LNMTL
HK :: VOLUME #16
#1579: Mysterious Hacker! 【Spring Festival is pleasant!】
Comments 0
Report
English
Chinese
……
the evaluation mechanism of h design, is divided for four Grade!
Breaks through First to inspect Server, needs World Third-rate standard, is not only attack aspect achieves World Third-rate standard, but also needs defense aspect also to achieve World Third-rate standard.
If defense aspect has not met the standard of World Third-rate, then may be inspected the Server counter-attack, cleans up to inspect Server, thus is eliminated.
accomplish First step test, and in inspecting Server, found Second to inspect Server Link Address, attempts to invade Second to inspect Server, at least needs World Second-rate standard, similarly is offensive and defensive balance World Second-rate standard, but is not sole aspect World Second-rate.
Third inspects Server to correspond World First-rate and World Quasi Exceed Class, Fourth inspects Server to need fully to meet the standard of World Exceed Class, can break through enters.
Enters Fourth to inspect Server Hacker, is h true acknowledgment member, may also saying that is Official Member!
To obtain the subsidy of each month of Hundred-thousand US Dollar, definitely needs to be found out the Identity Information situation by h list aspect. Otherwise, really treated as the fool h and Shi Lei?
in the h inspection mechanism, First inspects Server is broken through easily, but Shi Lei this moment currently observes one to participate in the First Round inspection Hacker.
This Hacker currently and First inspects Server to dispute, if merely from the macro analysis, Hacker attack and Server defense strategy, is almost evenly matched.
But in fact, Shi Lei has actually discovered the unusual circumstance!
This looks like the technology is unsatisfactory, will achieves World Third-rate standard Hacker. Is perhaps fierce. Because, this Hacker attack data, is not the choice goes round unexpectedly inspects the Server defense strategy. But explains directly!
Moreover, this Hacker explaining way is very ingenious. Almost will not cause to inspect Server defense strategy Reporting System.
If were not Shi Lei had discovered exactly existence of this Hacker, he did not know this Hacker situation. But now Shi Lei, had discovered this Hacker invasion, Shi Lei is observing this Hacker quietly.
‚Well, this technique is...’ In the Shi Lei mind flashed through has wiped the familiar feeling, but Shi Lei could not remember, was actually any concrete information.
But, Shi Lei continues to observe the invasion of this Hacker.
This Hacker and First Round inspect the fight of Server to continue as before. If must describe in words and expressions that is the lukewarm water boils the frog!
Right!
This Hacker as if boils the frog same to cope with First Round to inspect Server in the lukewarm water!
His bit by bit is disintegrating First Round to inspect the Server defense strategy, seems like evenly matched, even faintly some feelings of lacking the ability to do what one would like, but completely is the misconception!
This Hacker showed the formidable strength, contained First Round to inspect Server, made First Round inspect Server to fall to the enemy slowly slowly.
Even, Shi Lei establishes is inspecting the Server internal information collector, is collects the small measure of Hacker invasion side case and defense plan, was prevented by this Hacker.
Shi Lei has held breath cold air. in the heart raises a chill!
‚Damn, is actually this fellow who? So is unexpectedly fierce!’ Shi Lei considered in in the heart secretly that the opposite party can prevent the information collector unexpectedly. Absolutely is not the common people, at least is not so-called World Third-rate standard!
Shi Lei has not alarmed this mysterious Hacker immediately, but is the preparation continues to observe, has a look at this Hacker, actually to have any goal.
Tries to mix in h? Through the test mechanism, traces h related Server information, thus collects useful information data.
„[Izual], will inspect Server Hacker data through First Round, demonstrates completely. According to time of invasion breakthrough to refer. Ascending arrangement!” Shi Lei was telling [Izual].
„Yes , sir!” [Izual] all passes First Round to inspect Server Hacker data immediately. Has put in the LIP Lens-type Information Processor Virtual transparence screen.
In the Virtual transparence screen, Shi Lei is examining the related situation. Through speed quickest Hacker, only has spent unexpectedly the Forty-seven second merely, then breaks First Round inspection Server!
Shi Lei examined First Place related information specially, First Round inspected the Server information collector, collected this Hacker related data.
Through analyzing these data, on the Shi Lei face shows the smiling face that has wiped to disdain, this through speed quickest Hacker, is not the threat. Because, this Hacker, although indeed has the technology, but he has used close 3 tflops computing resources, in such a short time, handled First Round to inspect Server.
First Round inspects the Server computation speed, merely 0.1 tflops, by the close 30 times of resources attacks, is broken by the strength.
This explaining way and compared with Hacker of Shi Lei currently observation, fell the hinayana completely!
