HacKer

Chapter 56



Chapter 56 Yan returns

The super-privileged user of Supercomputer Yan, who is independently protected by the chip, is indeed very difficult to handle!

It can even be said that it cannot be handled!

However, Shi Lei is the world’s top-level hacker, and once controlled Supercomputer Yan. For the case of Yan, as you know your own hands, you know very well!

The developer of the independent protection chip is the famous chip industry leader Intel, and its quality is very reliable. Not only has an excellent hardware encryption system, but also anti-static interference, current overload protection, etc., to ensure the safety of the chip itself!

However, because of its thorough security, it provides a solution that can be utilized!

In the past life, Shi Lei was also blocked by this independent protection chip. Shi Lei took the opportunity to mobilize the software inside the supercomputer, manage the power distribution, bombard the independent protection chip with a huge current, and instantly let the independent protection chip enter the current overload protection and restart the independent protection chip.

From the automatic shutdown of the current overload protection to the restart of the independent protection chip, there is a gap of approximately three seconds. In these three seconds, the super-privileged user is in an unprotected position.

For the past, later supercomputers did not use independent protection chips, for this reason. Set up current overload protection, which is easy to restart by overload attack. However, if current overload protection is not established, it will be directly burned by the current!

The current overload protection method is a good way to combat independent protection chips. Only now that there is only a small number of people who know this method, Shi Lei also took advantage of rebirth to know that this is not a loophole.

Every supercomputer is a giant. Supercomputer Yan’s mainframe, covering an area of ​​two hundred square feet. Every supercomputer, the amount of electricity consumed, is definitely a horrible number. Therefore, inside the supercomputer, there is an independent power management program that allocates power consumption for each area. Shi Lei carefully entered Supercomputer Yan’s power management program and retrieved the power management subroutine of the independent protection chip.

When found, Shi Lei immediately rejoiced!

The power management subroutine of the independent protection chip, although locked, can unlock the entire power management program through the first level of authority, thereby unlocking the power management subroutine of the independent protection chip.

Shi Lei did not hesitate to use his own level of authority to unlock the entire power management program, and then open the power management subroutine of the independent protection chip.

After the preparations were completed, Shi Lei did not immediately attack the independent protection chip. Because the independent protection chip overload protection, only three seconds. Shi Lei must raise his own account to super-privilege within three seconds, preventing the independent protection chip from sending an alarm message to the security guards. Otherwise, it will fall short and it is very likely to be discovered!

In the past life, when Shi Lei bombarded the independent protection chip, it was the hacker of Xia Guo, when he invaded the Vasang State on a large scale. Supercomputer Yan is the object of being taken care of. Although Shi Lei bombarded the independent protection chip, the independent protection chip sent an alarm message after restarting. However, the security guards of Supercomputer Yan are nervously dealing with the hacking of Xia Guo, and have not noticed the alarm of the independent protection chip. Therefore, Shi Lei repeatedly bombarded the independent protection chip, finally seized the highest authority of the super computer Yan, and manually cleared the alarm information of the independent protection chip.

This world, Shi Lei can not have so many opportunities, he only has one chance!

Within three seconds, seize super-privilege and use super-privilege to block the alarm information of the independent protection chip. All this must be done in three seconds!

Otherwise, everything will fail!

The reason why Shi Lei is so painstaking to obtain super-privilege, instead of directly grafting the internal permission system of the server system, just like dealing with the ACCESS server group. That is because, the system program used by ACCESS’s server group is not complicated, and the system of Supercomputer Yan is not only a closed system developed professionally, but also complicated to die. Shi Lei has no time at all. To graft the permission system. Even if there is time, Shi Lei can’t guarantee success!

Therefore, Shi Lei has to do everything possible to obtain super-permissions, and then use super-permissions to modify the internal authority system.

In the interior of Supercomputer Yan, Shi Lei began to write malicious programs. The first is to invade the elevated permissions, write his own first-level authorized users into the malicious intrusion program, and let the program automatically intensify the permissions and become super-privileged users. .

Then I wrote a message interception program, accessing the malicious intrusion program, waiting for the intrusion program to upgrade the first-level permission to the super-privilege, then obtaining the authorization of the super-privileged user, intercepting the alarm information issued by the independent protection chip, and independently protecting The chip overload protection record is deleted.

Finally, use the super-privileged user to retrieve the internal authority system, and then change the permission system to hide your super-privileged users!

After the two small programs are done, Shi Lei connects them together, and then clicks on the power management subroutine of the independent protection chip.

“Is it a big mouthful of meat, or a cold northwest wind, I’ve looked at it all the time!”

In the room, Shi Lei folded his hands together and installed a dummy. He asked for the Buddha of Heaven.

The power management subroutine of the independent protection chip has been adjusted to five times the normal level. Once Shi Lei presses the confirmation, the independent protection chip will fall into the current overload protection and restart.

