The Strongest Hacker

Chapter 350 You Are Just Soy Sauce (Part 1)

Chapter 350 You’re Just Soy Sauce (Part 1)

Chapter 350 You’re Just Soy Sauce (Part 1)

After thinking about it for a while, Zhang Yang made a decision. Sooner or later, he would run into someone from Anubis. There is no doubt about it. Simply avoiding is not a publicity character, you have to take the initiative to attack, besides, if you hide every day, you may not be able to avoid the opponent.

Since he couldn't find any news about Anubis, Zhang Yang didn't believe that intelligence agencies like the FBI didn't have any news about Anubis. Originally, Zhang Yang could go to the Black Hawk to ask, but Zhang Yang had a premonition that the Ministry of National Security had no information about Anubis. There may not be all news from the fbi.

If you want to get news from the fbi, there is only one option, to completely hack into the fbi's system, not just the other party's official website, this is not so easy to do. The location of the fbi's main server is confidential, and no one knows where it is, but there must be a network connection between the fbi's main server and the official website. The difference is that there must be a firewall between the two.

After a pause, Zhang Yang simply ignored this side, turned directly to the United States, came outside the official website of the fbi again, and scanned the server of the official website of the fbi secretly. Completely shut it down, it seems that there are indeed experts among the technicians of the fbi, and the other party is really ruthless enough to directly format the hard disk in depth.

The system was still the same system, but the opponent had already patched many of the flaws that Zhang Yang created when he invaded, and Zhang Yang also noticed that the version of the firewall seemed to have been updated. Obviously, when the infection bug appeared instead of Zhang Yang's gscsd ID, it caused quite a shock to the fbi and other intelligence agencies.

I scanned the official website of the other party. Although the firewall has been updated and the system has been patched a lot, it is useless to Zhang Yang. There is no way. Who will let Zhang Yang know some system loopholes that the other party does not know at all? Quietly sent a few fraudulent visits to test the bottom line of the server's visits. Just as Zhang Yang was about to start, he suddenly stopped what he was doing.

Turning on the scanner and re-scanning the progress of the fbi official website server, the corners of Zhang Yang's mouth couldn't help evoking a trace of loneliness, nnd, I didn't expect someone to have the same idea as me? Just now, Zhang Yang noticed that another deceptive visit was also sent to the server. Although Zhang Yang stopped his actions immediately, he couldn't guarantee whether he was discovered by the other party.

Because he didn't pay attention just now, he thought it was the security personnel of the server guarding the computer, but after scanning the scanner at this moment, Zhang Yang knew that this guy was also a hacker, and also aimed at invading the official website of the fbi, but he Zhang Yang didn't know what the purpose was.

hesitated,

There are colleagues here. If Zhang Yang also invades, it will be difficult to ensure that the technicians of the FBI and the hacker will not find out. After a pause, Zhang Yang immediately and decisively shifted his target, but he didn't put it here, but quickly wrote a trigger program for an active attack for the broiler he visited the fbi website.

Once Zhang Yang activates this program, the broiler will immediately launch a threatening attack, and the fbi official website server will soon call the police. After setting it up, Zhang Yang carefully cleared all the login logs and information that he had logged into the broiler, kept the trigger mechanism, and then turned to the official website of cia.

If there is a second hacker who sees Zhang Yang's actions, he will definitely not be able to help but call out! Wretched, quite wretched, you are a master, how could you do such a thing? Zhang Yang placed such a thing, obviously just in case, if he couldn't escape, he was going to lay a black hand behind his back.

Those gscsd fans on the Internet, if they know what the great god in their minds is doing, will the image of gscsd in their minds collapse? But Zhang Yang obviously doesn't have this psychological burden. Anyway, as long as he doesn't get targeted by the FBI, Zhang Yang doesn't care about the others. Who's going to let this guy be unlucky?

Because Zhang Yang was not sure if the hacker had discovered him, so while carefully scanning the cia official website, he was still paying attention to the situation here. When Zhang Yang found out that the hacker had sent a fraudulent access request again, At the same time, he started to crack the port, and when he was about to place the Trojan horse, Zhang Yang knew that this guy probably didn't find him, otherwise, he would never have invaded rashly.