Pass time passage period Ranked First Hacker, is similar to a full brain is the orangutan of muscle, but Shi Lei currently observation Hacker, is similar to a wise is the same, interweaves inescapable net that was unable to break through, inspects Server to exterminate First Round gradually, and will not give any message, will not expose his existence.
‚Is this fellow, actually who? Now has spent for five minutes, this mysterious fellow, but also is inspecting the Server resistance with First Round, actually does he want to do?’ Shi Lei observes, while was guessing.
Along with the invasion of Mysterious Hacker, Shi Lei had discovered gradually actually this Mysterious Hacker is making anything. This mysterious Hacker, is not only explaining First Round to inspect Server, but also is also analyzing First Round to inspect the Server defense mechanism.
What is more awful, this mysterious Hacker, silent destruction First Round inspects the Server defense mechanism, while through analysis, is rebuilding the defense mechanism.
Naturally, defense mechanism of Mysterious Hacker reconstruction, definitely is not the original defense mechanism, mixed in absolutely was the Mysterious Hacker invasion code.
‚Has damn fellow, been such degree unexpectedly?’ Shi Lei in the heart High Degree attaches great importance, displaying the situation of looks like from this Mysterious Hacker, this fellow also has at least achieved World Grade, even directly is the World Summit Grade degree.
If no this degree, is impossible to conceal First Round to inspect the Server information collector, and reconstructs First Round to inspect the Server defense mechanism.
‚Waited for that this fellow passed First Round to inspect Server, enters the Second field inspected Server time, it is estimated that can determine come out, actually this fellow has been what degree!’ Shi Lei in the heart wants to say secretly.
Observation that as Shi Lei is quietly, three minutes flashes, this mysterious Hacker, finally accomplish First Round inspection, and in inspecting Server, found the Second field to inspect Server Link Address.
According to the inspection setting of h, once participates in the inspection Hacker, left First Round inspection Server, then the automatic shutdown and First Round will inspect the connection of Server.
Mysterious Hacker knows that this stipulation, he does not accept as a memento entered the Second field to inspect Server.
Somewhere the mysterious place, in Dark Shadow, the fellow who does not see clearly the men and women, currently is rapping the keyboard, even if through the bright of screen, is unable to meet to rap the both hands of keyboard, is actually any appearance, because this pair of hand is bringing the glove unexpectedly!
„First Round inspects the Server situation, is actually a matter? Let me have a look at this h, actually to have any background!” Hides in the start to talk that the fellow in Shadow thought aloud, from sound determine, should be a middle-aged man.
This hides the man in Shadow, that Mysterious Hacker of exactly as stated Shi Lei observation, he reconstructed First Round to inspect the Server defense strategy, and was similar to Shi Lei forecasts to be the same, in the defense strategy, joined belonged to his source code.
That is tracing and localization code, this hides the mysterious man in Shadow, tries to inspect Server through First Round, determines h Internal Network.
If Shi Lei is not the unusual good luck just right had discovered perhaps this Mysterious Hacker situation, this Mysterious Hacker really may the success.
After all according to Shi Lei's design proposal, once after First Round inspects Server was passed, indeed will return to the [Interweave Net Miwang] sequence.
That Mysterious Hacker invasion method was very marvelous, has shielded the information collector, has rebuilt the defense strategy, will locate and tracing code hides in the defense strategy. When First Round inspects Server returns to [Interweave Net Miwang], tracing and localization procedure will then start, related information, will transmit to that mysterious Hacker.
That mysterious Hacker, can know existence of [Interweave Net Miwang], thus further investigate [Interweave Net Miwang] data.
However, fortunately, Shi Lei has discovered this mysterious Hacker, and knows that this fellow inspects in Server in First Round, has rebuilt the defense strategy.
Therefore, Shi Lei told that First Round of [Izual] to testing Mysterious Hacker inspects Server, has carried on the thorough scanning, and has carried on the reset.
When [Izual] implement Shi Lei's order, that mysterious Hacker unexpectedly chuckle, „Server reset? Um, a little opinion! It looks like, these inspect Server, belongs to h completely? Said that h has used the Virtual Server technology?”
Because First Round inspects Server already by reset, this mysterious Hacker lost obtained the data channel, he can only continue to start to invade the Second field to inspect Server.
Shi Lei also has more opportunities to observe this Mysterious Hacker, determine this Mysterious Hacker identity...
Hanya sebuah blog kecil yang bertujuan saling membantu sesama. Semoga dapat berjalan dengan lancar.
Saturday, January 6, 2018
1579: Mysterious Hacker!
Subscribe to:
Post Comments (Atom)