At this moment, the internal chat room of the Honker Alliance had already exploded.
The person who initiated this hacker challenge was the number one hacker organization in the international hacker organization, Snake, which meant snake. This was an organization that was almost legendary because on the FBI's list, there was only the code name of this organization and the major events they had done, but no one's name.
The events they did were:
In early 2001, he invaded the satellite phone company of Eurostar, and obtained nearly 20 million US dollars by altering user information and accounts.
In July 2001, he hacked 237 websites dedicated to racial equality and black rights within a month, and wrote vicious comments on the front page of the website cursing people of color.
On March 18th, 2002, at 2 p. m., the traffic lights in downtown Washington were controlled by means of invasion, causing traffic congestion. After successfully attracting the attention of the American government, they hacked into the FBI's internal information. Although they were eventually discovered and retreated, they also took away some of the Interpol's undercover information. Three days later, they lost contact with all the spies.
In May 2003, he hacked into the system data of the boeing company, tampered with the flight route, and extorted the boeing company.
On Valentine's Day, 2004, a virus with the same name was released and infected more than eight million computers worldwide…
……
……
It could be said that this was a notorious hacker group. It could even be said that they had abandoned the spirit of hackers and used their computer technology for personal gain. Moreover, the organization had also made public statements many times, despising people of color and believing that white people were supreme. Thinking about it, the reason why they started this conflict was because they felt that they had lost face. It was even possible that they were the ones who developed the Beacon Virus!
With Snake's personality and their usual reputation and technical ability, they wouldn't be surprised if it was really him.
What made the members of the Hongke Alliance even angrier was that this letter of challenge, alright, let's just call it a letter of challenge. It was written in an extremely impolite manner!
The first sentence in the letter was translated as: Lowly yellow-skinned monkeys, you should feel honored when you read this letter because the person you are talking to is Snake, the legendary Snake!
Isn't this annoying?
Moreover, this letter of challenge was hung on the main page of the Hongke Alliance. In other words, the opponent had tampered with the main page of the Hongke Alliance through hacking. This was the greatest humiliation for a hacker organization!
Even if you are the world's number one hacker organization, you can't use such methods, right?!
Snake said in the letter of challenge that the s.mmh.com website they posted was the location of the battlefield. From now on, Snake would challenge hackers from all over the world. From September 5th to September 10th, hackers from all over the world would be able to compete. Of course, their greatest hope was for the legendary S.MMH. In the words of their letter of challenge, it was for both sides to compete!
"You're such a bully!" Ying Nian and Zao Fei shouted crazily in the chat room,""Where's S.MMH's boss?! Come out quickly! Help us collectively exterminate this group of damned bastards!”
The reason why he called it that was because he had already logged into that website. The website looked like an ordinary English interface. There was nothing there, but real hackers knew that this was only the first test.
First of all, he had to crack the encryption algorithm on the website before he could get a full view of the website. This encryption algorithm was extremely difficult. Just this first test alone had eliminated more than 99% of the people in the world who wanted to participate in the battle.
Moreover, the most perverse part of this encryption algorithm was that it automatically changed according to the IP that was hacked. In other words, this was not a place where an expert could enter after breaking the password and throwing it out. Moreover, even if the same person used a different broiler to enter the webpage, the attack would have to be calculated again.
If anyone wanted to enter, they had to use their own strength and kill their way in alone.
In the Hongke Alliance, only Blue Treasure, Guan Pingchao, and a few others had this kind of strength. The others, like those who were young and fat, could only watch from the outside.
At this time, Guan Pingchao and the others were also enduring the fierce attacks of the other party.
After Guan Pingchao entered the real page of this website, he immediately started to officially hack into the server of this website. The most commonly used method was to use a chicken to launch a DBOSS flood attack. It would use countless garbage data streams to overwhelm the other party, making it impossible for the other party to react. Then, they would seize the opportunity to find a loophole and attack in one fell swoop.
Guan Pingchao's method was only a test. He knew that Snake was ranked first in the world, so he definitely wouldn't be unworthy of his reputation. Although the DBOSS attack was the most commonly used, most common, and most effective attack technique, the other party should have a way to deal with it.
Sure enough, the firewall easily filtered the valid data in the huge information flow and removed all the useless data. In the blink of an eye, they found Guan Pingchao's real location.
"Hurry up! How can he be so fast?" Guan Pingchao was surprised, thinking that this was indeed the world's number one hacker organization, but he was not discouraged at all, because the failure of the DBOSS attack was already within his expectations.
Knowing that his opponent was stronger than him, Guan Pingchao didn't dare to be careless. He scanned his opponent's weaknesses while taking a roundabout approach to avoid a direct collision with his opponent.
