HacKer

Chapter 55



Chapter 55 Yan returned

In the room, Shi Lei had ten fingers in his hands, as if he had brought up the afterimage, and quickly tapped on the keyboard. Fortunately, the keyboard that Shi Lei bought is a silent keyboard. Otherwise, the sound of the cymbal will be connected.

Within the core server group of ACCESS, Shi Lei has entered the system and broke a system gap, injecting his own permission system into the Linux system of the core server, replacing the original permission system.

For the Linux system, Shi Lei knows very well that without causing the crash of the entire system of the server group, the new permission system is injected into the server group system!

After the new privilege system, the original two super privileged users were reduced to the first privilege, but their administrative privilege, without any change, is still the same as the previous super privileged users. The only difference is that they can’t be retrieved into the permission group, Shi Lei’s newly created super-privileged user!

Unless they thoroughly check the server group system and find that the permissions system has been replaced. Otherwise, Shi Lei mastered the server group of ACCESS, making this small super computer become its own level of broiler!

After successfully establishing their own super-privileged users, Shi Lei immediately used the super-privileged users to start changing the server group of ACCESS, creating a system back door, which is convenient for the next time without direct access.

Because the super-privileged users were at hand, Axon’s security guards did not find anything wrong, and Shi Lei founded the system back door. From then on, even if Shi Lei swayed into the ACCESS server group, security guards would not doubt it. Because, Shi Lei has acquired the super-privilege of the server group, from hacking to normal access.

The server group of ACCESS will be Shi Lei’s first class broiler. The so-called first-class broiler is the collective name for advanced server broilers. The strength of a hacker is largely determined by the quality of the broiler in hand, as well as the quantity.

For example, a hacker has mastered a million ordinary personal computers as zombie broilers, which is quite a terrible existence! After all, this million zombie broiler is just launching the most primitive violent flood DDOS attack, and it is enough for a general server to drink a pot!

Of course, it is probably not possible to attack a supercomputer with a violent flood. A famous supercomputer, which one does not have a hardware firewall? Filtering DDOS attacks is a breeze. Unless you can launch thousands of zombie broilers for simultaneous attacks!

But if someone really controls more than 10 million zombie broilers, this person will be harmonious with the state-related departments as long as they are not gods!

The network is disorderly, and it is based on the fact that there is no deadly threat to the country. If a hacker really threatens the country’s core interests, don’t underestimate the power of the state. The country sincerely wants to find someone, and really few people can escape.

Even Shi Lei, now dare not say that 100% can escape the pursuit of the country. Because, the top force of the hacker community, the first generation of hackers, most have been transformed into cyber security experts, or accept the national Zhaoan, as a national cyber security personnel. The strength of the first generation of hackers is absolutely inscrutable!

However, if Shi Lei captures the super computer Yan, then he has confidence, anyone who wants to grab his IP address is absolutely impossible!

Under the control of Shi Lei, no one can break through the super computer Yan.

Within the server group of ACCESS, Shi Lei used the super-privileged users to modify the security policy of the server. Although ACCESS has its own network security experts, these experts are still a lot worse than Shi Lei.

After modifying the security policy, Shi Lei copied the meteorite firewall from the No. 1 server. ACCESS’ Norton firewall has been destroyed by Shi Lei, leaving only an empty shelf. Shi Lei is going to use the server of ACCESS to directly sneak into the super computer Yan, how can it not fix the firewall?

In the unlikely event that his invasion of Supercomputer Yan was exposed, with the help of ACCESS’s servers and the meteorite firewall, Shi Lei could escape safely without being chased by the supercomputer Yan, the world!

Although Norton Firewall only has empty shelves, Shi Lei did not abandon it. Instead, he used this empty shelf to incorporate the meteorite firewall. As a result, from the perspective of the firewall’s user interface, it is still a Norton firewall. But in fact, its internal core source code is a meteorite firewall written by Shi Lei. Even the security guards of ACCESS open the Norton firewall, they will not find the firewall, and there is a problem!

After the installation of the meteorite firewall, Shi Lei finally checked the server group of ACCESS. Then, Shi Lei controls the server group, and from the server group, extracts a project that ACCESS needs data calculation, and sends a connection request to Supercomputer Yan.

From the Tokyo Institute of Technology, ACCESS applied for the partial use of Supercomputer Yan, and they have a legal pass for Supercomputer Yan!

At Tokyo Institute of Technology, after receiving the application from ACCESS, Supercomputer Yan immediately searched the rights of ACCESS and the system resources that can be used in the internal permission group, and then responded to the ACCESS server. Group, allowing it to connect to enter.

When Shi Lei controlled the server group of ACCESS and connected to Supercomputer Yan, he was excited. Past life, super computer Yan, is Shi Lei’s first super computer broiler!

