The Strongest Hacker

Chapter 121 Level 1 Broiler (Part 2)

Chapter 121 First Class Broiler Chicken (2)

Zhang Yang directly entered an IP address, which is not an IP in the United States.

The NMD missile defense system consists of an unknown number of satellites in the sky, which is the same as the domestic Beidou satellite defense system, but only the US authorities know how many of these satellites there are. All the satellites of the NMD missile defense system belong to the U.S. Department of Defense. It is managed by a special department, but the specific department is the top state secret of the United States, and it is naturally impossible for Zhang Yang to know.

As famous as the NMD missile system is TMD. Speaking of it, these two abbreviations are really funny. When Zhang Yang knew these two abbreviations for the first time in his previous life, he laughed for a long time, but speaking of them, these two abbreviations even According to the Chinese translation, it complements each other!

NMD is the national missile defense system. When it is used, it is obvious that the enemy can attack the mainland of the United States, so it is called Nima.

And TMD is a theater missile defense system. The so-called theater defense system refers to strategic ballistic missiles that cannot attack the United States, but can attack overseas bases of the United States, other fleets, or allies of the United States. Missiles are defended on other people's sites, so they are called fuck.

With the rapid development of science and technology, satellites in space are not 100% safe. There are many missiles that can directly attack satellites in space. If World War III breaks out, a space war is very likely. At that time, everyone will play with their eyes open and blind. In modern warfare, satellites are equivalent to the eyes of the army.

However, all countries have an unwritten rule that even if there is a war, civilian satellites cannot be attacked first when attacking. Although civilian satellites can be deployed for military use in a state of war, they are not compatible with the military system. In the past, the effect produced is not as great as that of real military satellites.

So just in case, these thirteen satellites were secretly allocated under the name of NASA, but they are hidden and will only be activated during special periods, and they are usually in a semi-closed state. Minimize consumption, and because the United States already has enough satellites around the world, the U.S. military will not use these 13 military satellites even if there are missions in normal times.

Zhang Yang also accidentally discovered this secret during the process of "playing" in his previous life. Later, Zhang Yang secretly invaded these 13 satellites, because they are usually in a semi-closed state, although they are also connected to the satellite control system of NASA, And in the network, but for the sake of confidentiality, there are only a few people in charge, so the possibility of them being discovered is greatly reduced. Of course, the possibility of being discovered after Zhang Yang's invasion is also greatly reduced.

And these thirteen satellites were built and launched according to the standards of military satellites, and their calculation speed has been greatly accelerated. Military satellites not only need reconnaissance, but also are responsible for missile guidance, target analysis, and hundreds of millions of photos. Analysis and so on, only after preliminary analysis and then determining the target, these satellites will transmit the target to the satellite base station, and then the server on the ground will make the final confirmation until the task is completed.

Basically, most of the huge analysis tasks must be handed over to the satellites, so the systems of these satellites are very powerful, and more importantly, they have an advantage. These 13 satellites are equivalent to idle! Without any tasks, its performance is simply placed there! As long as Zhang Yang uses it carefully, this thing is basically thirteen free super servers! And it was the U.S. government who paid the bill.

Even more awesome is that,

The satellite will never be artificially disconnected or powered off like other servers. Even if it is half-closed, it will be half-open for operation.

The loophole that Zhang Yang knows is not a loophole of NASA, it should be said to be a loophole of the US military system. The US military system is jointly developed by Microsoft and several companies, and its source code is also independent. Don't question Microsoft's research and development capabilities just because Windows on the market is a bug sieve. It is no exaggeration to say that the system developed by Microsoft for the US military has absolutely pitifully few bugs, and it is even better than Linux.

In all levels of network systems in the United States, there is a hidden interface. This interface is unified in order to facilitate the instant integration of military systems and civilian systems in emergencies, so it exists in almost any level of network in the United States.

This interface is usually closed, even if you know there is no place to use it, but there is one difference, and that is the satellite base station! The satellite base station is the place on the ground that receives satellite information. Invasion is not a panacea. For example, if Zhang Yang directly invades the US space agency to take control of the thirteen satellites, he can succeed, but it will not take long. Zhang Yang will be exposed!

Because even if you hack, you will first apply for access. When you hack into the system of the space agency, and then secretly send an application to any of these satellites, when you want control, the processor inside the satellite will automatically scan all access information immediately. , and then send a verification command, and then judge the priority through the terminal address!

At the same time, a set of independent systems inside it began to record this process. Although Zhang Yang can delete this process record by hacking into the system, when it sends the process judgment, the ground command center will receive it immediately, because this The process was triggered later. When the application control was not sent, the process was closed, so Zhang Yang had no way to stop it.

Once the ground command center receives this judgment, those security personnel will immediately be alarmed that someone is interfering with the control of the satellite. After verifying the judgment, it can be easily concluded that it comes from outside the military system. will be fully exposed.

But Zhang Yang hacked the satellite base station first, which is different. Although Zhang Yang has no way to terminate the above process, he can bypass it. This satellite base station is just one of the many satellite base stations under the US military. There will be a general interface for the military in every level network system.

In the setting of the thirteen satellites, because they are usually afraid of being discovered by the people of the space agency, there is a hidden program inside it, that is, the military system can individually connect to it, and when applying for control When it is authorized, it will still scan, but because the military system is in front, it will automatically judge that the military system is the priority ground command center, and that judgment will also be sent to Zhang Yang.

At that time, Zhang Yang can directly clear the traces and control these satellites.

***************

Ask for tickets, ask for favorites, ask for recommendations! ! !

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like