The Strongest Hacker

Chapter 358 Accident (Part 1)

Chapter 358: Accident (Part 1)

Chapter 358: Accident (Part 1)

There are many deputy directors of cia. Although these deputy directors have relatively great power, they are not all at the headquarters. During the two world wars, the United States had bases all over the world, while cia was located in almost all countries in the world, and there were branches in these countries.

Even in China, there are branches of cia. Zhang Yang doesn't know the specific address, but these branches are just there for people to see, and by the way, direct the actions in this country. No matter which country the cia branch is in, it is certain that it will get the attention of the intelligence department of this country, even if it is an ally.

The difference is that the cia agents in the allied countries are more relaxed and can only get the support of these allied countries. And Deputy Director Turner is not in the US headquarters, but the deputy director in charge of the European region. Although the itinerary of a deputy director like Turner is definitely confidential, his regional division can still be found .

If nothing else, Turner should now be in Rotterdam, the Netherlands. If anyone has seen Jackie Chan's movie, they should have some impression of this city. After finding Turner's information, Zhang Yang immediately hacked into the main telecommunications department in Rotterdam. From the registration system of the telecommunications department, Zhang Yang quickly found the branch of CIA in Rotterdam. According to the information, the branch of CIA uses advanced optical cable communication.

In other words, its communication facilities are directly connected to the national optical cable network, and will not pass through these telecommunications service providers. It can directly pay the Dutch government without going through the Dutch telecommunications department. Zhang Yang rubbed his forehead. If this happened, the problem would be more troublesome. Telecom only registered a general information here, but it didn't have the ip address or server address of the cia branch.

It's useless for Zhang Yang to know the actual address alone. And because its communication system is directly connected to the national telecommunications network of the Netherlands, the address of this connection can be anywhere, even if it is within the territory of Rotterdam, it is impossible for Zhang Yang to find out. Unable to find out this, Zhang Yang has no way to determine its ip address.

Zhang Yang frowned slightly, why did he feel that CIA's foreign branches were more strictly defended than its domestic headquarters? If there is no way to find this ip address, Zhang Yang will definitely have no way to get Turner's computer information. "Infected with worms, ready to invade satellite 4." Zhang Yang pondered for a while, and he was ready to attack the other satellites.

Although there are 13 spare satellites in the U.S. military missile defense system, Zhang Yang currently only uses satellites 1 and 2, and the other satellites are not moved, because two satellites are used at the same time. Zhang Yang can hide the truth from the opponent's technicians, but all thirteen satellites have problems, as long as they are not idiots, they will probably find something wrong, and Zhang Yang will have no way to continue using these satellites.

The orbits of the 13 satellites are shared, and the main responsible area of ​​the No. 4 satellite is above Europe. If Zhang Yang wants to use it, he can only make the No. 4 satellite into his own broiler, although the No. 1 satellite can change its orbit , but it takes at least several hours to change orbit from Asia to Europe. More importantly, this large-scale orbit change can easily arouse the alert of the other party. After all, the satellites in the sky are not completely defenseless against satellites.

The infected worm quickly received Zhang Yang's instructions, and now the infected worm is stored in the No. 1 and No. 2 satellites. The systems of the two satellites have almost assimilated them, so there is no need for Zhang Yang to deal with the No. 4 satellite of the same system. Hands-on, the infestation soon succeeded in turning the No. 4 satellite into a flamboyant broiler.

"Within this city, search for this person, and automatically record all his actions, living habits, etc." Zhang Yang entered Turner's information into the database of infected bugs. Several satellite systems can complete this work. Now that there are infected bugs, the search efficiency of the satellite server is more effective, and the search speed is naturally faster.

While searching for the infected bugs, Zhang Yang didn't stay idle, but frowned and began to think about how to get Turner's account information. The server of the black cia is necessary, this step will have to go out sooner or later, it is better to act as soon as possible. "Ding dong." Just as Zhang Yang was trying to find a way, the notification of the infection bug sounded, and Zhang Yang immediately switched the page. It is estimated that the infection bug found the whereabouts of Turner.

After switching to the information prompt page of the infected bug, Zhang Yang was stunned for a moment, and after a moment of stupefaction, Zhang Yang immediately hit enter. The message indicated that Turner's information was not found, but an inquiry message sent by the infected bug. "...received an external connection request, which meets the third sequence condition of the database. May I ask whether it will be executed according to the original setting. If there is no response within five seconds, the default plan will continue to be executed."

The so-called external connection condition refers to someone giving an order to the satellite. Naturally, this order will not be issued by Zhang Yang, that is to say, it is an external person, a maintenance technician under the US Department of Defense, or someone else. In this case, Zhang Yang had already thought of it when he invaded the No. 1 satellite, and he had already set the method for the system to encounter such a function.

When such a situation occurs, the system will automatically execute, directly close all programs that are already running, and re-disguise the satellite as an inactive satellite in a dormant state. Now because there is one more infection bug, there is one more confirmation procedure. Someone posted a new mission to the satellite? Zhang Yang frowned. Zhang Yang had already checked the system log of the satellite when he hacked the No. 1 satellite. Now this time is not the time to check the satellite. Why would someone use the satellite?

However, if there is no bug infection, after the system goes to sleep, all Zhang Yang's settings will be hidden, and the network connection between Zhang Yang and the satellite will be automatically interrupted, so that Zhang Yang can be protected to the greatest extent. But now that there is an infection bug, after Zhang Yang hits the Enter key, the infection bug will automatically generate a dormant system. In other words, the infected bug will put a shell on itself, and the information of the other party will only be connected to this shell.

