Linux system; office_word familiar to Windows system users corresponds to vim in the Linux system. Wei Dongsheng prefers vim. He simply declares his arrival and enters a few lines of big words: "The studio is in urgent need of money. I implore your company to uphold the morale of emergency rescue and release the guillotine slowly. Before, now, and in the future, I will strictly control the quantity of equipment released. Do your best not to affect the normal operations of your company."

Wei Dongsheng was unwilling to negotiate with the other party or even leave a handle, unilaterally claiming sovereignty, and immediately retreated to his home after saying a word, kicking the other party out of the bait computer. In order to express his refusal to communicate more thoroughly, Wei Dongsheng ordered Cyanobacteria to block all the IP addresses of Shenhai addresses and not even allow them to enter the decoy computer.

The confrontation between Wei Dongsheng and the hackers from Shenhai Shengda Internet headquarters lasted only forty-seven seconds. At 12:47:18, the opponent began to invade; at 12:47:34, Wei Dongsheng decided to show the level of network security technology; at 12:47:38, Wei Dongsheng invaded the opponent’s Linux system; at 12:48:5, Wei Dongsheng took the opponent Kick out the decoy computer.

It started forty-seven seconds ago and ended after forty-seven seconds.

After deducting the time to start the vim editor and the code word, Wei Dongsheng countered the intrusion to Shanda Networks headquarters almost instantly. Shanda Networks should be able to clearly understand Wei Dongsheng's strength. If Shanda insists on tearing up its face, or banning all accounts for game work, or using its influence to block game studios or hunt Wei Dongsheng in reality, and never die with Wei Dongsheng from then on, it will definitely do more harm than good.

For more than ten minutes thereafter, no new hackers visited. Wei Dongsheng speculated that there should be two reasons. The first is that the noon break is about to end, which has lost the advantage of social engineering; the second is the failure of Harbin hackers and Yanjing hackers, which dispelled the tentative idea of ​​secondary hackers.

However, Wei Dongsheng was about to leave the computer, and Cyanobacteria unexpectedly warned that a new hacker would visit.

Wei Dongsheng sat back on the computer and directly invaded in the reverse direction. He was surprised to find that the other party's computer turned on the camera unconsciously. The laptop's built-in camera, the company's departments suspected of keeping secrets will be specially banned by stickers, let alone the hackers wandering in the black rivers and lakes? But how confident is this new hacker who uses a desktop compatible computer without turning off the camera?

If you like to re-take the road of the future, please collect it: (wuxiaspot.com) Re-take the road of the future. The literature is updated the fastest.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like