C17 Hacker jianghu
017th Hacker Jianghu
Wei Dongsheng activated the reserved computers in the Internet Cafe. Wei Dongsheng first entered a string of high-strength passwords, aimed at the microphone to recognize the voice characteristics, aimed at the camera to recognize the face and eyes, and successfully activated the subsystem of Bluegrass Hiding in the Internet Cafe.
Cyanobacteria is a computer intelligent life rooted in integrated circuit components. However, cyber security offensive and defensive technology not only seeks to repel enemies, counterattack intruders to get each other's exact IP address is also an important link.
In order to confuse the intruders, Bluegrass had encountered a hacker invasion. He first disguised himself as a home computer and led them to the bait computer that Wei Dongsheng had prepared for him. In the decoy computer, there were many mainstream external connections, many source programs that didn't understand the meaning, and many video files that seemed to be involved in a secret. Decoy computers have relatively low bandwidth, and hackers can spend a lot of time reading online or trying to download them. If he had the power to mobilize the local police or other forces, he could use the time difference to arrest the culprit on the spot.
Unfortunately, the hacker was very alert.
The cyanobacteria record showed that he began his invasion at 12: 10: 11. He flipped through the decoy computer's messy source files and quickly exited at 12: 13: 46. The hacker only stayed on the bait computer for three minutes and thirty-five seconds. After that, he furiously cleaned up the traces left behind by the meat chicken, obviously perceiving that the bait computer was a trap.
On the other hand, the technology difference is the technology difference.
The hacker attempted to invade the Internet Cafe at 12: 10: 11: 15: 00. The blue algae counterattacked him at 12: 10: 15: 00, leaving his real IP address on the record: somewhere in Harbin, Heilongjiang Province. Cyanobacteria are developing, the network security function module is limited now, can not quickly analyze the hacker's real identity, can only know that he is in Harbin city of Heilongjiang Province, but can not determine whether he is a local household registration or guest here.
Wei Dongsheng was analyzing the hacker from Harbin when he suddenly saw a new intruder. Blue algae automatic reverse invasion, showing the new hacker's real IP address: Suzhou, Jiangsu Province somewhere.
Just as Wei Dongsheng was about to investigate the hackers in Suzhou City, the blue algae and red letters warned him that a new intruder had arrived from somewhere in Chengdu, Sichuan Province.
Alright!
Decoy computers are in the market.
The hackers from Suzhou and Chengdu quickly found each other and began fighting. While the fight was going on, another Yanjing hacker came in with a warning in blue algae red letters. The Yanjing hackers were very strong, they kicked away the Suzhou and Chengdu hackers as if they were crossing the river, and started reading the bait computers in an orderly manner. However, the Yanjing hackers and the Harbin hackers quickly discovered something was amiss with the bait computer. Calculating the time he spent kicking the Suzhou and Chengdu hackers in, they only stayed for two minutes and twenty-seven seconds.
Once you finish singing, I'll go on stage. After the Yanjing hackers, I came back three more times.
Wei Dongsheng could faintly understand that these hackers had not coincidentally arrived together, but had consciously used social engineering. In general, lunch required lunch break, the probability of staying in front of the computer was relatively low. It was fine for normal netizens, but it was also hard for them to detect any hackers in front of their computers. But in a fight between experts, attacking an unguarded computer and attacking an guarded computer were two entirely different concepts. These hackers overestimated Wei Dongsheng's fighting strength and consciously chose to group at this time of day.
The question was, why?
Why did the Game Studio attract so many hackers?
It was a pity that Bluegrass only existed for a short time. Last night and this morning, Wei Dongsheng had mainly guided it to load speech recognition, face recognition, pupil recognition and other encryption modules. On the side of network security, he only loaded a few simple modules such as rights control and IP tracking. Just like how Harbin and Yanjing's hackers noticed that the bait computer wasn't right within two or three minutes, they then erased all traces of the meat chicken jumping board, making it difficult for Wei Dongsheng to use his network security attack and defense technology to fight against them.
Just as Wei Dongsheng was feeling depressed, Bluegrass suddenly warned another Shenhai hacker and tried to download all of the sensitive content stored in the Decoy computer.
Wei Dongsheng was startled: Ah, so ostentatious. Just as he entered the door, he started to download, and the target was all the sensitive content.
But when Wei Dongsheng glanced at the details of the Shenhai hackers, he suddenly felt a sense of familiarity: "Hmm?"
Wei Dongsheng confirmed the detailed address of the Shenhai's hackers once again and could not help but retort, "Damn, this is the real owner!"
The real IP address of the Shenhai's hackers was actually the headquarters of the legendary Operator. Evidently, Wei Dongsheng had somehow become famous for no reason at all, alerting a bunch of hackers, as well as the main Enormous Network.
Wei Dongsheng had never dared to underestimate the network security capabilities of a large company in Internet Enterprise. One must know that the elites of the hackers would always go ashore to wash their sweat for their ideals.
