Hk134 Bad Situation
Coming to the film and television photography company, the Wosang woman at the front desk stared at Shi Lei with brows and eyes, and hummed: "We are not recruiting here, please leave, or I will call the police!"
Shi Lei looked around and nodded, turned around and walked slowly out of the film and television company, observing the surrounding situation as he walked.
‘Four surveillance cameras in the lobby, no security staff, open car park. Working hours are from 9:00 am to 5:00 pm. At noon, lunch should be take-out, and there are take-out bins in the trash can! I just don't know if the security monitoring system is connected to the network or not! ' As Shi Lei walked out of the film and television photography company, he calculated in his mind.
When he arrived at the film and television photography company, Ichiro Inu walked into the hall and looked at Shi Lei's leaving back. He felt a little familiar, "Xiaozi, who was that guy just now?"
The Wosang woman at the front desk, named Xingzi, looked at the short, fat and ugly looking ingratiatingly, "President Little Dog, that guy came to apply for the male lead role, but he was kicked out by me!"[
Ichiro Koinu is a little relieved, if he is here to apply, he is definitely not that person!
Shi Lei circled around the Advent Film and Photography Company, observed the surrounding terrain, and checked if there were any spots that could be used.
'There is a camera on each courtyard wall, is there a blind spot monitoring? It's really troublesome! ' Shi Lei got into a taxi and returned to the hotel.
Ma Liang was monitoring the dog Ichiro, Zheng Sanpao was about to blow up the plastic, and Ye Feng took care of Deng Xiaoling in the hospital. Shi Lei was alone in the hotel room, looking at the surveillance map drawn by Ma Liang.
‘Coming to the film and television photography company is indeed the best place to start! ' Shi Lei whispered in his heart, then turned on the computer in the hotel room, and used the Internet search engine to inquire about the information of the film and television company.
Coming to the film and television photography company in Tokyo, it is still a little famous!
And as Shi Lei expected, this company is really a photography company that shoots love action art films!
Shi Lei opened the official homepage of Arrival Film and Television Photography Company in the browser. The speed of opening was very slow. Shi Lei's eyes narrowed slightly. On their official homepage, he browsed the covers of various love action art films, as well as new movie trailers.
'With such a poor access speed, could it be that it came to the film and television photography company, using workstation-level servers, and putting it in the company as a web server? ’
Shi Lei interrupted secretly, and then quickly used the method of code injection to enter the other party's server background from the official website, and easily broke through the defense of the web server. After entering the web server, Shi Lei checked the server configuration. As he broke it, Advent Film and Photography Company only used a workstation-level server as its own official website web server.
Through this workstation-level web server, Shi Lei quickly descended into the film and television company's internal LAN and browsed, trying to find the computer that controls the security monitoring system.
Unfortunately, Shi Lei probed all the internal local area networks and found no trace of the security monitoring system at all. From this point of view, the security monitoring system that came to the film and television photography company should be outside the Internet.
There are generally two types of security monitoring systems. The first is to come to a film and television photography company. It is located outside the Internet. Although it is relatively safe, it has a fatal weakness, that is, remote monitoring, which requires security personnel to keep watch at any time.
The other is a security monitoring system connected to the Internet. This security monitoring system can use any computer equipment through the Internet to obtain monitoring images anytime, anywhere. Due to this convenience, such security monitoring systems are used in many occasions.
'trouble! damn it! Actually, the security monitoring system was not connected to the Internet. They obviously don't have security personnel, how can they still use the security monitoring system! ' Shi Lei thought with some distress.
Without a security monitoring system connected to the Internet, and separated from the physical connection of the Internet, even a god cannot use the Internet to hack such a system without a physical connection to the Internet!
Isolate the physical connection, which can be very effective in preventing the invasion of hackers!
Shi Lei exited from the web server of the Advent Film and Photography Company, then cleaned up the traces of the hotel computer intrusion, and then studied the map. On the map, he found a viaduct, and then on the computer, he used a search engine to find a place called Friendship Bridge.
The Friendship Bridge is a sixteen-meter-high viaduct spanning two main roads and an underpass. This is the place where Ichiro Koinu must pass by car! [
Shi Lei constructed a plan in his mind, and immediately prepared to implement it. He first looked up the information of the three bars on the search engine, hoping that the security monitoring system of one of the bars could be connected to the Internet and could be controlled remotely. But the result disappointed Shi Lei. The three bars did not have official websites at all. Fa found their p information, what about the invasion?
Shi Lei carefully searched the Internet for information on bars with relatively good geographical conditions. The bar was called Peach Bar. Shi Lei was going to investigate and find the p-address of Peach Bar first.
