LATEST UPDATES

Published at 1st of March 2022 07:31:15 PM


Chapter 496

If audio player doesn't work, press Stop then Play button again




Jiang Yanhai constantly patched the loopholes in the server, while still paying attention to the process of the other party. The external scanning has not been interrupted. Soon, Jiang Yanhai found several data streams wandering outside the server. After thinking about it, he simply re scanned all external computers connected to the server.

In addition to determining the monitoring system of the library, Jiang Yanhai transferred all the data of the monitoring system back. Without politeness, he directly put this on the big screen.

However, the picture transmitted back from the remote must be delayed. Jiang Yanhai mainly locked the picture in the direction of the server's power supply.

Generally speaking, if they want to track the program, they won't let people cut off the server power. Otherwise, it's more difficult for them to find other login information of the program, because they don't control the server and can't scan the login information of the server at the moment.

After scanning the picture and determining that the enemy could not break through the server for a while, Jiang Yanhai began to invade other computers in the rear to act as broilers.

Jiang Yanhai began to write his own anti tracking program into an invasive Trojan horse program according to several common vulnerabilities he found before.

However, its role is not to hack into the server directly and obtain the system control of the server, but to start scanning enterprise servers with such general vulnerabilities. After determining the target, Jiang Yanhai did it himself.

Just scan enterprise servers with these common vulnerabilities. This is a very simple thing. The scanning speed is very fast.

The first program locked by Jiang Yanhai is a server of an American network communication service provider. With his server, you can automatically retrieve all the customer data connected under its name. At that time, the intrusion efficiency will be higher.

According to the scanned vulnerabilities, Jiang Yanhai directly accesses the normal program of the network communication server. After the server gives a normal feedback response, Jiang Yanhai once again gives an extremely long error data, and the server system automatically starts to identify it.

With the permission of Jiang Yanhai, the Trojan horse program here has spread to the server. In less than 10 minutes, Jiang Yanhai got the super administrator permission of the server. He hid his account for the first time.

At the same time, after scanning the interactive data between their servers in this server and carefully checking these files, Jiang Yanhai immediately began to modify the hidden law of the Trojan horse program.

When the modification was finished, he hit the Enter key directly.

Jiang Yanhai's screen immediately appeared a virtual map of Trojan horse propagation data. Looking at the Trojan horse program spreading in a terrible mode on the screen, Jiang Tao couldn't help swallowing his saliva.

Although I know it's not in China, is it too much to do so? If it gets big, it's not good.

But he didn't have the authority to express his opinions. At this time, more than a dozen warning boxes of instant warnings suddenly appeared on the library server over there. Looking at these warning boxes, Jiang Yanhai smiled and attacked together, didn't he?

In particular, one of the attacks started directly from the inside of the server. After glancing at the firewall, Jiang Yanhai noticed that someone had directly connected a hard disk to the reading interface of the server.

Hairy?! Jiang Yanhai instantly shut down all the external interfaces of the server. If Jiang Yanhai just controls an ordinary computer at the moment, his computer may not respond because there are too many instantaneous commands.

But what does he control now? There are four supercomputers! Although the operation speed of three of them is not very strong in supercomputing, don't forget that there is Shenwei Taihu light, which once ranked first in supercomputing in the world for several consecutive years!

The operation speed of these supercomputing is not comparable to that of ordinary computers, so these instructions only need a cloning operation, and the same type of warnings can be processed directly.

But the external siege is obviously an expert. Although Jiang Yanhai has put pudding on the whole system, as long as you leave the access port, the other party has a way, because since you maintain the connection with the outside world, it is impossible to interrupt all the access ports.

Otherwise, you still maintain an egg data exchange with the outside world.

……

The multiplex chat group has directly switched the voice mode.

"Fu! CK! X man, tell me the truth, who is this person? It can't be without any fame, and the other party has a powerful server behind it."

"Sol, I didn't lie to you. I really don't know. This time it was an accident. Sh! It! Was blocked by him again! Shit!"

"No, sol, do you have any other way? We can't take the server." x man asked directly.

"I mind if you ask the following agents to ask whether the servers of major companies have been invaded. The other party's computing speed is very fast. If he borrows the computing efficiency of broiler, the security personnel of these companies will certainly find such peak computing speed." Sol said silently and directly.

"OK, I see. Do you need me to allocate some server resources to you?" x man asked again.

"No, go away. You just want to find out who I am. I tell you, I help you in your face. I don't like the FBI, okay?" Sol scolded again.

"Sol, apart from others, you are an American. This engine information is all the design drawings of the most advanced fighter engine at present! No matter which country he is obtained, it is a great loss to our country! Sol, since you live in this country, you enjoy the convenience provided by this country."

"You can't deny that the strength of this country has provided you with a lot of convenience. For example, you have a higher status abroad! Unless you want to lose these positions!" x man said seriously instead of joking.

"Shit!" Sol burst out a rude remark, but after the explosion, he was silent. For a long time, he said, "I'll find CASS."

"Can you invite him?" x man's tone brought a little surprise.

"Try it, X man. You'd better find more server resources yourself." Sol said simply.

"I see." x man immediately replied.

Sol's chat room fell silent, but x man made a few calls here directly.

Jiang Yanhai's Trojan horse program has been infected a lot at the moment, mainly the servers of communication providers, but the Trojan horse program directly lurked down after entering it and was not exposed.

He doesn't need these for the time being, but he's prepared.




Please report us if you find any errors so we can fix it asap!


COMMENTS