Chapter 2 002. Robbery of Overseas Gaming Sites

After a day of tossing, when Lei Luo got all the daily necessities and lay on the bed comfortably, he found out sadly that there was no money left, and the last one hundred yuan bill on his body had been charged to the meal card.

“It seems to be making money”, Lei Luo thought for a while and quickly entered the system.

There happens to be a fixed task in the system. If you earn 5 million, you can get points. Isn’t this just right?

But isn’t 5 million too small? If someone else brings the system to life, it’s only a few hundred million. My own goal of 5 million is too small.

“Calm down, now is not the time to swell, wait until the money is available,” Lei Luo secretly warned himself. How to make money?

“How about hacking into the bank to get some money?”

“No, the security level of the bank is too high, and your own LV-3 hacking technology may not be able to handle it.” Lei Luo rejected it, and it also broke through his moral bottom line.

“By the way, go to hack a foreign gambling site. The security level should be very low.” Lei Luo thought for a while. Now that the 1998 Football World Cup has just ended, the final between Pakistan and Herzegovina against FR has fallen everyone’s glasses. .

It is generally believed that Pakistan and Heihe put water to play counterfeit matches, so everyone is generally dissatisfied with the betting website because they have lost money.

In this case, a personal computer must be built first. This is a must.

Lei Luo clicked on the system store, searched for personal computers, and immediately displayed computers of various brands and configurations:

China has the largest number of companies in the country, and Chang’e 20003000 series have more. The configuration is the X86 chip of the US Int company, which was already the top configuration at that time.

There is also an American IB company, but it is mainly a commercial machine. It is better to be a server. For the time being, Lei Luo can’t use it.

Just Chang’e 3000, CPU: IntX86, RAM: 32M, hard disk: 500M, operating system: windows98

Lei Luo chose the highest configuration, and the memory was only 32M. In 2010, the memory had reached at least 1G, which is equivalent to 1024M. Nowadays, the computer is very low, but there is no way, use it, anyway, the system gives away Points to purchase.

Lei Luo took a look at the points he needed, only 200, and he didn’t hesitate to redeem one.

“The purchase is successful, please enter the space warehouse to view”, the system pops up a prompt.

Lei Luo hurried into the space warehouse and saw that he had a brand new computer. Lei Luo plugs in the network cable and can go online.

Lei Luo booted into windows98, checked the network card information, and found that the ip address was actually an overseas address.

“System 666, this computer is directly connected to a foreign country, so you won’t have to go over the wall to find pornography in the future.” Lei Luo smiled happily.

Internet control in China is very strict. Foreign adult websites and some illegal websites are not allowed. If you want to go to a foreign banned website, you must go through a specific proxy server, which is called circumvention of the wall by industry insiders.Now Lei Luo directly accesses the Internet from an overseas address, so this problem does not exist.

Lei Luo had always been a virgin in his previous life and couldn’t find his girlfriend. Looking for a woman outside was afraid of spending money and getting sick, so he often talked about AVs. So now he can just go to foreign adult websites, and I can’t help but want to go check it out.

“Calmness, calmness, don’t get overwhelmed. The first priority now is to make money. It is not good for your health. After you have money, it is healthier to find someone to do two-person exercises,” Lei Luo quickly reminded himself.

To hack a website, in addition to having corresponding hacking techniques, it also takes a lot of time, such as cracking the other party’s password. If the other party uses the most advanced ASH-256 algorithm, it will take a very long time to execute if the other party uses the most advanced ASH-256 algorithm to crack it.

Some people say, you can wait, anyway, you are very free now. But there is a good saying, don’t wait for the young man’s head to become blank, empty and sorrowful! Lei Luo is now bringing the system to rebirth. Of course, it’s not time for me to wait. I can’t wait.

On the other hand, what if the cracking time is 1 year? 10 years? Do you have time to wait?

At this time, you can use the function of hacking technology acceleration. I’m not too anxious now, I still can’t wait for a minute-level cracking.

Lei Luo took a look at the system mall and purchased [Hacking Technology Acceleration Minute Level]. After spending 1,000 points, he still has 600 points left. Now Lei Luo has become a junior hacker, and it is a relatively fast one.

As for the [hacking technology acceleration in seconds] is not available now, I don’t think about it, and Lei Luo can’t afford it now.

In 1994, the first generation of real Internet-based search engine Lycos was born, which is mainly based on manual classification.

The feature is that various directories of websites are manually classified and stored, and users search for websites in a variety of ways, and this way also exists now. It is currently the core product of Yahu.

I did a penetration test on this website, and found that the security level was very low and there were a lot of vulnerabilities. Lei Luo logged in directly through the telnet protocol.

The operating system of this website is AIX (UNIX operating system of American IB company, the most powerful server operating system at the time), and the database adopts DBTo of IB company. It’s a horrible thing to be the database of a betting website.

Thanks to the bonus of [hacking technology acceleration minute level], the above operations will be completed within a few minutes.

When Lei Luo was doing software development in his previous life, he used this operating system and database. So it’s easy to drive.



Then type in a list of commands to clarify the physical structure of the entire betting website:

WEB server adopts Tomcat, adopts Java+JSPServlet development, database DBTo.

Lei Luo did not know much about this Java development language project, and soon found the database user name and password in the database configuration file of the website.

When the time comes, website maintainers will naturally understand.

In a previous life project, Lei Luo encountered such a situation. A project that was running online suddenly failed to run. As a result, it was found that the database was cleared and the name was changed to a qq number.

Then the company quickly contacted this qq, and the other party asked for 2000 yuan. The company has no choice but to pay.