Tracing back the history of the hackers in the Hwa Country, the Green Company established in 1997 was a key term that could not be avoided. It was known as the Huangpu Military Academy for the hackers in the Hwa Country. In July 2000, the Green Regiment split up because of internal disagreements, and its people were scattered everywhere. In April 2002, the Hwa Country's Internet Association announced that it would stop organized attacks and deny that the so-called Red Alliance, which had gathered under the patriotic banner, had become a hacker once and for all. Most of the hackers were unwilling to stay in seclusion in the dark, so they left the mountain one after another to find a new source of support.
Whether it's hackers or freelancers, the technology is real.
After this group of top hackers landed on the shore, they were immediately invited by the Internet Enterprise.
For example, in his previous life, Internet Enterprise Elder Brother Tencent was the leader of the Black Tortoise Safety Laboratory. He was the one who studied medicine and was nicknamed the "Gynecological Sacred Hand" by the netizens. Yu Yuyuan worked for Green Union Technology, and the previous life of Green Union Technology was the famous Green Corps.
For example, the Netease News had quoted the five great hackers in the East, Evil, West, and North for publicity. Even Wan Tao, who was the most controversial and had been ridiculed as "killing him", had set up the Eagle Eye Safe Culture Network to entertain himself. After the Five Unique, there were two other young masters of Chen San, one of whom was Chen Sanyan, and the other was Chen Danian.
Chen Danian was Chen Tianqiao's younger brother.
Chen Tianqiao was the leader of the Enormous Network.
Wei Dongsheng would never underestimate the Enormous Network's network security technology.
Wei Dongsheng's achievements in his previous life were limited. Although Xiao Fu and Xiao Gui had their own businesses, they did not have the means to interact with Chen Tianqiao and Chen Danian. Wei Dongsheng had never interacted with them before, nor had he snuck into their circle of people, so he naturally did not know anything about them. Wei Dongsheng was unable to determine the purpose of Enormous Network's visit. Was he trying to curry favor with Wei Dongsheng in good faith, or was he maliciously preparing to kill Game Studio from the beginning?
There are clouds in the art of war, and the enemy is expected to be magnanimous.
Regardless of the purpose of the Enormous Network, Wei Dongsheng decided to raise his own value first and increase the cost of the other party's decision-making.
The reason the technical staff wanted to raise their price was to display their skill level in battle, allowing Enormous Network to understand that Wei Dongsheng was not an ordinary external producer, but a top tier hacker that stood at the top of the food chain. Wei Dongsheng's own cyber-security attack and defense technology couldn't do all of this, but he had the technology that surpassed the current era, computer intelligent life blue algae.
Wei Dongsheng ordered the blue algae to invade the other party's system, and silently seize the highest authority. Opponents use laptops and install Linux systems. Different from Windows systems, the txt Notepad that Windows system users are familiar with corresponds to vi on Linux systems, and the officeword that Windows system users are familiar with corresponds to vim on Linux systems. Wei Dongsheng prefers vim, so he announced his arrival straightforwardly and typed in large numbers of words: "The studio urgently needs money, I sincerely request that your company uphold the principles of saving lives and slowly put on the guillotine. "Before, now, and in the future, I will strictly control the quantity of equipment released. I will do my best to not affect the normal operations of your company."
Wei Dongsheng was unwilling to negotiate with the other party or even leave any evidence behind, and unilaterally declared his sovereignty over the matter. In order to show his refusal to communicate, Wei Dongsheng ordered Bluegrass to block all of the Shenhai's IP addresses. He didn't even allow them to enter the bait computers.
The confrontation between Wei Dongsheng and the hackers in the Enormous Network only lasted forty-seven seconds. 12.47: 18 seconds, the opponent started to infiltrate. 12.47: 34 seconds, Wei Dongsheng decided to display the skill level of network security; 12.47: 38 seconds, Wei Dongsheng hacked into the opponent's Linux system; 12.48: 48: 5 seconds, Wei Dongsheng kicked him out of the bait computer.
It started forty-seven seconds ago and ended in forty-seven seconds.
After deducting the time needed to start the vim editor and the code word, Wei Dongsheng almost instantly went back to the Enormous Network Headquarters. The Enormous Network should be able to clear his mind about Wei Dongsheng's strength. If the Enormous Network was determined to lose all decorum, or all the accounts in the game, or used his influence to ban the Game Studio or pursue Wei Dongsheng in reality, from then on, they would not rest until they were dead.
For the next ten minutes or so, no new hackers visited. Wei Dongsheng speculated that there were two reasons. The first was that the afternoon break was about to end and he had lost the advantage of social engineering; the second was that the Harbin and Yanjing hackers had failed and dispelled the thought of becoming a secondary hacker.
However, just as Wei Dongsheng was about to leave the computer, Bluegrass unexpectedly warned him that a new hacker had arrived.
Wei Dongsheng sat back on his computer and immediately entered the room. He was surprised to find out that the other party had actually turned on the camera. With a camera on the laptop, even departments that were suspected of being secretive would intentionally post a note to ban it, not to mention the hackers wandering in Black Jianghu. However, how confident must this new hacker be to use a desktop compatible computer and not turn off the cameras?