HacKer

HK055 The Return of Yan On

In the room, Shi Lei quickly tapped on the keyboard with his hands and ten fingers, as if with an afterimage. Fortunately, the keyboard Shi Lei bought was a silent keyboard, otherwise, the crackling sound would be connected in a line.

In the core server group of ACCESS, Shi Lei has entered the system, and broke a system gap, and injected the permission system he wrote himself into the lnux system of the core server, replacing the original permission system.

Shi Lei knew very well about the lnux system. Without causing the entire system of the server group to collapse, he injected a brand new permission system into the server group system!

With the new permission system, the original two super-privileged users have been downgraded to first-level permissions, but their management permissions have not changed, and are still the same as the previous super-privileged users. The only difference is that they can be retrieved into the permission group, the only super permission user newly created by Shi Lei!

Unless they overhaul the server group system and find that the permissions system has been replaced. Otherwise, Shi Lei would have mastered the Axios server group, making this small supercomputer his own first-class broiler! [

After successfully establishing his own super-privileged user, Shi Lei immediately used the super-privileged user to change the server group of ACCESS, creating a system backdoor, so that the next time he could enter without knowing it.

Because the super-authorized user was in hand, the security guards of Aixi didn't find anything wrong at all, so Shi Lei created the system backdoor. From then on, even if Shi Lei swaggered into the ACCESS server group, the security guards would not doubt it. Because Shi Lei has obtained the super permission of the server group, from hacking to normal access.

The server group of ACCESS will be Shi Lei's first first-class broiler. The so-called first-class broiler is the general term for advanced server broiler. The strength of a hacker is largely determined by the quality and quantity of broilers in hand.

For example, if a hacker has mastered one million ordinary personal computers, as a zombie broiler, that is quite a terrifying existence! After all, this million zombie broilers just launched the most primitive violent flood os attack, and it is enough for ordinary servers to drink a pot!

Of course, attacking a supercomputer with a violent flood is probably unlikely. Of the famous supercomputers, which one does not have a hardware firewall? Filtering os attacks, that's a breeze. Unless, you can launch thousands of zombie broilers to attack at the same time!

But if someone really controls more than ten million zombie broilers, as long as this person is not a god, he will definitely be harmed by the relevant state departments!

The network order is also built on the basis that there is no fatal threat to the country. If a hacker really threatens the core interests of the country, don't underestimate the power of the country. The country is looking for someone sincerely, but there are really few people who can escape.

Even Shi Lei doesn't dare to say now that he can escape the state's pursuit 100%. Because, most of the first-generation hackers, the top forces in the hacker industry, have transformed into network security experts, or accepted national recruitment and served as national network security personnel. The strength of the first generation of hackers is absolutely unfathomable!

However, if Shi Lei captured the supercomputer Yan, then he would be confident that it would be absolutely impossible for anyone to capture his p-address!

Under Shi Lei's control, no one can break through with the supercomputer Yan alone!

In the ACCESS server group, Shi Lei used the super-privileged user to modify the server's security policy. Although ACCESS also has its own network security experts, these experts are far worse than Shi Lei.

After modifying the security policy, Shi Lei copied the Rock Firewall from the No. 1 server. The Norton firewall of Axios has been punctured and destroyed by Shi Lei, leaving only an empty shelf. Shi Lei was going to use ACCESS' server to directly infiltrate the supercomputer Yan, how could he not repair the firewall?

In case, his behavior of hacking into the supercomputer Yan is exposed, with the help of Axios' servers and the Rock Firewall, Shi Lei can escape safely without being hunted down by the supercomputer Yan all over the world!

Although there was only an empty shelf left in Norton Firewall, Shi Lei did not abandon it. Instead, he took advantage of this empty shelf and integrated the Panshi Firewall into it. This way, from the firewall's UI alone, it's still the Norton firewall. But in fact, its internal core source code is the Rock Firewall written by Shi Lei. Even if ACCESS' security guards turned on the Norton firewall, they wouldn't find the firewall, something went wrong!

After the installation of the Rock Firewall was completed, Shi Lei checked the ACCESS server group for the last time. Then, Shi Lei controlled the server group, extracted a project that ACCESS needed data calculation from inside the server group, and sent a connection application to the supercomputer Yan.

ACCESS applied for part of the right to use the supercomputer Yan from Tokyo Institute of Technology, and they have the legal pass of the supercomputer Yan!

In Tokyo Institute of Technology, after receiving the application from ACCESS, the supercomputer Yan immediately searched for ACCESS's permissions and available system resources in the internal permission group, and then responded to ACCESS' server. group, allowing it to connect in.

When Shi Lei controlled the Axios server group and connected to the supercomputer Yan, he was excited. In his previous life, the supercomputer Yan was Shi Lei's first supercomputer broiler!

