Metropolis: King of Hackers!

Chapter 612 : Raise an alarm!

Chu Hao's hands quickly tapped on the keyboard, starting from the main computer operating system at Futenma Base, slowly eroding the operating system's authority.

Although the operating system of Futenma Base is very powerful, Chu Hao is not only the world's top hacker, but also possesses computer technology for the next six years.

Even if Chu Hao became a monk halfway, most of the technology was learned from the Angel Council pseudo-artificial artificial intelligence Abertir, but Chu Hao is also quite powerful!

"Sir, the scan of abnormal data is detected, and it is tracking us!" When Chu Hao was cracking the Futenma operating system, Izuel suddenly issued a warning message.

Chu Hao's heart tightened. Start typing code quickly, disguising your own data flow.

After a while, a data scan across Futenma's internal network found no Chu Hao in disguise. Chu Hao breathed a sigh of relief, as long as he wasn't caught.

"Izuel, continue to monitor the entire internal network. If there is any situation, report it in time!" Chu Hao gave an order and continued to crack the operating system of the Futenma base.

‘F*ck, I have clearly obtained the description of the permission. Why can't I enter the permission group!" Chu Hao thought to himself, and suddenly his inspiration flashed.

A series of code keys were built. When Chu Hao pressed the Enter key, the Futenma base master computer immediately expanded the access rights of the authorization group.

‘Sure enough! It’s a dual-system combined operating system, including Linux. There is Windows again, it's too insidious!' Chu Hao secretly razed it in his heart.

The scope of dual system applications is very narrow. The main reason is that the combination of dual systems is very troublesome. And the degree of confidentiality is no better than a closed system. Therefore, the dual system is gradually eliminated by the closed system.

After entering the authority group of the main computer at Futenma base, Chu Hao first began to secretly search for all users in the authority group. When the situation is not clear, Chu Hao will not tamper with any information of the permission group without authorization.

After all, I don't know the protection status of the permission group. What if the information is tampered with and an alarm is triggered?

When retrieving permission groups. Chu Hao has prevented no less than ten alarms. From this, it can be seen how strict the security settings of the main control computer at Futenma Base are. It's just a user who retrieves the permission group. It triggered more than ten alarms

Once you actually start with the permission group, how many alarms will it trigger?

After a few minutes, Chu Hao finally retrieved all the users of the permission group. In order to prevent the existence of hidden users, Chu Hao repeatedly checked three times to confirm that there are no other hidden users, and then began to analyze each permission user. .

The main control computer of Futenma Base, Chu Hao simply analyzes each authorized user to check the corresponding authorization. Since this is a military network, Chu Hao does not use its own password dictionary to analyze the password of each authorized user.

The analysis method of the password dictionary is to test the possible passwords many times. If the password test is wrong for many times, it is very likely to cause the alarm of the main control computer.

With the corresponding permissions of each 5.1-privileged user, after the analysis is completed, Chu Hao finally chose the highest-privileged user. Only users with the highest authority can call all the automated weapons at Futenma Base.

In order to obtain the highest authority user, Chu Hao began to think about what should be done to obtain the highest authority. According to the analysis of the corresponding code of the permission group, Chu Hao got a message.

Thank you for reading this story at mtlarchive.com. Your support enables us to keep the site running!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like