hk054 seems to have met First Grade Zombie

essCompany, Xia Nation is called Access Company and was founded in 1984. Headquarters is located in Wo Sang Nation Tokyo City. It mainly involves management consulting, software development, mobile network services, and Waiting for Internet browsers!

essCompany’s flagship product omfront browser, the number of mobile devices in Wo Sang Nation, is quite high!

The network-based company, in order to use the name of Supercomputer Swallow, looked to Tokyo University of Technology and applied for the lease of Supercomputer Swallow.

After finding this message, Shi Lei immediately searched the Access Company’s website homepage through the Internet Search Engine. From a company’s website home page, you can know a lot of things. For example, the recent status of the company, such as the company’s financial statements, or even the company member’s personal password, etc., can be seen from a company’s home page!

Shi Lei goes to the Access Company’s home page and looks at the company’s current situation. The company has a good development potential, especially the partner of omfront browser, which is actually the two giants NTT and Sony. [

After a while, Shi Lei tried to scan the flaw of the Access Company home page to get inside the website. As the company of tIndustry, the Company’s Company home page of Access has its own independent server instead of the leased network service provider.

Shi Lei identified the Server’s System and immediately drilled into the Server from an unreleased flaw. The Server of the Access Company home page holds a large number of files. Shi Lei looked around and finally found the thing he was interested in.

Access Company rents Supercomputer Swallow’s system resources is very small, they have a powerful Server, the reason to rent Supercomputer Swallow, just for the popularity of the company!

Shi Lei found the Supercomputer Swallow Signed In account and the login password inside the Access Company’s webServer. Originally, Access Company announced the account and password of the rented Supercomputer Swallow to each of the Company’s High Grade employees. Feel free to use the part of the Supercomputer resource that the Company rents. This is not the Access Company’s generosity, but their own research project, which is in a confidential need and cannot be sent to Supercomputer Swallow for processing, but is reluctant to waste Supercomputer Swallow resources. So, let High Grade staff, free to use Supercomputer Swallow resources!

Originally this was a benefit of Access Company, but now it is a convenient channel for Shi Lei to invade Supercomputer Swallow!

Shi Lei in the Access Company’s webServer, browsed it all the time, in the heart and thought about it, decided to use the Access Company’s Server, as the First Grade Zombie, officially ready to invade the Supercomputer Swallow!

Access Company’s Server, great!

This company has five Core Servers, which form the Server group. Each Core Server has a computing speed of 02Trillion times. The computing power of the entire Server group has reached One Trillion times per second. EQ uivalent to One Small. -scale Supercomputer!

In 2006, World Supercomputer Ranked, the calculation speed of Fifth, was only 27Trillion times. Also in other words, the Access Company’s Server group is definitely in the advanced ranks on the World!

After deciding to use Access Company’s Server, Shi Lei began to invade the Access Company. Because Access’s Server group reached the level of Small-scale Supercomputer, Shi Lei carefully controlled the Number One Server and scanned the open interface of the other Server group.

Shi Lei has invaded the Access Company’s webServer, but the webServer is only used for the Company home page, and stores some unimportant file data. Company’s Core data, all of which exist in five Core Servers, the server group!

The speed of the Number One Server is ultimately unsatisfactory, and Shi Lei can’t help but secretly, but can help!

While waiting for the results of the Number One Server scan, Shi Lei is on Fantasy, and in a sci-fi novel, a broken notebook can black out the Satellite’s Exceed Grade ability. If he also has the ability to fight against the sky, how good it should be!

In Hacker’s behavior, intrusion, acquisition, and control are different meanings. For example, a server that stores confidential files does not invade into the server and can get confidential information.

There are a lot of authority settings in the same server, and confidential files are usually added with separate passwords. Therefore, even if you get a confidential file, you don’t necessarily get a secret, you also need Password Decode.

As for controlling a server, it is the most difficult! It is extremely difficult to get Controlling Right of a Server, especially the Controlling Right of High Grade Server!

The performance of High Grade Server is very powerful and it is very cool to use. But the same, High Grade Server’s Safety Strategy, Server FIRE wall, is even more difficult to fix. And, Safety On-duty Personnel!

Although Shi Lei knows a lot of Server System, the unpublished flaw, but it is not to do as one pleases, whoever wants to be black is black. Every time a Hacker intrusion happens, a network link must be established. Once the network link is established, it will cause data communication. If the High Grade Server’s Safety On-duty Personnel is ready to observe the data flow, any anomalies will be discovered. For example, the Server is likened to a pool filled with water, and the network link is like an outwardly connected water pipe. When the server is under normal conditions, there is no data exchange, that is, when the water pipe does not flow outward. If Hacker sneakily added a water pipe to the flaw, can the Safety On-duty Personnel not find water leaks?