Hackers 'attack and defense were unfair to begin with. Other than the technical gap between the two sides, the hardware configuration and the number of chickens accounted for a large proportion. Guan Pingchao was currently breaking through, but he could feel that the opponent's attack was very powerful. Amidst the countless streams of data, he found him almost effortlessly and stuck to him like a sticky candy, making Guan Pingchao unable to deal with it wholeheartedly.
" That's impossible!" Guan Pingchao thought to himself. Snake was the number one hacker organization in the world, so it wasn't strange for them to have such technical strength. However, the problem was, how could they deal with such attacks one by one?
Although Guan Pingchao was very proud, he knew that his strength was not the absolute top in the world. Snkae's declaration of war had spread through various channels. From the intercepted data streams, at least 30 hackers or more were attacking the server at the same time. And as the news spread, this number would probably increase!
If they were to hunt down anyone who invaded the server, how could Snake have so many people? Moreover, there were still five days left. Didn't they need to sleep?!
Guan Pingchao's eyes lit up when he thought of this. At this moment, Blue Baby sent a message on his communicator: "I have already entered the other party's server. Don't be disturbed by external attacks. That's just an intelligent counterattack system that the other party developed!”
As expected!
No wonder he had always felt that although the other party's attacks were fierce and his bite was very tight, his technique was too singular.
A firewall that could automatically counterattack? Furthermore, it was able to filter out the garbage information and determine the firewall that was the main attack on the data flow! The first one was not a big deal, because many hackers used their own compiled firewall with a certain counterattack function, which meant that after encountering an attack, it would release information with viruses and trojans, but generally speaking, it was not very useful. This firewall was naturally much stronger than ordinary hackers, but it could be achieved through technical means.
However, it was very difficult for the AI to filter through the junk information and judge it so accurately. Guan Pingchao was constantly changing his appearance and disguise, but he was still discovered by the other party. It would be fine if he was a real person, but the other party was just a software, a machine! This was very difficult to understand.
"The other party must have used some unknown method!”Guan Pingchao thought to himself as he continued to disguise himself. Because as long as it was a program, there would be a corresponding pattern. Perhaps it was to record some personal habits, or perhaps it was to record some specific information, but there would always be a pattern!
Guan Pingchao felt that it would be too embarrassing if he couldn't even handle such a program. However, as one of the developers of 360 Security Guard, he was also full of curiosity and anticipation for this firewall.
Guan Pingchao began to change his tactics. After knowing that his opponent was just a machine, it became much easier. The main thing was to find out the opponent's pattern. This method of searching was like analyzing software that developed dynamic passwords based on a certain algorithm. It required precise analysis.
Through the analysis of the information in the data flow packets? This method would only result in death when faced with the DBOSS flood attack! This was because powerful information processing would slow down the server's operation, which would give the opponent an opportunity to take advantage of.
That should be through the analysis of the key fragments in the information? This was because even though the spammy information was disorderly, it had obvious deceptive methods. As long as one could find the pattern, it was not difficult to defend against it.
Thinking of this, Guan Pingchao felt very relaxed. He felt as if he had cracked an insignificant magic trick.
Therefore, he disguised his own intrusion message as well, pretending to be the same as the garbage message, and requested to shake hands with the server.
Sure enough, after he used this method, the sticky information flow that had been biting him was instantly gone. He must have treated him as trash and given up.
"Very good!" Guan Pingchao's move was successful. He quickly disguised the data flow to attract the attack of the other party's firewall, and he quickly found a loophole to bypass it!
Success!
After breaking through the firewall, the next step was to obtain the advanced administrator rights of this server system!
Suddenly, countless messages flooded in from all directions. Guan Pingchao realized that his operation had slowed down. In the next second, he found himself kicked out of the server.
"No way!" Guan Pingchao was covered in sweat. The last attack was too fierce, and he had almost no strength to fight back.
Was this Snake's strength?
At this moment, Guan Pingchao realized that Blue Baby had left a message on his communicator: This is a firewall with multiple traps. I failed after breaking through the second layer. The second layer is a disguise trap that makes people think that it is the server system. Once he attacked, it was equivalent to entering the enemy's trap. After breaking through the second level, there was still the third level. This was the real battlefield. Unfortunately, the other party was, after all, the world's number one hacker organization. I failed.
Guan Pingchao's hand trembled and accidentally knocked over the glass of milk on the table next to him.
If even Blue Baby Big Sister couldn't do it, did he really have to ask S.MMH to do it? But the problem was, where was S.MMH?! Did he know about this?
This book is provided by FunNovel Novel Book | Fan Fiction Novel [Beautiful Free Novel Book]