The Strongest Hacker

Chapter 325 Comparing Yourself with Yourself (Part 1)

Chapter 325 Comparing yourself to being coquettish with yourself (Part 1)

Chapter 325 Comparing yourself to being coquettish with yourself (Part 1)

The shot of gscsd was within everyone's expectations, but the position of the shot was beyond everyone's expectations. Moreover, the ferocity of the attack made the hackers watching gscsd's attack feel ashamed. Is this a battle made by one person? Are you sure this is not an organization?

The attack mode of the infector is different from that of ordinary hackers. It should be said that the infector is only making optimal choices to achieve the goal, and does not care about which method is more powerful. Because Zhang Yang gave it a part of the right to choose independently, the Infector immediately assigned all the targets to the four official website servers at the same time, and the first thing to use was the ddos ​​attack. After all, for humans, you have to direct the ddos ​​attack Numerous broilers, enter the command.

But for computers, especially now that the performance of infested bugs cannot be maximized, only this part of the performance is enough. While attacking a computer with ddos, the infected bug also directly threw a lot of virus bombs to several other official websites. The virus bombs contained all kinds of computer virus variants, including the infected bug A sub-virus derived from itself.

When the infecting worm attacks, its database records the responses of the other party's system and firewall at the same time, and then performs centralized calculations to analyze more effective and feasible methods. The infestation runs according to the program, but the hackers watching the battle are covered in cold sweat. If it weren't for the fact that these attacks all came from the same ip, these people would think that this is a strict organization, not a single person. .

Such a huge attack flow, although it is said that it is impossible to cause too much threat to the firewall, but in such a way, the technicians responsible for the maintenance of the official website server of the three major intelligence agencies immediately became a little flustered, and various messages popped up in front of the computer screen. command, once the operation is a little slower, maybe this command will cause the collapse of the entire system and firewall.

Naturally, it is impossible for the technicians of such an intelligence organization to be beaten passively, but the simultaneous attacks of the infecting bugs make the technicians of several major intelligence organizations temporarily unable to carry out anti-tracking, so they can only bear the attack of the infecting bugs. The Internet in the United States is in turmoil, while the Internet in China is also not calm.

Zhang Yang was also staring at the computer screen nervously at the moment, because all the resources of the Infestation Worm had been mobilized to attack, Zhang Yang naturally couldn't use the Infection Worm here, he could only be on guard. But at least with the brood in hand, almost all the opponent's attacks were blocked by Zhang Yang.

The faces of many hackers watching the battle at home and abroad were extremely strange. Everyone stared at their computer screens dumbfounded, and saw that the official website of the Ministry of Foreign Affairs was still guarded like gold under such a terrifying attack flow from the other party. Like an iron bucket.

Where did this l come from? ! Almost everyone's mind was filled with this thought in shock! too weird

In the past, a gscsd popped up all of a sudden, and now an l popped up. Could it be that the world's experts are so worthless? Let's see what these two people have done. One person alone has supported the three major U.S. intelligence organizations and a technician from the official website of the Ministry of Defense. Although the technicians in charge of these four official websites are not the real elites of the other party But it's like this, who in the world who can do this would dare to jump out?

No! Only gscsd! There are still a few people who are as strong as gscsd, but there are no people who are so blatant and aboveboard. The combined power of the three major intelligence agencies of the United States even makes many hackers shudder, but gscsd did just that!

The Chinese hackers who saw this scene were all excited and began to tremble. Since the gscsd master has already targeted the three major intelligence agencies, then we can't be soft, can we? The intelligence department is gone, but there are many websites of various government departments. These hackers immediately jumped on it excitedly like a pack of wolves.

However, this pervert in China is using his own strength to withstand the attack of a well-coordinated group of hackers, and his defense is solid. At least for now, it seems that the attacker has no way to hack the official website of the Ministry of Foreign Affairs even a single step! The hacker who was going to stay in the country to help was also dumbfounded and fascinated. When will he be able to look like the great god in front of him, just like the legendary Changshan Zhao Zilong, killing seven in and seven out of the enemy group!

You can even resist the enemy thousands of miles away, and turn the enemy's attack into invisible. This skill is too good. These hackers sat in front of the computer and their faces were flushed with excitement, but Zhang Yang's face was extremely serious, and he had no time to get excited. His scanner has been paying attention to the situation of the opponent's several data streams.

If these people are really ghost troops, then once they are unable to attack for a long time, they will definitely divide some of their forces to hack other government websites, and the honeypots deployed in several telecom network nodes have sent back messages, showing that there are many American hackers have similarly entered the country.

You don’t need to think about it to know that they are attracted by the infected bugs. The infected bugs attack there. American hackers have different ideas from those domestic hackers. Some domestic hackers will come to help defend, but American hackers don’t even think about it. , and ran to attack excitedly.

How boring is defense, how fun is it for everyone to play around? So these American hackers came here excitedly as soon as they discussed it. Anyway, we are also the boss, okay? Just like the United States regards itself as the boss in the world, American hackers also have a sense of superiority, and they all think that their technology is the best in the world, while China, in their eyes, is just a country that was still a computer blind spot a few years ago In their eyes, in a few years, even if China's computers develop further, where can they develop?

In fact, if it is just defending a website, Zhang Yang is not a big deal. After all, the self-defense function of the brood can already be an unreserved defense system. Even the infected bugs can't do anything to the brood. No matter how powerful these hackers are, they are at most at the same level as the infected bugs, and they still have nothing to do with the brood.