What they see are all illusions, unless they use the bottom-level instructions to completely search the satellite server, otherwise, they will not find the existence of this shell at all. However, it is impossible to use low-level instructions. The server on the satellite is not a server placed in the computer room. The cost is extremely expensive, and the special environment makes the power supply and even the signal transmitter inside once the satellite server is restarted after deep formatting. It is easy to malfunction and cause the machine to fail to boot.

If this happens, the satellite will be completely useless, so if it is not a major emergency, the satellite's server will generally not use the underlying command to perform a deep formatted search. In this way, no matter what purpose the other party sends the command to the satellite, what they "see" is no different from the original system of the satellite. The difference is that there is an infected bug hidden under the satellite system.

But all their operations are clearly seen by the infected bugs. "Which satellite is the other party sending the signal?" Zhang Yang has three satellites in his hand, including the No. 4 satellite that just invaded, and No. 1, No. 2 and No. 4 satellites are all chickens of Zhang Yang. move.

"Satellite 4!" The infected bug quickly gave the latest answer. Zhang Yang was stunned for a moment. He didn't expect that just after he let the infected bug turn No. 4 satellite into his own chicken, someone sent instructions to No. 4 satellite. Could it be that the other party found him? If he hadn't discovered himself, how could someone inexplicably give instructions to the satellite?

This situation is unlikely to happen. These 13 satellites are one of the secrets of the Ministry of Defense. Not many people know of their existence. Even the United States Space Agency, which is attached to them, does not know the existence of these 13 satellites. .

"Monitor all the commands sent by the other party, and list and display the commands of the other party separately on the computer screen." Zhang Yang directly issued a new command to the infected bug. A separate page immediately appeared on Zhang Yang's screen, and a line of instructions appeared directly on the computer screen.

Zhang Yang was speechless when he saw the other party's first command. What's the situation? The first command was to use the g*** navigation function of the satellite? Although these 13 satellites are all military satellites, g*** positioning and navigation are naturally available, but if you give instructions to such confidential satellites, you should use some advanced instructions anyway, okay? This kind of function that any commercial satellite has, do you use this top-level military satellite?

At any rate, you are like my brother, using satellite servers to hack into other people's computers, okay? Although a little speechless, Zhang Yang was still a little curious. After a pause, Zhang Yang asked the infected bug to change the orbit of the No. 4 satellite, and actually monitored the information sent by the other party.

The satellite quickly located the location where the message was sent by the other party. Seeing this location, Zhang Yang's face became a little weird. It wasn't anywhere else, but Zhang Yang was just thinking hard about how to steal the cia deputy director to enter the cia internal system account Where Turner is located, Rotterdam, Netherlands!

In addition to the monitoring screen, the screen sent by the infected bug to Zhang Yang also has a satellite map next to it. Zhang Yang glanced at the map. This person is currently located in a motel. According to the instructions sent by the infected bug, this person seems to want to find a way out of the city.

After thinking about it, Zhang Yang turned on the voice prompt function of the Infestation Bug. If there is any latest situation, the Infection Worm can directly voice reminders, and Zhang Yang may miss some important news through the text. It was still late at night in Europe at the moment, and judging from this person's position, he was not far from the suburbs of Rotterdam.

"The other party's position began to move." The voice of the infected bug suddenly sounded, and Zhang Yang immediately saw that the target who sent the command, marked on the map, came out of a room. The weather in Rotterdam was very clear at the moment. Even though it was night, it still couldn't become an obstacle to the No. 4 satellite. The high-definition far-angle lens and super image analysis and processing software made Zhang Yang seem to be watching from above this person's head.

Although the light was not very good, Zhang Yang could still see clearly that it was a Caucasian man in his thirties. The man was also carrying a backpack. Judging from the signal monitoring of the No. 4 satellite, the signal came from this man. Obviously, he should be carrying a wireless signal such as a notebook.

"His identity." Zhang Yang suddenly remembered an important question. To be able to know the specific situation of these 13 satellites, no matter which branch of the United States this person belongs to, his authority is not low, because he is normal through the military system. Logged in, so it can't be a hacker.

"Retrieve the login account information, Holland Huck, Chief of the Intelligence Division of the European Division of the United States CIA! Male, 32 years old, major in the military rank. It is impossible to confirm how the other party knew the reason for the existence of 13 satellites. From the analysis of the login situation, the other party also used The command was sent to the satellite by illegal means." The voice of the infected machine quickly told Zhang Yang the general analysis.

Zhang Yang narrowed his eyes slightly. In CIA's internal system, there must be records about these thirteen satellites, but whether a major is enough for this level, I don't know, but now that the other party knows about this, And it is a system that uses illegal means to enter. So it proves that there must be problems with him, is he a traitor of cia? What information did you steal and want to escape?

"The other party sent a new command to scan all nearby blocks, and input a communication frequency, requesting the satellite to monitor all targets that use the same signal transmitter." The voice of the infected bug rang again.

"Execution." Zhang Yang gave two words. He wanted to see what the hell this guy was doing. He didn't expect that he could see such a good show just because he was looking for a deputy director of cia.

Soon, dozens of new targets appeared on the electronic map. This was only monitored by the communication frequency input by this man. The specific number of people must be far higher than this number.

"Search the communication frequency. The frequency is confirmed to be the encrypted internal communication frequency of cia. The target with the same communication frequency has a 97% possibility of being a cia agent." Infector gave the latest analysis.

Hearing what the infected worm said, Zhang Yang knew that without thinking too much, he was already sure that this person was definitely one of the agents who rebelled against the CIA. As for why they rebelled, who was right and who was wrong, Zhang Yang was not interested.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like