Chapter 125 Firefox group, invasion!

Organization (individual): Firefox group

Time: 8 p.m. on December 24!

result:

This is the registration form on the official website of Hualian network security group. Yang Tian squinted for a while and then closed the browser. He didn't know much about the Firefox group. He only knew that the Firefox group was the second-generation organization in China. However, although it was the second-generation organization, the Firefox group completely played a mysterious nature.

It is not clear where the specific headquarters is, how many members are there and who is in charge, but no one will ignore its existence, because in some forums, members who call themselves Firefox often appear, and whether they answer questions or make comments, they seem to be very profound, so Firefox has always been very mysterious in the hacker world.

"Firefox group?" Yang Tian whispered.

Although the voice is small, it happens to be facing the microphone, so several other online people can hear his whisper. At this time, Yang Tian is only one in the bedroom, and the wind is rolling in his bedroom.

"Firefox group rarely appears in China. It has a high frequency of activities abroad last year, and every time they appear, some government websites and enterprises will be hacked!" The sound of shadow came from the stereo.

In the past two years, Yang Tian has been studying the virus, so he seldom knows this. Thinking, the voice of milk tea came again, "I met members of the self proclaimed Firefox group with the egg tower in the kolhei forum in Germany. At that time, I refuted the invasion principle published by him? Hee hee!"

Yang Tian shook his head, twisted his neck and asked casually, "Arctic, what about you?" After several weeks of understanding, Yang Tian found that the Arctic king had many friends, although the Arctic king did not explain. But Yang Tianneng guessed that his friend should be a member of an international organization, so relatively speaking, the Arctic king must know a lot of news.

Sure enough, the Arctic king said, "the Firefox regiment was established not early. It was founded in 2004. I only know that the person in charge of the organization is called 'Firefox', and the Firefox regiment is also a group similar to a terrorist organization. They don't abide by the so-called hacker ethics in the hacker community. Their nature is to take people's money and eliminate disasters for others! Take the list, no matter who the target is, they will kill them directly!"

After listening, the corners of Yang Tian's mouth suddenly turned up, and his eyes narrowed tighter, "what's their strength?" This is what he wants to know most.

"The strength is unknown, but I heard that the Firefox regiment once bombed and killed the German military system!"

"Oh?" After hearing the speech. Yang Tianheng ran his fingers across the bridge of his nose, and then hit his forehead with one hand, "is there a way to contact them?"

"Contact them?" Arctic King

"Around the nest, what do you want to do?" Shadow.

"You want to invite them..." finally, the words of the wind roll.

Yang Tian smiled at the corners of his mouth, and then sat up straight. "Yes, contact them, take money and eliminate disasters for others? Oh!"

Yang Tian is always Yang Tian. He is still so evil. He has made it clear that wind roll, Arctic king, shadow and others can't understand what he means. Yes, Yang Tian wants to invite the Firefox group to kill the United States!

"Is it appropriate?" The Arctic King hesitated. Although he was a hacker, he was not evil and wanted to kill the United States. He didn't object, but asked an organization like Firefox to help. If it spread out in the future, Xie Shi's reputation would not be very good.

The wind roll and shadow did not express their opinions, and the egg tower and milk tea did not make any sound. I don't know whether they were numb or hit again.

Is it appropriate? It's no more appropriate for Yang Tian to come here.

"It doesn't matter whether the Arctic is suitable or not. You should know our goal. Our goal is the United States. A country, an economic power and a scientific and technological power!"

Yang Tian explained in a calm voice.

"If I ask someone for help, I can find friends, but if I ask a group like Firefox group, I'm afraid in the future..." it seems that the Arctic King's heart is still unwilling to accept Yang Tian's opinion.

Yang Tian shook his head and his face remained calm. He was not angry, but a little helpless.

One minute, two minutes, ten minutes passed, and few people spoke.

Suddenly, the words of the Arctic king came again, "I try to find a friend and see if I can contact Firefox!"

Finally, the Arctic King compromised!

When midnight arrived in depression, the cold wind outside was still blowing, as if there was no warmth.

The early morning has passed. Yang Tian, who was originally studying the virus, now stops tapping the keyboard with both hands and says to the wheat, "it's all there!"

"Yes!" Arctic King

"Yes!" Wind roll

Then shadow, milk tea and egg tower were online one by one. After talking just now, Yang Tian asked several people to be busy with their own affairs, and discussed others after the early morning.

"Today, December 24, let's report!"

Arctic King first reported that "the IP addresses of government agencies in Washington, New York and other surrounding areas are all locked and summarized. There are 748 servers, including 68 departments such as legislature, judiciary, Ministry of Commerce and administration bureau!"

