Begin!
This bro is coming!
Zhang Ye finally adjusted the equipment and changed a few parameters. Following that, his fingers flew across the keyboard and went straight to the Korean government's official website. Why did he choose this place? This was because the Korean hackers had previously invaded China's national website, so Zhang Ye naturally wanted to give them a taste of their own medicine. Furthermore, the Korean government's website was an extremely important place. Zhang Ye was prepared to go big!
Let's test the waters first.
He sent a disguised email, but it was like a rock in the ocean. It was blocked.
Zhang Ye thought for a moment and sent another probing data packet. This data was a system deceptive. He wanted to trick the machine into sending a signal to obtain a pass, but he still failed. The Korean government's website could be said to be heavily guarded, and its security was extremely high.
Once.
Twice.
Thrice.
All to no avail.
Zhang Ye was not surprised. He knew it wouldn't be that easy. He thought of a few ways to invade from the outside, but he did not implement them. This was because he felt that it was too inefficient. Hence, with a stroke of inspiration, he scrolled down the webpage and switched on a translation software to translate the words on it. It wasn't very detailed, and there were many mistakes in the translation, but it was enough as long as he could translate it. Oh? Private email? This was an email address that was displayed on the second page. It was unknown if it was for reporting letters or suggestions.
Got it!
It's you!
The current Zhang Ye was no longer the Zhang Ye of the past. He calculated the time and immediately sent an English title for the report letter. In order to attract attention, he sent a report against the President. If it was anyone else, wouldn't they open it to take a look? But there was a program embedded in the contents.
Wait.
A few minutes passed.
Suddenly, the email was opened by someone!
Zhang Ye immediately seized the opportunity and used that short period of deceit to type more than ten commands. It first went through the port, then went around the server and finally came back. A computer in an unknown region became Zhang Ye's "chicken". Firstly, it was to ensure his own safety. Secondly, Zhang Ye needed this "chicken" to help him disguise himself. But just as he succeeded, the backdoor program was discovered by the firewall!
Zhang Ye was already prepared. He unhurriedly typed in a few commands. He did not hide, nor did he retreat. Instead, he used the "broiler" he was controlling to quickly operate. Just as the firewall was about to send out an alarm, he took the initiative to delete the backdoor program.
There was no alarm!
The firewall lost its target!
Only then did Zhang Ye successfully enter. Following that, he began to search internally and through the LAN. Finally, he found the administrator's account!
Data inducement!
Very quickly, the administrator password was cheated out!
The firewall's ability to lure information within a local area network was greatly reduced. Hence, Zhang Ye was able to succeed. Sometimes, a machine was just a machine and not a human. They could only accept instructions and did not have their own thoughts. The decoy number that Zhang Ye had sent in this world was actually a loophole. He had made the computer think that he had administrator rights, but had forgotten the password. This allowed him to use a loophole in the computer to easily obtain the password and account number without anyone knowing.
Very good!
It was time to operate!
After Zhang Ye obtained the administrator's information, he immediately logged in. The first thing he did was to change the password. This also required a very deep level of technical skills. Some websites with higher security measures would alert the system if there were any changes to the administrator's password. It was very easy for him to be marked as a "kill target" by the firewall. Zhang Ye could not be discovered now, or all his previous efforts would be for naught. If a few security experts and programmers came to pursue him, Zhang Ye would not be able to do anything he wanted. Hence, he typed in another 20 more commands, which took him a full two minutes!
The firewall did not detect it!
The password was not changed either!
But in fact, the password was already different. The first layer of password was the one that the firewall recognized, so there were no abnormal changes to the data. The internal alarm did not sound, but Zhang Ye had added an additional password in the background. It was a second layer program, which meant that if others wanted to obtain the highest level of authorization, they would need the second layer of password to enter. For example, if there was a bicycle with an alarm lock, if you wanted to change the lock, the alarm would sound, and the police would come. But if you did not ride the bicycle away, you could just lock it again, and the alarm would not sound. If the owner of the bicycle wanted to ride it away, he would not be able to do so. He could only watch helplessly. That was roughly what it meant.
Everything was ready!
He was starting to get down to "business"!
......
On the other side.
The battle was getting more and more intense. The Chinese and Koreans were already fighting until their eyes were red!
JIN: "Let's put in more effort! They can't hold on much longer! "
59-V: "I can tell! Let's take turns to rest and exhaust them to death. Everyone, let's attack together. They have fewer people and can't hold on much longer! "
"Kill!"
"Hahaha!"
"I've taken down another website!"
The Internet Surveillance Bureau really could not hold on much longer.
Fang Xiaoshui's eyes were already sore, "Coffee! Give me another cup! "
Meng Yi's eyes were also red. They were like an eagle's eyes, "I want a cup too! F * * k! I'll fight it out with them! I don't believe that I can't beat them! "
There was also Fan Yingyun who was still in a good state of mind. After all, Old Fan had not worked the entire morning and had even taken an afternoon nap.