Number One Server slowly scanned out the Access Company, the Server group interface was open, and Shi Lei was thankful for the flowers. After finding the appropriate interface, Shi Lei directly uses the Access Company’s webServer to simulate the internal communication of the Access Company and request access to the Server group. [

After the server group receives the request from the webServer, since both parties belong to the inside of the Access Company, the FIRE wall of the server group does not block the request of the webServer, Shi Lei sneaked into the server group through the unpublished flaw through the normal request!

After entering the inside of the Server group, Shi Lei did not act rashly, but began to probe the FIRE wall of the Server group. If you don’t fix the FIRE wall, I am afraid that Shi Lei will just clean up the authority group, and the FIRE wall will issue an alarm!

Shi Lei analyzes the FIRE wall with the Number One Server and manually spies. Access’s FIRE wall, apparently not the masses on the market, is commissioned by Network Security Company, the custom-made FIRE wall system.

Borrow a word from Hacker World, free FIRE wall, defense effect EQ ual to zero!

It took nearly two hours for Shi Lei to basically understand the situation of the FIRE wall. Access’s FIRE wall is actually provided by the Norton Company!

Previous life, Shi Lei deliberately studied Norton’s FIRE wall, and each of their products, Shi Lei is very familiar. Although the Access Company’s FIRE wall is a Norton custom-made product, its source code is also based on the Norton series.

Shi Lei wrote a malicious program inside the Server group, ready to puncture the FIRE wall and disable the FIRE wall!

The best way to fight a FIRE wall is to accurately as stated. Like Shi Lei, master the Server System Flaw, enter the Server, and destroy the FIRE wall from within the Server.

After all, the FIRE wall has a strong defense force, but the defense power inside is relatively weak!

After spending ten minutes, Shi Lei compiled a malicious Trojan Horse for the Norton FIRE wall and then began to destroy the FIRE wall from the inside. The special custom-made Norton FIRE wall, still unable to get rid of the Norton model, the malicious Trojan Horse written by Shi Lei, strangled from the inside!

The function of the FIRE wall was gradually replaced by the malicious Trojan Horse, and the whole process was heard, which did not attract the attention of the Safety On-duty Personnel.

After the malicious Trojan Horse strangled the Norton FIRE wall, the method detected the Signature Code of the Norton FIRE wall and started self-Destroy, which was cleared from the server.

Shi Lei put his hands on the keyboard and smiled. He didn’t think that, even so smoothly, he got the Norton FIRE wall!

After typing a few lines of code on the keyboard, the authority user inside the Access Company Server group is listed on the Shi Lei’s computer screen.

On the clear side, the Server group has only three Super Authority users, and more than ten authority users at all levels of large and small. Shi Lei carefully continues to tapthe code to inject the authority authentication System of the Server group.

After a few moments, on Monitor, two accounts are displayed again. The authority of these two accounts is still on top of the three Super Authority users!

“Your Mother, actually as insidious as the Big Brother Stone, likes to hide the real Super Authority user!” Shi Lei’s face was disdainful.

Hiding the real Super Authority user is quite common in High Grade Server. If the Hacker is a little bit of a dish, invade the High Grade Server, and obtain the Super Authority user on the bright surface, it will start to do nothing, establish your own Super Authority user, and it will be exposed in a flash!

Shi Lei found out the Access Company, the real Super Authority user hidden, but he did not move the two Super Authority users, nor did he set up his own Super Authority user. Instead, start compiling code, taking over the original Authority System in the Server group System.

If you use the original Identity System in the Server group System, create a Super Authority user, even if it is hidden. Once the Access Company’s Super Authority user checks the server’s authority user group, it also exposes the newly created Super Authority user, which is an intrusion exposure.

Therefore, Shi Lei needs to establish a new set of Authority System, grafting instead of the original Authority System in the Server group. In the new Authority System, the two hidden Exceed Grade users on the surface are still Highest Authority. But in fact, Shi Lei will create a higher-level Super Authority user, hidden in the System.

Due to the use of the new Authority System, even the original two Super Authority users, completely check the Server situation, as long as they do not find the Identity System replaced, they can not find the Shi Lei hidden Super Authority user. In general, the Safety On-duty Personnel does not doubt that System is replaced at all. [

Because replacing System is definitely a difficult task, and only World Summit Grade Hacker like Shi Lei can do it!

Ps: distance ticket target, still a little bit, but Shanshan believes that you can arrive!

Tickets~ There are no friends to collect, you can collect them! Ask members to click and help Shanshan to click on the list!

Seeking rewards, asking for comments, asking for a review in the book review area!

In addition, only one person in the last small event won the prize, and a couple of lovers were left. If anyone needs it, the book review area will post a message, we will open another small event, this time with an eight-digit Tencent, or seven. The number of digits yy! There is a need, the book review area is awkward~

[Thank you for your appreciation] If Sakura blows snow, reward 588