This world, super computer Yan, finally has to return to his arms!

After connecting to the supercomputer Yan, Shi Lei first transferred the computing tasks extracted from the ACCESS server group to the supercomputer Yan.

Supercomputer Yan, choose to accept ACCESS’s documents, Yan will automatically detect the security of the file first, and then its internal security staff will be manually detected again. If there is no problem with the file, it will be handed over to Supercomputer Yan to run the calculation in a sandbox environment.

Shi Lei did not do anything in the documents that needed to be calculated. After all, the other party will go through several tests. If the problem is discovered, then Tokyo Institute of Technology will definitely inform ACCESS, and ACCESS will doubt that they will not apply to Supercomputer Yan for any computing tasks. The only possibility is that the server has been exploited by hackers!

Therefore, the files uploaded by Shi Lei are really the calculation files of ACCESS. Then, he himself can use the ACCESS company to connect to the legal channel of Supercomputer Yan and directly enter the serious system vulnerability of Supercomputer Yan!

Capturing Supercomputer Yan, the most difficult step is the first step, how to connect to Supercomputer Yan! Without a normal connection, it will be rejected by Supercomputer Yan. If a hacker attack is used, the security guards of the other party will be alerted.

Only like Shi Lei, find a legal connection, sway the super computer Yan, and then attack the super computer Yan’s serious system loophole!

Supercomputer Yan, after entering the field of business cooperation, there is a serious loophole in the system, cooperative business users can use system vulnerabilities to enhance their own permissions!

In the past life of Shi Lei, it is convenient to use this loophole to upgrade your authority to super-privileged users!

ACCESS’s documents, after being tested, were sent to Supercomputer Yan’s sandbox environment to begin computing tasks. And Shi Lei, carefully in the super computer Yan, found the serious system loophole!

After finding the system vulnerabilities, Shi Lei did not attack immediately, but tried to see if this was a honeypot trap. Although the defense of the supercomputer is very reliable, it still does not rule out the possibility of the other party setting up a trap on the periphery of the server.

After a temptation, Shi Lei determined that this is the serious system loophole that he knew. Shi Lei directly attacked the code by attacking the code according to a preset plan.

Since the previous life has invaded this loophole, Shi Lei is familiar with the real inside of the super computer Yan, rather than the external business cooperation space!

After entering the inside of Supercomputer Yan, Shi Lei first used the vulnerability to start the promotion of the account of ACCESS. When the rights of ACCESS were upgraded to the third-level authority and new users could be established, Shi Lei immediately established a brand-new user and reduced the rights of ACCESS to ordinary business partners.

Then, Shi Lei upgraded the user who established himself to the first-level authority through the vulnerability, and then immediately stopped. This serious system vulnerability can only be upgraded to a level of authority, but not a super authority. If you use the vulnerability, try to increase the super privilege, it will trigger the super privilege user protection mechanism, and the entire supercomputer will immediately issue an alarm!

After Shi Lei has a level 1 privileged user, he can enter the privileged user group normally, and can also manage low privileged users in a limited manner. With the first-level permission, Shi Lei uses the first-level permission to access the system’s security policy, and uses the first-level permission to start changing the super computer’s system settings.

The first step that needs to be changed is to cancel the protection mechanism of the super-privileged user, and to cancel the protection mechanism of the super-privileged user, the permission of the super-privileged user must be obtained. If the protection mechanism of the super-privileged user is not canceled, once the super-privileged user is started, the protection mechanism is triggered and the supercomputer internally issues an alarm.

This is an infinite loop!

Without super privilege, you can’t cancel the protection mechanism, you can’t cancel the protection mechanism, you can’t get super privilege!

The protection mechanism of the super-privileged user is protected by an independent hardware chip. It is independent of the supercomputer system and is not affected by system interference. It only accepts the instructions of the super-privileged user!

Shi Lei looked at the computer screen and showed the super-privileged user protection mechanism, showing a sneer look!

——————————————————————————————————————————

PS: Currently recommended ticket 9950+, the goal is 10300, which is today’s day, reaching 600 votes! I hope that everyone will support the mountains and make the recommended tickets for the mountains and mountains a little more! Reach the goal 20:06 plus more!

Then, according to the requirements of everyone, the book evaluation area small event will be opened again. The prize has a seven-digit YY account, an eight-digit penguin account, and a penguin couple account. For details, please see the book review area and make it before this afternoon.

Seeking collections, recommendations, member clicks, rewards, comments, everything!

——

[Thank you for your appreciation] With the wind, smile again, reward 100.

.

.

.

;


Tip: You can use left, right, A and D keyboard keys to browse between chapters.