In this life, the supercomputer Yan will finally return to his embrace! [

After connecting to the supercomputer Yan, Shi Lei first sent the computing tasks extracted from the ACCESS server group to the supercomputer Yan.

The supercomputer Yan, chooses to accept the files of ACCESS, Yan will automatically check the security of the files first, and then the security guards inside it will manually check again. If there is no problem with the file, it will be handed over to the supercomputer Yan to run the calculation in a sandbox environment.

Shi Lei didn't do anything in the files that needed to be calculated. After all, the other party will go through several tests. If a problem is found, then Tokyo Institute of Technology will definitely notify ACCESS, and ACCESS will suspect that they will not apply for any computing tasks to the supercomputer Yan. The only possibility is that the server was hacked and used!

Therefore, the file uploaded by Shi Lei is really the calculation file of ACCESS. Then, using Axios himself, he can connect to the legal channel of the supercomputer Yan, and directly attack the serious system vulnerability of the supercomputer Yan!

Capturing the supercomputer Yan, the most difficult step, and the first step, is how to connect to the supercomputer Yan! If there is no normal way to connect, it will be rejected by the supercomputer Yan. If a hacker attack is used, the security guards of the other party will be alerted.

Only someone like Shi Lei can find a legitimate connection path, struttingly connect to the supercomputer Yan, and then attack the serious system loopholes of the supercomputer Yan!

After the supercomputer Yan was put into the field of business cooperation, there was a serious loophole in the system. The cooperative business users could use the loopholes in the system to increase their authority!

In his previous life, Shi Lei used this loophole to elevate his authority to a super authority user!

After the files of ACCESS are detected, they are sent to the sandbox environment of the supercomputer Yan and begin to perform computing tasks. Shi Lei, on the other hand, carefully found the serious system loophole in the supercomputer Yan!

After finding the loophole in the system, Shi Lei did not attack immediately, but took a test to see if this was a honeypot trap. Although the defense of the supercomputer is very reliable, it still does not rule out the possibility that the other party will set up traps on the periphery of the server.

After some probing, Shi Lei determined that this was the serious system vulnerability he knew. Shi Lei directly followed the preset plan, tapping the code to attack this loophole.

Since he had already invaded this loophole in his previous life, Shi Lei was very familiar with the loophole and drilled into the real inside of the supercomputer Yan, not the space for external business cooperation!

After entering the inside of the supercomputer Yan, Shi Lei first exploited the loopholes and began to escalate permissions for the account of ACCESS. When the authority of ACCESS was raised to the third-level authority and new users could be established, Shi Lei immediately established a brand new user, and reduced the authority of ACCESS to ordinary business cooperation users.

Then, Shi Lei upgraded the user he created to the first-level authority through a loophole, and then stopped immediately. This serious system vulnerability can only be elevated to the first-level authority, but not super-authorized. If you use the vulnerability and try to increase the super privilege, the super privilege user protection mechanism will be triggered, and the entire supercomputer will immediately issue an alarm!

After Shi Lei has a first-level privileged user, he can enter the privileged user group normally, and he can also manage low-privileged users to a limited extent. With the first-level authority in hand, Shi Lei accesses the security policy of the system through the first-level authority, and uses the first-level authority to start changing the system settings of the supercomputer Yan.

The first step that needs to be changed is to cancel the protection mechanism of super-authorized users, and to cancel the protection mechanism of super-authorized users, the permission of super-authorized users must be obtained. If the protection mechanism of super-privileged users is not cancelled, once the super-privileged users are attacked, the protection mechanism will be triggered, and an alarm will be issued inside the supercomputer.

This is an endless loop!

Without super authority, the law cancels the protection mechanism, the law cancels the protection mechanism, and no super authority is obtained!

The protection mechanism of super-privileged users is protected by an independent hardware chip, which is independent of the supercomputer system, not affected by system interference, and only accepts instructions from super-privileged users!

Shi Lei looked at the super-privileged user protection mechanism displayed on the computer screen with a sneer look on his face!

ps: The current number of votes is 9950, and the target is 10300, that is, today, it will reach the level of 600 votes! I hope everyone will support Shanshan and let Shanshan get more tickets! Reach the target 20:06 plus update! [

Then according to everyone's request, the book review area will open another round of small activities. This time, the prizes include a seven-digit yy account, an eight-digit penguin account, and a penguin couple account. See the book review section for details, and it will be done before this afternoon.

Ask for collections, clicks from members, rewards, comments, everything!

【Thank you for your reward】With the wind blowing, smile again, reward 100

Chapter 55/1926
2.86%
HacKerCh.55/1926 [2.86%]