The Strongest Hacker

Chapter 175 Sleepy Pillow (Part 2)

Chapter 175 Sleepy Pillow (Part 2)

Zhang Yang did not go to the nubi forum. Although the information in nubi may be relatively complete, there are a lot of such news in nubi. Even if someone posts some posts, I am afraid it will not be too detailed. However, some hacker forums in China are different. Yes, although these hacker forums may be relatively backward in terms of learning materials, but on this kind of news, there are naturally people who have been flooding the forums for a long time to release the latest news. ;

Zhang Yang didn't go to other places either. With the black alliance forum becoming regular, there should be a lot of news like this. After logging in to the Black League Forum, he searched in the latest posts, and Zhang Yang quickly found his goal. The title of the post is: A Perfect Analysis of the Japanese Hacking Incident Chapter 175 Sleepy Pillow (Part 2).

After clicking on this post and looking at it, Zhang Yang felt dumbfounded. This post is very detailed, so detailed that it is a bit long-winded, but the main thing is not clearly stated. Generally speaking, it is a pile of nonsense . Feeling depressed, Zhang Yang searched for a few more posts with similar topics, and then found the one with the most comments and replies, and clicked in.

The introduction of this post is more detailed, and it tells the story of everything, especially the things that Zhang Yang wants to know the most. When he saw the last part, Zhang Yang's face was very strange, he didn't know how to describe it.

Is there really a situation where someone will give you a pillow when you doze off? Well, although Zhang Yang is not very satisfied with the outcome of this incident, at least according to the analysis in these posts, the "invincible" image established by gd in the hacker wars has been shattered a lot.

When that gd retreated, he was tracked by several masters. There must have been other hackers staring at that server at that time, and most of them were domestic hackers, so it is not uncommon for some people to watch the fun, but these tracking masters have been tracking to a level one Chapter 175 The gd got rid of the sleepy pillow (Part 2). It was so difficult, at least in the eyes of these rookie hackers. play spike

That's called a master. Whether it's getting rid of the enemy or invading the server, it should be killed in seconds. Although Zhang Yang and other experts think that this hacker can get rid of the tracking of seven or eight masters in such a short time, this master hacker pretending to be gd The strength is already very good, even if it may be a little worse than Zhang Yang, but the difference is that Zhang Yang has a technology that is several years ahead of the world, not the strength between the two of them.

Of course, these rookies don't care about it like this, so although the person who posted this post explained the process of the matter, he still expressed a little "disappointment" with gd. Zhang Yang's mood was a bit weird, he had just finished posing as GD not long ago, and now someone was posing as him, although Zhang Yang believed that if it was him at the time, the situation would have been better than that of this master.

But these are not the most important,

The most important thing is that this master pretends to be very beneficial to Zhang Yang's current situation. If Bai Su is an agent of the national security, then Zhang Yang is not in the dormitory at noon today, but eating outside. This is the biggest problem. Witness

Of course, it would be even more perfect if that master could compare Niu Cha's retreat and deal with these trackers. Zhang Yang thought of it flirtatiously. Of course the depressed GD didn't know, not only did he not make GD depressed, but he unintentionally helped GD the most.

When doing this, GD didn't tell anyone. In the end, he almost lost money by stealing chickens and lost himself. In his eyes, this was the biggest loss, so after recovering, GD made a decision, he would never tell anyone about this, otherwise, it would be too embarrassing.

Of course Zhang Yang didn't know GD's depression, he was almost happy right now, this is that baby, so honest, could it be because God also regarded himself as the protagonist after he was reborn, so that he wouldn't make himself too ugly ? That's why it came out like this?

After knowing the truth of the matter, Zhang Yang ignored ing and Gao Gang, and directly took QQ offline, Zhang Yang thought about it, and quickly opened the No. 1 satellite. Although he guessed that Bai Su should be an agent of the Internet Surveillance Bureau, Zhang Yang had no evidence to directly prove that some plans could not be implemented.

Zhang Yang did not directly call attention to Guoan's server. In fact, Guoan's network utilization rate is not high, at least to the outside world, but Zhang Yang has no way to determine how much of its internal things are through the network. It is different in China. In the United States, large-scale network applications are spread across almost all military systems in the entire country.

One of the reasons why the U.S. military has such a strong combat capability is that the joint command and control capabilities of various arms in the joint command combat system surpass that of any country in the world. This is an unavoidable domestic disadvantage. In modern warfare, the joint command combat capability is very important and prominent , the cooperation of various arms is the kingly way.

