Chapter 494 Fighting with Immortals (Part 1) (3500 Monthly Ticket Plus Monthly Ticket)
For so many years, he has not been discovered on the Internet, and his ID has been changed countless times. Many people do not know who he is. In fact, as early as 2001 and 2002, he was in the Sino-US hacker war. The leader among them.
But at this moment, he suddenly felt old. Every hacker actually has his own strong personal style. Whether it is the firewall he often uses, intrusion programs, etc., as long as he often scans several times, he will probably know who it is. .
Although I don't know who the other party is in reality, I can know the ID on the network and so on.
As for the one in front of him, when he broke through the first layer of the firewall, he felt a sense of surprise. Really, many firewall ideas are wild, and that kind of feeling has been gone for a long time. This is obviously not him. Any hacker you know.
This should be a young hacker who has just entered the industry for a long time. He may not even have systematically learned about hacking and these aspects, because once he has systematically learned these, many aspects will fall into some limitations and routines.
But the other party has none at all, which means that the other party may be self-taught!
Such a genius did not expect another one to appear. Cass thought that with the development of technology in the new century, there may be no genius like the previous Kevin Mitnick.
The field of computer programming will also enter a group-based, stylized, and large-scale route, just like industrial design.
From the highest individual designs, hand-crafted stunning products have gradually become stylized products produced by assembly line operations.
Because the first batch of hackers, the network is just developing, many things are pondered by themselves, without the guidance of predecessors, but these later programmers who have grown up have been carefully studied and studied. Once your brain has carried out this kind of learning, you want to jump out, not a genius!
This is one in front of you! Cass is constantly working hard to defend, thinking that Cass was also a genius back then, nothing more than the confrontation between the genius of the old generation and the genius of the new generation. The main battlefield of the two people has already left the server of the library.
Because those people there are constantly attacking, but in the case of four supercomputer-assisted operations, the so-called DDOS attacks of the other party are useless and can be easily solved.
"Jiang Tao, I'll leave the processing here to you." Jiang Yanhai directly stretched out his hand to operate, and directly transferred the battlefield on the server side to a control terminal next to it, and handed it over to Jiang Tao.
"Yes!" Jiang Tao was also a little excited. Of course, he knew what Jiang Yanhai was doing. This was a one-on-one fight against more than a dozen top hackers. He also wanted to participate, but he knew that his skills should be forgotten.
Mainly relying on the firewall and programs he wrote, he estimated that he could not bear the hackers of others.
But if he relies on the firewall written by Jiang Yanhai and the currently patched system, he can also play ten of them! Although he can't view the source code of these firewalls, he can use it!
After all, he is also a senior security officer, well, he still has this ability.
In fact, Jiang Yanhai doesn't need Jiang Tao either, he can operate it himself, but since someone can use it, why not use it? Do you think it's not tiring to switch keyboards? Being able to save effort is naturally labor saving, just focus on tracking the one in front of you.
The battlefield of the two of them has reached another large server, which is the server of a company that rents a server. The server here houses at least hundreds of company websites, server databases, etc., so the network communication here can be guaranteed. .
But in the same way, it is not so simple to defend so many servers, and after Jiang Yanhai made sure that his firewall was not bad, he stepped up his attacks on the firewall, and he directly detoured.
He quickly found the names of the companies that provided rental services from public information. Jiang Yanhai directly followed the company names to find these companies, and then hacked into the ordinary computers of these companies.
The ordinary computer protection of these companies... For Jiang Yanhai, it seems to be useless. He directly finds the computer of the employee responsible for security protection. Such an employee's level will not be too high, so his personal computer will save the account and password.
After obtaining the account and password, Jiang Yanhai directly initiated a formal access login request to the server through the other party's computer.
This kind of access and login request cannot be completely banned by the other party, so Jiang Yanhai directly logged in to the server, and he was also an administrator account. After logging in, Jiang Yanhai immediately began to use his own program to invade the entire system.
It's really too easy to hack a server from the inside.
The first time he entered this server, the anti-tracking program had continued to directly track the other party, and while the anti-tracking program was tracking, Jiang Yanhai quickly launched a large-scale attack, and directly began to snatch control of the entire server from the other party.
The battlefield that broke out in an instant was directly used to divert his attention. In fact, the anti-tracking program was actually involved, and he had already started to follow his data flow to find his next broiler.
Cass breathed a sigh of relief. This is one of his large broilers. Such a large broiler itself has a good firewall, and it takes time for the other party to attack its own firewall, not to mention that he has set up a second firewall inside the server. firewall.
It's just that he just wiped the cold sweat from his forehead here, and before he could take a sip of water from the teacup next to him, a crazy alarm sound suddenly appeared on his screen!
"Oh! SH! IT!"
The attack method that appeared suddenly made Cass jump in shock, and he screamed in surprise, directly withdrew his hand to get the water glass, and then started to operate abruptly.
"How is this possible?! Where did this guy come from? Didn't I set up a firewall directly?" Cass looked incredulous, although he said that his technology may have declined over the years, but the fuck It didn't drop that much, did it?
Are you going too far? How come you directly broke into the server in just a minute or two, and cracked two protective walls, and it seems that his firewall did not alarm when it was cracked? !
The sweat on Cass's forehead just wiped out instantly, because this server is a broiler he has used for a long time, so the traces inside are not so easy to wipe off!