The 1st Department had already gathered more than 20 people.
The other 2nd and 4th Departments were also working overtime. From time to time, one could hear people shouting and cursing in the office beside them. Everyone was fighting!
Dong Zhiqiang had also personally joined in. His network skills were lacking, but it was still considered a strength. "Everyone, hold on! Hold on for me! The Leader has already gone to other places to seek help! There are many technical personnel from the State Security and the military who can join in the battle soon! "
Fan Yingyun said coldly, "By the time they come, the daylilies will be frozen!"
Dong Zhiqiang said, "The people from the military have to apply for approval. They need to go through the procedures and need some time!"
Zhang Er shouted, "No good! Another expert from Korea has come! Sister Fan, I can't hold him back! "
Fang Xiaoshui said while panting, "I can't hold on either. I entered a few commands wrongly. I can't take back this website. The number of hackers is estimated to be 200-300!"
"Sister Fan!"
"Sister Fan, I need help here!"
Fan Yingyun shouted, "Don't call me. I'm f * * king busy over here! Just do your own things! "
More and more Chinese websites were being taken down, and the situation was getting more and more disadvantageous. Many of the hacked websites could no longer be taken back in a few minutes like before!
Five!
Ten!
Twenty!
A large number of websites were paralyzed! This was a disaster!
Fang Xiaoshui said anxiously, "Why isn't anyone coming to help!? Are those people just watching the show? I don't believe that there aren't any other experts in China! "
A cyber-policewoman shouted, "The Koreans are going too far!"
A few of the old programmers from China's anti-virus companies could no longer hold on!
Suddenly, a young cyber-policeman from the First Department was stunned. "Holy sh * t! Our people have made a move! Quickly take a look! Quickly take a look at the Korean government's website! "
Fang Xiaoshui ran over. "What's the situation?"
Meng Yi also suddenly realized that the attacks of the Korean hackers were getting weaker. It was as if many of them had stopped attacking. It was unknown what they were doing.
"Korean government's website?"
"How do you know it's our people?"
"It's written in Chinese!"
Many people from the Internet Surveillance Bureau hurriedly looked over!
The Koreans also discovered this shocking fact!
JIN: "Who is this bastard?"
59-V: "What does this mean!? Quickly translate it! "
A Korean hacker said, "It's Chinese! These words are... "
Some of the world's top hackers also retracted their attention from China's Sino-Korean war zone. They all turned to Korea and the Korean government's website!
YOYOT (USA): "Someone has made a move!"
TOM (UK): "Let me go in and take a look."
Fujiwara (Japan): "The red words look quite scary. It's Chinese, but I don't really understand it. Can someone translate it for us? What does it mean? "
Cepera (Russia): "There's going to be a good show to watch this time. A Chinese hacker has finally stepped forward. Only now will there be suspense about the outcome. If we only defend, we will never have a chance of winning. We need an expert who can attack without caring about anything. For this person to be able to invade the Korean government's website without a sound, it means that his skill is not bad. He shouldn't be some small fry. This is going to be interesting! Has TOM returned? "
TOM (UK): "He's back."
Cepera (Russia): "How strong is this person?"
TOM (UK): "I've gotten the admin password, but I don't know why I can't get in. I didn't even see him, so how would I know his strength!"
YOYOT (USA): "The second level password?"
TOM (UK): "Maybe. I'm not good at this field, so I can't crack it."
Cepera (Russia): "Looks like he's not an ordinary person. But why haven't I heard of this person before? Other than those known hacker experts in China, there are still so many powerful people? Like that FAN, and now this person, the second level password is not a simple technique. If it were any of us, the success rate might not even exceed 30%. The difficulty lies in how to trick the firewall's U-layer to overlay a new layer of password. Otherwise, once the firewall is triggered, the second level password will not be overlaid. Compared to this, it would be faster to first change the password and then use a Trojan horse or other means to block the firewall. But then again, if the second level password really did not trigger the overlay of the firewall, then it would be even more difficult for others to take back the admin rights. The internal firewall and security system might even be used by him, becoming a powerful barrier for him. This is no doubt an expert, there's no doubt about it! "
YOYOT (USA): "I asked a friend in China, and he translated this!"
The world's top hackers, famous security companies from various continents, the Korean government and people from all walks of life, as well as many citizens of China, were all looking at the words written in blood red on the Korean government's website. This was a sentence that had never appeared in this world before!
Ultimatum:
Those who offend China will be punished no matter how far away!
— "2".
You've already exceeded your reading limit for today. If you want to read more, please log in.
Login
Select text and click 'Report' to let us know about any bad translation.