Since he didn't find out, Zhang Yang stopped paying attention. Instead, after completing the early warning system, he devoted himself to the cia server. Cia's official website server has already been hacked by Zhang Yang, this time Zhang Yang is already familiar with the way, although it took a lot of effort, but it is no longer difficult for Zhang Yang.

"Then you play first, I'll go to bed first." Li Keqing had already come out of the shower, seeing Zhang Yang fiddling with the computer, she couldn't understand, so she immediately greeted Zhang Yang.

"Well, you go first, I'll go to bed in a while." Zhang Yang nodded and said. After watching Li Keqing enter the bedroom, Zhang Yang turned his attention to the official website in front of him. "Ding Dong" sounded a clear reminder, and Zhang Yang's face was pale. Yixi, bingo, it's done. As soon as the page on the computer screen was changed, Zhang Yang once again successfully entered the server of cia's official website. But this time Zhang Yang didn't do those boring things like modifying the homepage of the official website.

First, a thorough scan was performed on the inside of the system, and after figuring out the locations of some honeypots, Zhang Yang cautiously began to send a verification message requesting access to the cia login window of the internal system. Soon a bright red dialog box appeared on the screen, but the server did not refuse, but a prompt box appeared, asking to enter the account number and password.

Zhang Yang stopped his fingers and did not move. Instead, he switched to the operation panel of the infected bug and gave instructions. As the analysis progress bar on the infected bug's side progressed rapidly, Zhang Yang's fingers also tapped on the desktop rhythmically. up.

"Master! Play this game with me." Zhang Yang looked at the analysis results of the infected bug, and was a little speechless. Judging from the analysis of the login box by the infected bug, Zhang Yang already understood that the login box was a honeypot from beginning to end. In other words, no matter how you operate the login box, your information will be sent to the alarm system, which will soon arouse the alert of the other party's technicians.

Zhang Yang picked up the mouse, and quickly clicked a red cross in the upper right corner of the login box. After closing the login box, the page returned to normal. Zhang Yang sent out a visit application again, and soon another identical dialog box popped up. After this dialog box popped up, Zhang Yang turned his attention to the real-time scan of the infected bug.

very good, very powerful! This time it's a real login box! This system is perfect enough! While making a comment in his heart, Zhang Yang quickly searched the official website server to see if there was anything that could be used. CIA's internal system is different from the official website system.

The internal system is part of the U.S. military system. In other words, it has the same characteristics as the No. 1 and No. 2 satellites that Zhang Yang invaded. This login window has a separate alarm system. There are only two results if you want to hack. First, crack the US military system, and then hack into the server. possible.

The first is what Thanatos did in his previous life. He invaded the North American Aerospace Defense Command, that is, he cracked the US military system, and thus directly entered the North American Aerospace Defense Command, and Zhang Yang became his scapegoat. The difference is Yes, Zhang Yang doesn't know how long it took thanatos to crack the U.S. government's system. What he knows is that thanatos wasted several years trying to find him as a scapegoat.

Obviously that system is not so easy to crack, so the second possibility remains. Thinking of this, Zhang Yang began to search again in the official website server. Although it is unlikely that there is too much important information in the official website server, there must be some outdated or irrelevant information. For example, this, Zhang Yang turned over Arrived a list of records about the staff of the cia.

Of course, it is impossible for those secret agents to appear on this list. The employees on this list are all public employees. After looking at the positions, Zhang Yang directly set his sights on a deputy director. Turner Card, the deputy director of the cia, is mainly responsible for the cia's overseas intelligence collection and summary work. Here is a brief introduction about his responsibilities.

The reason why I didn't look for the director of the cia is because although the director of the cia is a big official and has the highest authority, he may not be the best to use. Moreover, there are too many people who know the whereabouts of the director of the cia. If he logs in to the cia system, someone will definitely pay attention to his account. If he finds that the login location is wrong, it will be a tragedy.

And the things that the deputy director is responsible for prove that he must have a very high level of authority, even if it is not higher than the director, it is estimated to be about the same, and his actions must be much more secretive than the director of the cia, and the account is easier to use.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like