Shi Lei put two malicious programs on the server group of ACCESS, and used this server group to fight against Supercomputer Yan. Capturing Supercomputer Yan requires a high-performance server to back it up, precisely because of this step! Once the server is backed up, the computing power is not enough, and it is impossible to invade the super privilege group and improve the user privilege within three seconds. Then everything is over!

“Must be successful!” Shi Lei whispered, with a heart, pressed Enter to confirm!

In the first second, on the computer screen, a large amount of data flashed past, and the screen was kept on and off.

The second second, still a lot of data in the screen, Shi Lei’s forehead burst out of cold sweat, the heart of the prayer of the trust of the company’s server, must give strength!

In the third second, all data streams stop, at the bottom of the screen, two English words appear!

Privilege.Escalation!

Increased privilege!

Seeing these two words, even Shi Lei, could not help but cheer up!

Increased privilege means upper level privilege and upgrade to super privilege!

Capture Supercomputer Yan, 99% successful!

As long as Shi Lei is suddenly brain-dead, or if he has taken the wrong medicine, then the super computer Yan will return to the arms of Shi Lei!

After obtaining the super-privilege, the message interception program successfully blocked the independent protection chip from issuing a current overload alarm and deleted the record.

Shi Lei first used the super-privileged user to start cleaning up his operation traces in the system log. Whether it’s to enhance ACCESS, create your own new account, and unlock the power management program, all of these operational records are deleted.

After removing all traces, Shi Lei did not relax his vigilance. Instead, he began to use the super-privileged users to enter the system source code core, and then switched the system engineering mode to retrieve the system’s permission system.

There is super authority in hand, it really is a very refreshing thing, the speed of the super computer Yan, so that Shi Lei finally found a little bit of the world’s peak hacker feeling.

The system permission system, in the engineering mode, was extracted by the super-privileged user.

Shi Lei’s light car is familiar with the same as modifying the server authority system of ACCESS. He modified the super computer’s permission system and completely hidden his super-privileged users, so that the super users of the supercomputer Yan could not be found.

Next, open the back door of the system, so that Shi Lei can freely enter and exit the super computer Yan. Even if ACC Trust’s computing tasks are completed, Shi Lei can freely enter and exit at any time.

A face with a smile, knocked out the code, established a new system of super computer Yan, and made a number of system backdoors, Shi Lei finally sipped. Execution to this step, super computer Yan, has been 99.9 percent, belongs to Shi Lei!

The last one percent of the difference is the log in the system log, engineering mode.

This log belongs to the special protection mechanism of the supercomputer. It is also protected by independent hardware. Even if you use super-privileged users, you cannot modify it!

However, it is only for ordinary people, there is a super-privileged user, and the log of the engineering mode cannot be deleted. Ke Shilei is now a superb computer, a veritable world-class hacker!

Controlling the super computer Yan, Shi Lei directly used the super computer Yan, again using the current overload protection routine, the hardware that protects the engineering mode log, into the self-protection of current overload, and then quickly deleted the record of his system authorization system. The hardware record of the protection engineering mode log is also deleted.

When the last record was deleted by Shi Lei. He tapped the code and let the super computer Yan, when listing the real user group, his own super-privileged user, has not been displayed, and he can use the super computer yan super management rights. This represents, super computer Yan, successfully captured by Shi Lei!

In 2006, the world’s ninth supercomputer, the pride of Wozang State, the pride of Tokyo Institute of Technology, was successfully captured by Shi Lei!

Thanks to Wonsan, thanks to Tokyo Institute of Technology, to help Shi Lei take care of Super Computer Yan, so that Shi Lei can use the world’s ninth supercomputer without paying a penny!

Captured Supercomputer Yan, Shi Lei will supercomputer Yan, the internal ACCESS company applied for records, cleared them one by one, and then returned to ACCESS to clear the records inside their servers. However, Shi Lei did not let the server group of ACCESS.

After all, this is a server group that can rival small supercomputers. How can it be abandoned?

How can I spit it out when I eat it?

Cut off the network link with the Wosang country, Shi Lei returned to the No. 1 server, and he smiled and opened the music player. In the speaker, the music is heard again.

‘Who is the flower flower, and spring comes again in the spring, and the flower says it waits for one person. ’

‘There is nothing to do with the flowers, I’ve seen the return of Yan…’

————————————————————————————————————

Friendly recommendation: Become an Amano, Zhao Jin!

[bookid=2703696,bookname=“Mixed Empire”]

PS: The recommended ticket task is still a little bit but everyone can achieve it! Ask for recommendations, favorites, clicks!

Is there any reward or evaluation?

The second phase of the small event, do not know how, the post was locked, the audit failed, waiting for the review!

——

[Thank you for your appreciation] The Chamber of Commerce’s big treasurer, rewarding 200. Fat fish is very fat. Friendship reward

.

.

.

;


Tip: You can use left, right, A and D keyboard keys to browse between chapters.