Legend of legends
47 Arriving at the National Cyber Security Center

Little Bea

Settings
ScrollingScrolling

After Li Jun finished his call, a second lieutenant came to pick up Wang Muyang and brought him to a secret underground office area. Wang Muyang had walked around countless times, and he didn't know how he knew that the underground office was upstairs.

"Can you tell me what happened? Uncle Li." Wang Muyang was brought to the resting area in front of the computer room. He saw Li Jun's uncle, Li Haitao, who was also the director of the National Security Center.

"Muyang, is it okay for me to call you that? We initially thought that they were going to attack those big portals, but later we found out that they were attacking our network base station.”Haitao and Muyang said.

"Can I go and take a look, Uncle Li?" Wang Mu Yang was here to help, so he didn't want to waste time.

"You can come with me." Haitao brought Wang Muyang to a secret door and entered the password and the pupil before entering the computer room.

"Boss! Just now! QQ and other portals were hacked!”Just as Wang Muyang was checking the website, the major and Haitao reported the news. Wang Muyang was stunned when he heard the news. He quickly closed the website and entered the QQ address. The website opened very quickly, but the main page had been tampered with. There was only one sentence on it,"Our attack will begin immediately!"

After hesitating for a while, Wang Muyang took out a hard drive and handed it to Haitao. He said that he would need to use the program inside to verify it later. All the storage devices that entered the place had to be verified just in case. The verification process was extremely fast, and it only took a few minutes for the verification process to be completed. A lieutenant colonel and the director, Haitao, gave Wang Muyang an okay sign and handed it over. Wang Muyang immediately connected to the mainframe and took out all the tools in his hard drive. After opening the analysis software, Wang Muyang immediately began scanning the QQ port. A few minutes later, Li Long couldn't help but laugh bitterly. It was really not easy for him to do it now. Just by scanning, there were at least dozens of data streams on the QQ port. This meant that there were at least dozens of hackers watching this place.

Wang Mu Yang was a little stunned. Although he did not know who was behind this attack, he knew that it was definitely not a domestic hacker. It could only be a foreign hacker. Once this kind of foreign hacker invaded a domestic website on a large scale, it would easily lead to a hacker war!

Wang Mu Yang did not have the chance to participate in the 1998 hacker war. However, once this kind of war broke out, it would definitely cause a large amount of indirect economic losses. More importantly, once the anger between the two sides flared up, once it affected the website of the political department, the losses might be even greater, especially some important public systems.

The results of the scan soon appeared in front of Wang Muyang.

"Reporting to Boss, all the large websites in the country are currently under attack, and…it seems that the other party has quickly taken control of them.”The major's voice sounded again.

Wang Muyang was just about to ask Director Haitao when his firewall suddenly started to alert him. A virus was following Wang Muyang's data flow and tracking his information. Wang Muyang was shocked. This was the National Internet Security Center. After taking a closer look, Wang Muyang's heart was relieved. It was QQ's server!

The entire QQ server had been planted with a trojan horse. At this moment, it was spreading rapidly and crazily through QQ. Wang Muyang quickly closed all connections related to QQ. This tracking was not to steal QQ's number, but to collect QQ's user database. The other party's goal was probably to destroy all of QQ's data.

It was obvious that the other party was not acting alone this time. So many portals were taken down almost at the same time. It was impossible for one person to do it. Even Thanatos could not do it. Even if there was a virus opening the backdoor, the backdoor was not omnipotent. The backdoor only provided a port for intrusion. You still had to do the intrusion yourself. At least you had to solve the server firewall, right?

With so many firewalls, unless one person had three heads and six arms, it would probably not be enough. Wang Muyang made a decision almost instantly. This was a hacker organization, and they had a lot of people. Wang Mu Yang quickly opened up a few web portals to take a look. All of the web portals were unusable, and more than 80% of the web pages had the same sentence that Wang Mu Yang had seen at the beginning.

Wang Muyang quickly went around the major websites and returned to QQ's server. Although QQ had just been listed and was not as awesome as Wang Muyang's online space, there were more than 100 million registered users. If such a large number of users 'data was deleted, it would not only be a loss for QQ alone.

This was a slap to the face. It was a slap to the face of the entire Chinese hacker world, or rather, the face of the entire Chinese nation! Wang Mu Yang couldn't afford to lose face, but this was a large-scale invasion. Wang Mu Yang's strength alone was limited. He needed some experts to cooperate with him, such as God.

Wang Muyang didn't even need to think to know that God must be making a move somewhere. However, if they didn't cooperate well, it would be like fighting a war. They would be easily defeated by the other party.

After scanning QQ's server and looking at the other tens of data streams, Wang Muyang did not care about these hackers. After all, they were probably just domestic hackers. Their skills were not very high. As long as they could cause trouble for the other party, it was fine. Soon, Wang Muyang noticed something unusual. He had checked the entire QQ server, but some of the ports had been closed.

Moreover, the data streams from the previous attacks were quickly tracked by the other party. Clearly, these people also treated the QQ server as their main battlefield. After hesitating for a while, Wang Muyang started to attack. He didn't have the time to ask the security center to work with him. There were still some hackers who were attacking QQ's servers. However, QQ had a lot of servers, and they were also very powerful. If they couldn't find enough super servers to attack together, it wouldn't work.

If he wanted to achieve such an effect, he would probably need a large data center with server resources.

QQ's server used the Unix system, which was produced by iPhone. There was no doubt about the server capabilities of the iPhone Blue Giant. Its system was not bad, and it had its own strengths compared to the linux system. After scanning, Wang Muyang quickly found the loopholes. Although these hackers were very powerful and had almost filled all the loopholes in the Universe system, it was a pity that Wang Muyang had not only the latest loopholes, but also loopholes that would only be discovered many years later.

Wang Mu Yang didn't know if anyone had discovered these loopholes, but he knew that there were at least three loopholes in the system that hadn't been patched. Wang Mu Yang's hacking ability was different from before, and it was very convenient to have a loophole. In less than three minutes, Wang Mu Yang had broken through the first layer of the enemy's firewall.

Take the first layer of firewall for example. Even if there were no loopholes, Wang Muyang had six or seven ways to break through its peripheral firewall. Although these hackers had invaded the servers of QQ, the firewall was still the firewall of QQ itself. They had only patched it and blocked some ports.

However, as one of the largest Internet service companies in the country, QQ's firewall was naturally strict. Even if there were some system loopholes, hackers could take advantage of more than just system loopholes. Many normal access requests could be exploited by hackers.

Wang Muyang did not attack the second firewall immediately. He paid attention to the dozen or so data streams sent by the Chinese hackers. Wang Muyang quickly realized that four of the data streams were obviously working together. Two of the three data streams were dealing with the attacks of these four data streams.

Although the battle between hackers was not bloody, the intensity was definitely not inferior to that of a real battlefield. Unlike modern battlefields, this was more like an ancient battlefield. Both sides were like two cavalry. After charging, they crashed into each other, and the countless codes entered by their subordinates were their weapons. It depended on who could give the other a fatal blow.

This book comes from:m.funovel.com。

Last Next Contents
Bookshelf ADD Settings
Reviews Add a review
Chapter loading