ghost hacker
15 brute force

young gene

Settings
ScrollingScrolling

He raised his head and looked around. The students in the class were excitedly practicing typing letters. It was not difficult to type letters. After a few days of practice, they would be familiar with it. Seeing that no one was paying attention to him, Danny returned to the world of computers. He heard that government organizations, scientific research organizations, and educational organizations had a nationwide network. This was the government's intranet, but he didn't know if it was true. Judging from the current situation, these computers weren't connected to the national network at all. Danny began to ponder. If they could connect to the wide area network, then the only thing that could restrict these computers from logging into the wide area network was the mainframe in the computer room.

Danny had thousands of regrets in his heart. He had fantasized about the internet world for so long, but in the end, he could only come into contact with the local area network like this. He was really unwilling, really unwilling. The depressed feeling in his heart was driving him crazy.

" What should I do?" Danny racked his brains and suddenly remembered that a book about the Internet mentioned that computers could be remotely controlled. It also explained the general principle and said that one could obtain the remote control authority of the computer through some means. For some reason, the book vaguely skipped this part.

Danny was naturally very familiar with the DOS system in front of him. He could even rewrite it. He recalled its cabinet and structure in detail and found that the DOS system did have a remote access application.

He remembered that the book had mentioned that remote access was basically achieved through a password. Once the password was correct, one could access the computer. The more advanced one was the super user password. With this password, one could control the computer.

With his knowledge of computers, Danny immediately thought of a way to get the password. If it was a three-digit password, there were only 1,000 combinations, from 1 to 999. It contained any arrangement of the three numbers. If you didn't believe it, you could choose a few groups of numbers to try. For example, 685, 865, 658, 785, 200, 139, 256. No matter how you arranged them, they were all from 1 to 999. Therefore, a four-digit password... There were 10,000 kinds of arrangements, 100,000 kinds of arrangements for five digits, 1 million for six digits, and 10 million for seven digits.

If a six-digit password was used on the host, there would be a million permutations. As everyone knew, computers operated at the speed of electricity and could try hundreds of thousands of times per second. If it was a supercomputer used by the country, it would be in the billions.

What Danny thought of was the simplest way to crack the code. It seemed very violent, so Danny came up with a name. Brute Force Cracking. He began to feel uneasy. Should he do it this way? It seemed a little inappropriate to use the computer without the owner's permission, but was it possible to ask the computer room to open the wide area network? It was absolutely impossible!

Danny's heart began to suffer. On one hand, he yearned for the Internet, and on the other hand, he rejected this kind of theft. The two ideas were entangled. In the end, after thinking about it, it was just a way out, and the computer room would not suffer any losses. Finally, Danny made up his mind and decided to do it.

Under the DOS system, there was no such function as brute force cracking, so he had to write it himself. Fortunately, it was not a very complicated program, but it had to be written in pure assembly language, because only this kind of mechanical language could control the hardware of the other computer. In addition to this cracking program, there was also a control platform. This platform was to find the port of the other computer. After cracking it successfully, it would control the other computer.

On the whole, the program was not large, but it was not small either. If he started from scratch, it would not be enough for just one lesson. Therefore, Danny first cracked the DOS system on his computer and got the source code of the DOS system. Danny had done it many times on his previous computer, so he finished it very quickly. Next, he began to pull out the required part of the program from the source code, and then wrote and added his own program in the middle. Finally, he integrated the brute force program into it, and an improved DOS system with brute force and remote control platform was completed.

"Danny, what are you doing!" Danny was making the final adjustments when suddenly Mr. Gander's voice came from behind, scaring Danny out of his wits.

" I... I..." Danny, who was in a panic, couldn't say anything.

"Ah, you're so slow. Why haven't you started typing yet? Look, half the class has passed. If you don't know how to do it, you can come to the teacher.”

Hearing this, Danny was finally relieved. He quickly responded,""Yes…Yes, I've already finished half the class. Teacher, please help me!”

In order not to let Mr. Gander see anything, Danny fumbled and pressed the restart button. At this time, the computer restarted.

Mr. Gander shook his head and pointed at the blackboard.""Look at what's written on the blackboard. You don't have to worry about what it means. Just type in the letters written on the blackboard and press the enter key.”

He entered the typing practice program again. Danny was boring. He was typing the letters slowly with a blank face. At this time, Mr. Gander scolded him,""Look at the others. They are already playing very fast. Then look at your class monitor, Thomas. He has studied hard and has already started practicing the operation of the DOS system.”

"Yes, yes!" Danny quickly nodded.

Seeing Mr. Gander leave, Danny heaved a sigh of relief. At this time, Mr. Gander had already walked to Thomas 'side and was giving him pointers with great enthusiasm and patience.

He continued to work and turned off the typing program. Danny switched on the program that he hadn't finished earlier. This time, he was careful. He kept an eye on Mr. Gander as he worked. Finally, after fixing one or two small mistakes, it was ready to use. He simply set the system to load the new system when it was turned on, and then turned it on again. After the system was turned on, the new DOS system was loaded, and it looked exactly the same as before. If no one pulled out the source code to check, they would not know that this system had these two special functions. Danny rubbed his hands expectantly and began to input a command. The brute force hack and intrusion control platform had evolved into a system command instead of a software program. In short, these two things had been completely integrated into the system.

An operation interface appeared. The computers in the local area network were displayed in letters. One of them was unreachable. It was obvious that this was the host computer. This host computer should not be placed in the computer room, but in the teacher's office outside the computer room. Only when the host computer was turned on could the computers here be connected.

Danny looked around and saw that Mr. Gander was still guiding Thomas. There was no one around. He typed in a few simple commands and the brute force cracking system immediately began to work...

This book is provided by FunNovel Novel Book | Fan Fiction Novel [Beautiful Free Novel Book]

Last Next Contents
Bookshelf ADD Settings
Reviews Add a review
Chapter loading