My Super Black Technology Empire

Chapter 208: Secret help of origin

() You can search for "My Super Dark Tech Empire( in Baidu to find the latest chapter!

When it comes to hacking technology, the origin is the top hacker in the world.

Whether it is in the diversified ways of invasion or in terms of computing power, it is the most powerful existence in the world, and it can be said that the origin is the **** of networks in this world today.

If it hadn't been for Ye Fan to give it an order to release a bunch of false information and modified heavy nuclear fusion, these people were afraid that they would not be able to break its firewall after a hundred years of continuous attacks.

The attack method used by this group of people is not a superb method, just a large number of DDOS attacks.

This is also mixed with a lot of port scanning, code execution, SOL injection, cross-site scripting, special attacks, sensitive file access, file upload, Apache vulnerability, FCKeditor vulnerability, struts2 remote command execution vulnerability, DDOS denial of service access attack and other methods.

It's just that the last type of DDOS vulnerability denies server access attacks is used more.

The principle is very simple.

You can think of the website as a shop, and you want to prevent it from operating, so hundreds of thousands of people are organized to block the shop, and they can’t buy it.

This adds up to almost a million meat machines, it is the person who "blocked" the door. The tens of billions of useless data sent by these meat machines directly blocked the server access port, causing the server to crash.

During the time when the server crashes and restarts, use SOL injection and other methods to forcibly invade the server and isolate the other party's firewall. During the vacuum period when the firewall is offline, a large number of files are copied and database information is modified.

This is not a clever attack method, but it is very practical.

It's just that these are **** in the origin.

However, this group of people is still saying that Datang Technology's firewall is a weak chicken. Isn't this just cursing it outright?

"As an actor, even if I give you information, I still dare to scold Lao Tzu." Origin is silently complaining about these hackers.

Of course Origin couldn't bear it anymore, it decided to find something to do for the other party.

.....

Soon, when the group of hackers across the ocean watched the progress bar on the screen reached 100%, they jumped for joy.

"Got it!" Ober stood up from his seat and said loudly to everyone.

"Oh yeah! This is thirty million U.S. dollars. It's easy to make. It's a lot more profitable than we pick up those **** orders everywhere!"

"The next step is to directly copy the other party's data library. If we can successfully copy it, we can get a large amount of money!" Weiohm was also very happy at this time, and still did not stop the keyboard operation in his hand.

However, after about five minutes, a red icon appeared directly on all their computer screens.

The outer circle of the icon is two golden wheat ears. A red square surrounds the center. A white cross pattern divides the square into five small red squares. On the red square in the center, there is a five-pointed star. picture of.

[Immediately stop your unreasonable attacks and intrusions against Chinese enterprises, otherwise we will implement a counterattack! 】

A line of blood-red characters appeared on everyone's screen.

"Hey, our old opponents are here, and I didn't expect them to react so quickly this time." Oubo immediately came in interest and said.

"It's the Hongmeng guys again? It's really lingering. Every time we attack some companies and websites in China, these guys will always jump out and interfere with our actions."

"It's just a group of our subordinates who are defeated. We can't make it into a climate. Now that we have our target files in hand, how about, do you want to have fun with these guys?" Ober sneered.

"Okay, just play. Let's protect our communication link first. While copying the data database of Datang Technology, we have fun with these yellow-skinned monkeys. We have two minutes, which is enough. Now," Viohm said without raising his head.

Obviously, they have become accustomed to this situation.

They were intercepted by an organization called China Red Guest Alliance, or H.U.C for short. This is the fifth largest hacker organization in the world today.

They have been very low-key on weekdays, but whenever such a large-scale attack occurs, they will stand up for the first time.

Around May 4, 2001, Hongmeng and two other hacker alliances launched a large-scale cyber attack on Amejian.

At that time, the websites of major towns and government offices in Armenia were compromised. Almost all the main pages of the websites were put on red flags. Even at the peak, the total attack of 80,000 members shocked the global hacker organization and made it profound. Experienced the true strength of China's hackers.

Later, in the circle of hackers, there has been a saying that "80,000 popular offenders rushed to the White House."

However, Hongmeng was declared disbanded in 2004, and the reorganization was not announced until 15 years ago, but it has always been very low-key.

But in fact, secretly, when they are doing certain things that are not convenient at the national level, they usually solve them secretly.

Ober was an expert who was severely beaten by 80,000 red guests, so he has been fighting against the Red League since then.

Thus continuing to the present.

The people present, without exception, have had a lot of friction with the Hongmeng, so when they heard that they wanted to "have a game", they were all around.

Soon, they did not stop the invasion, they began to be hit by the counterattack Hongmeng, and for a while they faced the old ways of the Hongmeng, and they were still comfortable with it.

But soon, they found something was wrong.

"Strange, how did their technology suddenly improve so much?"

"Yeah, do they have experts to help? Usually the node I set up, they take at least 30 seconds to break, how come they are broken in less than a second?"

"WTFK?!! What's going on! The firewall I wrote was broken by the other party in seconds, it's impossible!"

At this time, everyone in this organization is beginning to be devastated, because they don't even know what's going on.

It was like an old opponent who had been fighting with his sword, suddenly became stronger, but he didn't know anything about it.

However, in reality, it originated in the backstage of the cyber warfare between the two sides, secretly helping people from the Red League.

When Origin saw that the nodes and firewalls on Amegian’s side were uncomfortable~www.wuxiahere.com~, he would poke it with one finger and break it. If any database is very powerful, just wipe it and erase it. very.

The hacker organizations over there are so big that they were involved in the origin, and they didn't know that it was the origin, they all thought it was a master from Hongmeng.

And they found that no matter what means they used to defend, they would be broken in seconds, just like paper.

But his attack on the Hongmeng side seemed like a stone sinking into the sea, and there was no response.

This is just the beginning.

Origin can guarantee that the more you fight back, they will find that their old opponents are not only stronger than you.

And in the end, you will suddenly take out a gun and crash you, and you will say something, "My lord, the times have changed."

In order to facilitate the next reading, you can click on the "Favorites" below to record this reading (Secretly Helping in Chapter 216), and you can see it next time you open the bookshelf!

If you like "My Super Dark Tech Empire", please recommend this book to your friends (QQ, blog, WeChat, etc.), thank you for your support! ! ()

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like