Metropolis: King of Hackers!

Chapter 145 : ip address spoofing!

For example, on WEB servers, external users are not authorized to enter the military zone.

"The intruder disguised his computer as a legitimate user on the network, so that he successfully deceived several checkpoints and firewalls in the network. He must have thoroughly analyzed and studied firewall technology, using loopholes in firewall configuration or design, And attack them"

"IP address spoofing?" Professor Martin was even more surprised. He had known this clever intrusion method, but he had only read the theoretical explanations in this area, and had never heard of anyone successfully practising it. It seems that this thief is really not easy!

Luss nodded. They conducted a thorough inspection of the computer again, and found no other clues. All the log records were legal.

"It looks like this case is going to the arrogant boys." Luss thought in his heart.

"Wait!" Professor Martin called out suddenly, "Why is there still data exchange?"!" He opened a data exchange monitoring software, and found that the data exchange on the computer was unusually frequent at this moment.

"Fuck!" Luss immediately disconnected the network after seeing it. He didn't expect that the intruder would go and return, and now he was still copying files under their noses, which was simply a great insult to them. Of course, this is also their negligence. Up to now, they have forgotten to disconnect the computer's network connection and commit such a low-level mistake.

It's really unforgivable.

"What is this?" Assistant Andrew asked, pointing to a file on the monitor. He hadn't seen this file just now.

This is an encrypted file, but Luss did not spend much time to crack it.

"Ha, did you finally find it? You idiots! Stupid terminator.

Provocation! Chi Guoguo's provocation!

All the people present, with Professor Martin’s research assistant Andrew, were full of indignation, especially the grumpy Professor Martin. At this moment, his muscles were bulging and his breathing was cramped. Eventually, he couldn't stand the irritation and had an asthma attack. He tremblingly took out the nozzle, and it took a long time to get rid of the breath.

At the same time, Professor Martin also has a deeper worry that this person's invasion method can cause a very terrible threat.

We must know that many scientific research institutions and universities in the United States now use this method to save important information. Face the danger of being stolen!

Professor Martin is already considering reminding the relevant departments of this potentially huge threat.

In this way, the hacking case was handed over to the network security affairs team led by Kevin. The next day, Professor Martin’s computer was sacked by a group of cool guys, and then moved away, even with (Li Lihao) their LAN router. Of course, before that, Professor Martin had backed up all the important files.

The intrusion method of "々Stupid Terminator" has been found out. It is IP address spoofing. This kind of intrusion method is no stranger to Kevin. IP address spoofing is the most commonly used method to break through the firewall system, and it is also a series of other attacks. The basis of the method. The principle of this attack method is based on 1's own shortcomings.,

Thank you for reading this story at mtlarchive.com. Your support enables us to keep the site running!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like