Since there is no official website, Fa obtained p intrusion from the official website, and can only start with the real address of the peach bar, and then look for the p address corresponding to this address in the user database of the Internet service provider. This process is equivalent to tracing the network to the p address, and then according to the p address, the practice of finding the actual address is reversed.
Shi Lei used an Internet search engine to find the phone numbers of many Internet service providers in the area where the Peach Bar is located. Then he smiled and took out a prepaid anonymous mobile phone he just bought. According to the number on the screen, he picked one and dialed it. He was going to determine which network service provider he purchased the broadband service from, Shi Lei. Just to deal with the invasion.
"Hello, so-network, what can I do for you?" A sweet voice came from the telephone receiver. so- is one of the network service providers in Tokyo, under the umbrella of Sony Corporation.
Shi Lei responded in standard Japanese with Osaka accent: "Hello, I want to apply for a broadband line."
So-'s customer service lady replied: "Sir, where are you located? How much bandwidth do you need to apply for broadband service?"
Shi Lei said solemnly, "I'm at No. 27, 6-chome, Sumida-ku, Tokyo!"
The customer service lady inquired and replied strangely: "Sir, are you a customer of Peach Bar? You have already applied for a broadband line, do you plan to apply for another one? Or are you planning to increase the speed?"
"Oh? Really? I'm sorry, I'm a newly recruited staff member at Peach Bar, and I may have misunderstood the leader's order. I'm really sorry for disturbing you!" Shi Lei apologized sincerely, but sneered in his heart. Finally determined the Internet service provider of the peach bar, then you can start looking for their p-address!
"It's okay! So-Network, I wish you a happy life, goodbye!" The customer service lady hung up the phone.
Shi Lei used the hotel's computer to access the first-class broiler of ACCESS, and then entered the official server of so- through the first-class broiler of ACCESS. Without disturbing the technical staff of so-, he easily found the Peach Bar. p address, then cleaned up all traces of the invasion, and left calmly!
The whole process, no more than three minutes!
After obtaining the p address of the Peach Bar, Shi Lei controlled the first-class broiler of Axios, and successfully entered the Peach Bar and connected to the computer with the Internet. Using this computer, Shi Lei first retrieved all connections on the internal local area network, and found that there were only three devices in the Peach Bar, connected to the Internet.
Two of them are regular PCs, and the other device is an audio player that controls the music-on-demand system throughout the Peach Bar.
Shi Lei did not find any particularly useful information on the two personal computers, and the other party's security monitoring system was not connected to the Internet as expected, which made Shi Lei very depressed!
Leaving the Peach Bar, Shi Lei once again used the trick just now, under the guise of installing broadband, to find the p of the other two bars, and then check their situation. The security monitoring systems of the other two bars are also outside the Internet, and there is only one personal computer connected to the Internet, which makes Shi Lei quite embarrassed!
In an industry like bars, which is very less reliant on the Internet, the role of hackers is not obvious.
Shi Lei entered the Peach Bar's internal network again, spying on the audio player, which was the only thing that could be used at the moment.
After carefully checking the information on the two personal computers, Shi Lei found a very interesting piece of news. The seller of that audio player actually went out of business!
In other words, if the audio player is damaged, the peach bar can only repair it at its own expense!
Seeing this news, Shi Lei suddenly burst out laughing! [
Because, he finally found a way to deal with the dog Ichiro, and left no evidence!
Shi Lei controls the first-class broiler of Axios, implanted a timer virus in the audio player, and then added a professional maintenance service to the various contact lists stored in one of the personal computers in the peach bar. Contact numbers for various audio players!
Seeing that the timer virus of the audio player would break out at seven o'clock tonight, Shi Lei quickly cleaned up the traces of the invasion, then lay comfortably on the bed and rested.
At noon, Shi Lei casually ate some ramen in the hotel, then checked the road monitoring system in Tokyo, and tried to attack several times.
The road monitoring system in Tokyo is quite strong in defense, at least it can be breached by the absolute law with the computer of the hotel! Shi Lei just tried it out, and then quietly retreated.
In the afternoon, Shi Lei purchased two portable network cards in the electronic market outside and returned to the hotel.
Near six o'clock, Zheng Sanpao came to Shi Lei's room with a suitcase in his hand. He whispered, "Boss, the plastic exploded!"
Shi Lei clapped his hands and said, "Just in time, I also thought of a plan to stitch the sky!" (To be continued. If you like this work, you are welcome to register as a member of this work. Your support is my greatest motivation. )