That's why the U.S. military system has a common interface. Even the intelligence departments of countries such as the CIA, FBI, and NA have relatively independent intelligence network systems, but they can quickly access the military system at critical moments and complete a complete deploy and provide intelligence support to all levels of force operating overseas

But the country is far behind in this aspect. There are good and bad. The advantage is that in today's relatively peaceful international environment, there is no unified system, and the speed of information transmission is not slow. Go, but the price for the enemy to obtain intelligence is much higher.

Especially in terms of network security, the pressure on national security is much greater. After all, his internal intelligence system is not unified. Even if hackers invade an intelligence system, it is impossible to obtain all the information. This is one of the few benefits. At least there is nothing Zhang Yang can do. The domestic public opinion monitoring is actually quite powerful. Unlike the United States, all ministries are responsible to the public, so many of his intelligence department systems are almost public.

And some domestic intelligence systems are not open to the public at all. If you want to invade these systems, you must at least find them, right? This search process is more troublesome.

Therefore, Zhang Yang is not going to hack into the Guoan system. Even if he hacks into the network system of the Guoan branch in City H, he may not be able to find his information. Zhang Yang hacked into the public security system of City H secretly.

Guoan belongs to the police system, but it does not mean that the origins of the members of Guoan are also affiliated to the police system. In fact, the police academy cannot train the talents needed by Guoan, so most of the talents in Guoan are transferred from the army, then enter the police system, and finally assigned to Under the name of Guoan, even so, a considerable number of people still retain military positions in some departments within Guoan.

Compared with the national security system, the police system has a more comprehensive and unified network. It is not difficult to enter the public security system in City H. What is difficult is to obtain a high-level account in the public security system. He must also obtain a highly authorized account from the system, so that he can find the information he wants in the public security system.

In fact, this is two different concepts from the administrator account mentioned in the usual intrusion. Since the intrusion is successful, it means that Zhang Yang has the administrator account of the system, but this system is just the operating system of the server and does not represent the entire public security. system, which are two completely different things.

The most vivid analogy is that the system administrator account obtained by Zhang Yang's intrusion is just to log in to your computer, but he wants to steal your QQ, it is not enough to know your computer system administrator account. You also need to get your QQ number and crack your QQ password.

This is probably the case. The public security system is also divided into two. One is a large-scale wide area network similar to a local area network. All public security agencies in the country are in this network, and the other is a data network in this wide area network. Database, the host of this system is in the data center of the Ministry of Public Security, and the local public security organs need an account number and password to access this database.

Unless Zhang Yang invaded the server of the Ministry of State Security, he still needed to crack the account. Relatively speaking, cracking the account was much easier than hacking the main server of the Ministry of Public Security. That server contains the confidential information of the Ministry of Public Security, and there are various security mechanisms in it. It is not impossible for Zhang Yang to intrude, but he has to consider the consequences of the intrusion. More importantly, he wants to find information in it. It is necessary to invade quietly and leave quietly, which takes a lot of time.

No matter which country it is, the defense level of the server storing important intelligence data is extremely strict. In the public security system, Zhang Yang easily found the computer of the director of the Public Security Bureau of City H. In fact, it was not difficult to find this in the internal network.

It took less than 20 minutes for Zhang Yang to use the infected bug to easily invade the computer of the director of the Public Security Bureau. In 2004, the popularity of the Internet was not particularly fast. People in the first category are probably over 40 years old. City H is a municipality directly under the Central Government, and in City H, the director of the Public Security Bureau must be one of the standing committee members of the municipal party committee, that is, officials at the provincial and ministerial level. People of this age must be at least 40 years old. Over the age of one, how many people of this age do you expect to be proficient in computers and the Internet?

This provides a big enough loophole. You must know that the director of the municipal public security bureau definitely has very high authority in the public security system, and these officials themselves may not understand network security. If they can complete basic computer operations, they are already The result of studying hard.

In the system log, Zhang Yang easily found a log-in information. The security of the director’s personal computer is the responsibility of the Internet Surveillance Detachment of the Public Security Bureau. There must be a lot of important information in the personal computer of an official of this level, so the system has backup.

After retrieving the login information file, Zhang Yang found what he needed with almost no effort. With this login account and password, the rest is simple, directly using the director's computer as a springboard, Zhang Yang quickly logged into the public security database, and then directly used the advanced authority of this account to search. Ah! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like