Next comes the shadow, "the network institutions of major enterprises and groups in Washington, New York and other surrounding areas are fully summarized, with a total of more than 3000 servers. As for enterprises, they are internationally famous industries!"

Egg tower and milk tea are supposed to help, so they just need to carry out. The task of Arctic king is relatively easy. However, the task of shadow is more difficult, because major enterprises generally have their own protection experts, and some large groups have their own security experts, so it is even more difficult to break through.

Yang Tian bowed his head and meditated for a while. Suddenly, he raised his head and said, "now let's go to rest. At 12 noon, they are ready to perform their tasks. The greater the impact, the better! Remember to be careful! At 12 noon, everyone will talk online!"

Yang Tian was originally prepared to take action on December 25, but he was a little worried, so one day ahead of time, because he knew that the task of the Arctic king and the shadow was not simple. Not to mention the US government, if only the US hackers knew about it, they would not stand idly by!

The Arctic king, shadow, milk tea and egg tower agreed to go offline. However, only Yang Tian and fengjuan are left at the moment, because they have more important and dangerous tasks to perform. A detailed analysis of the Pentagon in the United States.

"Wind, let's start?"

"OK! Wait until I go to your bedroom!" The words of the wind roll fell. Then the door opened and the wind roll entered, holding three notebooks in his hand.

Pop! Pop! Pop! Three notebooks are placed on the computer desk, and the wind roll sits in front of the computer desk.

"The Pentagon of the United States is surrounded by the Ministry of defense, and the inner layer is the command system of the Navy, land and air forces, as well as special command platforms such as the presidential command post. Let's start with the Ministry of defense, and I'll send you the address and access point!"

After Feng Juan said that, he passed the IP address of the Ministry of national defense to Yang Tian. In fact, the meaning of the access point is roughly the same as that of the back door, that is, he can directly enter the last location through this access point.

Two days before the tornado, he tried to break into the Ministry of defense, but the defense systems such as honeypots and traps inside were too tight, so he left only one access point and evacuated immediately.

After receiving the IP and access point from the wind volume, Yang Tian immediately opened the analysis tool to input the IP. Access point is an access program. After clicking, you can directly enter the last evacuation site.

Yang Tian is afraid to scan a large network organization like the US Department of defense, because once scanned, the other party will find that it can only penetrate slowly from the periphery step by step.

Open the software of four people in a row, including analysis tools, penetration tools, connectors and attack input devices.

The analysis tool, as its name implies, analyzes all the conditions of the other party. It was written by Yang Tian two years ago and has been used now.

Penetration tool. Although Yang Tian's strength is not intrusion, the intrusion tool he wrote is very powerful. This penetration tool is a weak port that penetrates each other through data flow.

The connector connects various auxiliary machines and broilers, that is, all their own states are presented on the connector one by one.

Attack the input device. Use this tool to control the broiler after entering the command, so as to destroy the data flow. Generally, hackers have this attack input device, but they are all different, and the principle is also different. Of course, the program is also different.

The good or bad of this tool completely affects the strength and weakness of data flow and the speed of speed in the virtual battlefield, so this tool is very important for hackers.

Through the access point, Yang Tian and the wind roll successfully intruded into the periphery of the Ministry of national defense and could not be scanned. Yang Tian could only analyze the surrounding situation through analysis tools. As soon as he accessed, Yang Tian's eyebrows wrinkled immediately.

The Pentagon is indeed the Pentagon. Even the peripheral defense system is so complex. Suddenly, Yang Tian doubts whether he and fengjuan can invade each other's core.

The last time the FBI intruded into the United States, the FBI's honeypot was very complex, especially in the Pentagon at the moment. Moreover, from the device of the honeypot, it is a real honeypot, that is to say, the real loopholes are in front of you, depending on whether you dare to break in.

"I came here last time to stop. The other party's honeypot completely adopts the authenticity honeypot. All loopholes are real. It's easy to get in and get out?" With that, a trace of helplessness flashed on the angular face of the wind roll.

It seems that the invasion expert windroll is also a headache for the Pentagon.

Headache belongs to headache. You have to attack when you should attack.

Yang Tian slightly analyzed the other party's first honeypot device. Then, he narrowed his eyes slightly and said in a deep voice, "the other party's honeypot may be an illusion. The wind rolls. I'll break in first, and you analyze the change of the honeypot. You must be fast!"

The strength of wind roll, invasion, attachment, analysis, decoding.

The voice is backward. Before the wind rolls back, Yang Tian runs the attack input device