And what about the brood, if the brood is used for complete defense, it is actually very abnormal, even if it is a garbage system that does not fix a single loophole, after installing the brood, it is like you stripped a beautiful woman , but found that the beauty didn't wear anything else, but she was wearing a super awesome alloy pants underneath. You can look at it, touch it, and flirt with it, but you just can't do anything.

I don't know if it's because of the gscsd. After these American hackers came to China, they didn't attack those portals that hackers usually flock to. Instead, they targeted domestic government websites. But Zhang Yang is now mainly monitoring the traffic on the network.

Just now, the official websites of the Ministry of Public Security and the State Council resumed normal access, but these American hackers immediately targeted these two websites again. It was about to fall, so after Zhang Yang paused for a moment, without any hesitation, he directly used the loopholes in the systems of these two websites to directly hack into these two websites, and then copied two brood nests to enter these two websites server.

At the same time, the mother nest is turned on the centralized control mode. The so-called centralized control mode is actually like a colony of ants. The queen can control all the ants, and then each ant is a separate clone, showing a kind of collective intelligence. The centralized control mode of the brood is similar to this.

In fact, the functions of each clone of these brood nests are the same, but when Zhang Yang issues an order during centralized control, the sub-systems of these brood nests will receive it, and then exchange information with each other. For example, Zhang Yang issued an order to brood clone a An instruction to deny all illegal access requests. Then brood b and c will also receive this information, and will exchange information with brood a, once b and c find that they have the same illegal access request as brood a, brood b and c will Immediately and automatically execute the rejection, without Zhang Yang giving the order again.

These two websites were attacked, and the hackers who watched the battle outside naturally saw it, but before they could react, they discovered that some American hackers who had made progress were kicked out again, and these domestic hackers also tried to scan After a while, after scanning, they found that the two websites were exactly the same as the website of the Ministry of Foreign Affairs, one iron bucket, and even the way of rejection and defense was exactly the same.

Needless to say, the shot must be l. Before the domestic hackers started to be surprised, the group of mysterious American hackers also discovered this matter. In their view, since this mysterious l avatar went to invade the other two websites. Then the defense of the website of the Ministry of Foreign Affairs should not be so strict. The group of mysterious American hackers immediately returned to the website of the Ministry of Foreign Affairs and stepped up their invasion of the website of the Ministry of Foreign Affairs.

However, the result of the invasion surprised them a little. Did their invasion have any results, and the opponent's defense was still impeccable. Could it be that the opponent can still achieve such a terrifying defense when defending several websites at the same time? Although they know that the defense is definitely not operated by one person, they must have installed a new type of firewall.

But even if it is a firewall, some instructions need to be operated by humans, and it is impossible for a firewall to monitor all actions against the system. Then some of them must be distracted to control, but at this moment, the opponent has no problem defending the three websites?

After the group of mysterious hackers paused their attacks for a while, they immediately began to divide their forces. However, they did not go to hack the official websites of the Ministry of Public Security and the State Council, but began to hack several other departments, such as the National Development and Reform Commission and the Ministry of Education. Wait for the official website, that is to say, all government websites are the targets of their invasion.

Their reaction speed is fast, but Zhang Yang's reaction is not slow. The systems of the above servers use the same system. This system is modified by the Institute of Computer Science, Chinese Academy of Sciences. Because these systems are very unified, Zhang Yang can use the same system vulnerability when hacking into each system. .

But the firewalls of these systems are installed differently. Whether these are mysterious hackers or hackers from the United States, they still need to analyze the system before they can choose an attack method, but Zhang Yang doesn't use it. What Zhang Yang has to do is, when they attack a target, Zhang Yang will directly hack the target in advance, then copy his brood into it, and then directly add this brood to the centralized control mode, and then it will be ok.

Soon, the opponent's attack targets spread over more than 20 government websites, and even some soy sauce government websites were attacked, but it was still useless, and each website was still defended like an iron barrel. Right now, the entire network is completely insane. Who are these people?

Could it be that the Martians have invaded? Otherwise, the appearance of a gscsd is perverted enough, and a similarly perverted l appears all of a sudden? Many people's minds are a little dull, what is the situation? ! Black Hawk is one of the people who are not bright at the moment.

Black Hawk smiled wryly and looked at the several large screens in the hall of hundreds of square meters. This is the data center of the National Computer Emergency Response Center. All the personnel of Black Hawk and their entire sub-bureau were mobilized here because of the inexplicable outbreak of the China-U.S. Hack Wars.

It has been more than two hours since the emergence of the two sides to the current intense heat, but at this moment, the scene is really strange. On the American side, gscsd and many Chinese hackers are going crazy. The difference is that everyone's eyes are focused on On the battlefield of gscsd, after all, everyone knows that when the official websites of these three, which can be said to be the world's largest intelligence organizations, are breached by gscsd, it means that other websites of the US government are like the ones of *** Like the membrane, it will be broken by gscsd.

But in China... the situation in China is even more weird. The several documents in Black Hawk’s hands make Black Hawk dumbfounded. The situation in China is just the opposite of that in the United States. It came across a thick iron plate, and I couldn't poke it in no matter how hard I poked it.

To be honest, this l is perverted enough, and the Black Hawk has no good solution now, l is quite awesome, but the problem is, l is too awesome, so awesome that Guoan, who was transferred by the Black Hawk,** * Waiting for a state where all the Internet elites in several departments have nothing to do.

It is also true that there are so many government department website maintainers, staff, and technical personnel, which is not a small number, but at this moment, l has accepted all their work in the past, and they are now just like those spectators on the periphery Like hackers, they have become spectators who do not know the truth.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like