Bet10000 is a gaming website in the EN country. Smith spent a lot of money to get the operating license. I hired IB’s most powerful engineer to develop the website. It has been in operation for a year and revenue has increased steadily.

“BOSS, you really have a vision. Now bet10000 is already well-known in the world, and its current revenue has reached 5 million EN pounds.” The secretary blonde Linda reported to Smith.

Smith’s recruitment secretary has one condition: working secretary during the day and living secretary at night, so as Smith’s secretary, I am really busy.

“Really? Hurry up and hold a company-wide commendation meeting. I want to announce this good news to everyone.” Smith is also very proud. He paid a lot of money to find a gaming website built by an American IB engineer.

And not long ago, I also found a network security company to conduct security inspections for the company’s website. The inspection contract alone was 200,000 EN pounds, and he assured him that the current hacking technology on this website could not be breached at all.

Before the blonde secretary went out, the phone at Smith’s desk rang. After Smith answered, before he could finish listening, he snapped the phone to the ground and scared Linda.

“Our website has been hacked. Call the cybersecurity company. Hurry up.” Smith was furious. He only did a security check yesterday and was hacked today. Is there such a slap in the face?

But here Lei Luo heard a moving system voice:

Congratulations, your business activities are successful, and you can earn points +500

Lei Luo was taken aback, what’s the situation? This is also OK? This is a bonus. Cool…

Hawkins, the CEO of a network security company in the EN country, was also shocked when he received a call from Linda. He sent a junior security engineer to save money yesterday.

It seems that I have to let Carlos go and have a look today. He has full confidence in the company’s partner Carlos. He is the company’s technical director. This little problem can definitely be solved.

After Carlos logged into the bet10000 website, he did a detailed penetration test and security check, but found nothing. They have done everything they can, but in the end it still doesn’t help.

In fact, this is a difference in the advanced nature of the technology. They used the technology of 1998, while Lei Luo’s black technology has borrowed a lot of technology from later generations.

The two are not on the same starting line at all. After rechecking again for a day, but still did not find the problem, Carlos had to quickly inform Hawkins, Hawkins looked depressed, just now he promised that there would be no problem.

Congratulations, your business activities have been successful in face-and-two consecutive beating, points +1000

Lei Luo was taken aback, then came again? Of course welcome, the more the better

When Smith confirmed that there was nothing he could do, he had to start contacting the email of that database name.

It didn’t take long for Lei Luo to receive an email from this gaming website:

“Please restore our database immediately, otherwise we will call the police”, Smith’s first email, it was domineering.

“Then call the police.” Lei Luo is not afraid. He was originally a registered mailbox overseas, and he couldn’t be traced to him at all, and after this time, Lei Luo will not use this mailbox anymore.

Sure enough, it didn’t take long before there was another email over there:

“How do you want to solve it?” Smith had to compromise, because the entire company’s phone calls had been blown up by betting users. If he couldn’t solve it right away, he would even go downstairs today.

“800,000 EN pounds”, and then Lei Luo also wrote a bank card number generated by the Shenhao Black Technology System [Assisted].

“Too many, you are too greedy, aren’t you afraid that we will find trouble in the future?”

“I’m afraid the customers of the entire website are asking for your trouble now? Are you free to find me?” Lei Luo replied with disdain.

“We will call the police, aren’t you afraid?”

“Do you dare? Your database contains a lot of data that the police are interested in.” Most of these gambling websites have records that help money laundering.

If Lei Luo is pressed into a hurry and sends the database directly to the EN national police, they will be in big trouble. So Lei Luo has eaten them, want to call the police? Who is afraid of whom?

After a few emails, Smith finally compromised, and Lei Luo’s scum bank card had 800,000 EN pounds.

“Bingo, we are also rich.” Lei Luo cried out happily. Fortunately, the other 5 people in the dormitory had already fallen asleep, but they didn’t disturb them.

The exchange rate between the EN pound and the Chinese currency is 1:8.8, and the 800,000 EN pound is more than 7 million yuan. In 1998, when most civil servants were only a few hundred years old, they were absolutely rich.

“Congratulations, your income from this business activity exceeds 5 million, points +1000”

“Commercial activities? It’s obviously a robbery, the system is good or bad.”

“Huh, there is an email?” Lei Luo realized that there was another email.

“We want to hire you as a security consultant for our website, do you think it is okay?” Smith has an advantage, that is, he is in business.

It’s good to spend money to achieve your goal, and you will never get angry because of this. So seeing Lei Luo’s powerful hacker ability, of course I hope to hire him as a consultant.

“What’s the treatment?”

“An annual salary of 200,000 EN pounds, do you think it’s okay? How about paying half at the beginning of the contract and half at the end of the year?” Smith also has his own careful thinking, leaving half of the payment until the end, so that Lei Luo can be caught. , Will not just take money without doing things.

Although 200,000 EN pounds is still a bit painful, compared with the current website’s 5 million EN income, it is just a drop in the bucket.

“Deal (deal)”, Lei Luo feels like the underworld is collecting protection fees. Originally, he only wanted to grab a single order and leave, but now he has collected annual fees.

Hey, let’s make it hard for once, brother really didn’t mean it!

After a while, Lei Luo added another 100,000 EN pounds in his account, which is equivalent to 8,000 or 900,000 yuan in China.

Lei Luo is also a trustworthy person, and quickly restored the database for him and cleared all security loopholes for him. Of course, a copy of the database will be kept for sure.

“Sleep, buy, buy and buy tomorrow.” He didn’t expect to earn the first pot of gold and the second pot of gold in his life so easily. Lei Luo fell asleep in infinite vision.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like