The Strongest Hacker

Chapter 325: Compare yourself with yourself (Part 1)

Chapter 325 Compare yourself with yourself (Part 1)

Chapter 325 Compare yourself with yourself (Part 1)

The shot of gscsd is what everyone expected, but the position of the shot is beyond everyone's expectations. And the fierce degree of the offense makes the hackers watching gscsd shot a shame, is this a tossing out? Are you sure this is not an organization?

Infected insects have different attack patterns than ordinary hackers. It should be said that infected insects are only optimized to achieve their goals, and they don’t care which method is more ambitious. Because Zhang Yang gave it a part of the right to choose independently, the infected insect instantly distributed all the targets to the four official website servers at the same time, and the first one used was the ddos ​​attack. After all, for humans, you have to direct the ddos ​​attack. For many broilers, enter the command.

But for computers, especially the performance of infected insects can not be maximized, but only this part of the performance is enough. While attacking a computer with ddos, the infecting insects also threw a large number of virus bombs directly to several other official websites. This virus bomb contains all kinds of computer virus variants, including the infecting insects. Child virus derived from yourself.

When the infecting insect attacks, its database records the response of the other party's system and firewall at the same time, and then conducts centralized calculations to analyze the more effective and feasible way. Infected insects are run according to the program, but the hackers watching the battle are full of cold sweat. If these attacks are not from the same ip, these people think that this is a strict organization, not a single person to make a move .

Such a huge attack flow, although it is said that it is unlikely to pose a great threat to the firewall, but it is so. The technicians responsible for the maintenance of the official website server of the three major intelligence departments are immediately in a hurry, and various kinds of pop-ups in front of the computer screen Once the operation is a little slower, maybe this instruction will cause the entire system and firewall to crash.

Naturally, the technicians of such intelligence organizations cannot just be passively beaten, but the simultaneous attack of the infected insects leaves the technicians of several major intelligence organizations temporarily unable to carry out anti-tracking. At present, they can only bear the infected insects*. The US network is surging, but the domestic network is also not calm.

Zhang Yang was also staring nervously at the computer screen at this moment, because all the resources of the infected insects were mobilized in the past and attacked. Zhang Yang couldn’t use the infected insects naturally, he could only guard. But anyway, there is a mother's nest in hand, and almost all of the other's attacks were stopped by Zhang Yang.

Many of the hackers who watched the battles at home and abroad had unusually strange faces. Everyone looked at their computer screens in dumbstruck, watching the official website of the Ministry of Foreign Affairs under the flow of such a terrible attack by the other party, but still guarding the rugged gold soup. The same as the iron bucket.

Where did this l come out? ! Almost everyone's mind turned to this idea with a shocked face! It's too weird. In the past, a gscsd popped up, and now a lsc popped up again. Could it be said that this world master is so worthless? Let’s take a look at what the two men have done. One person carries the three major intelligence organizations of the United States plus a technician from the official website of the Department of Defense. Although the technical personnel responsible for the four official websites are not really elite, But this is so, who would dare to jump out of the world?

No! Only gscsd! There are still a few people with similar strengths as gscsd, but there are not so blatant people, so bright and so dark. The power of the three major intelligence agencies in the United States even shuddered at many hackers, but gscsd did just that!

The Chinese hackers who saw this scene are all excited and start to shudder. Since the gscsd gods have all been eyeing the three major intelligence departments, then we can’t be soft? The intelligence department is gone, but there are many websites of various government departments, and these hackers immediately threw up like a pack of wolves.

But the pervert in China is to carry out an offensive of many hackers who cooperate with rigor, and the defense is solid. At least for now, the attackers have no way to invade the official website of the Ministry of Foreign Affairs. The hackers who are going to stay in the country to help out are also stunned and fascinated. When can they be like the great **** in front of them, just like the legendary Changshan Zhao Zilong, killing seven in seven out of the enemy group!

It is even more powerful to defend the enemy thousands of miles away, and to make the enemy attack invisible, which is too powerful. The excited faces of these hackers sitting in front of the computer were all red, but Zhang Yang's face was so serious that he had no time to be excited. His scanner has been paying attention to several data streams of the other party.

If these people are really ghost troops, then if they can’t be attacked for a long time, they will definitely lose part of their power to hack other government websites, and the honeypots that have been installed in several telecommunications network nodes have sent back messages, showing that there are many American hackers have also entered the country.

You don’t need to think about it because they are attracted by infected insects. Infected insects attack there. American hackers have different ideas from domestic hackers. Some domestic hackers will come to help defend, but American hackers don’t even think about it. , Just rushed to attack.

It's boring to defend, how fun is it to engage in? So these American hackers rushed into it as soon as they discussed it. Anyway, are we also bosses? Just like the United States is claiming to be the boss of the world, American hackers also have a sense of superiority. They all think that their technology is the first in the world, and China, in their eyes, is just a country that was a computer blind spot a few years ago. In their eyes, in a few years, even if China's computer develops again, where can it develop?

In fact, if you are only defending a website, Zhang Yang is not a big deal. After all, the mother nest's self-defense function can already have an unreserved defense system. Even the infected worm has no way to the mother's nest. Even if these hackers are even more powerful, they can be at most one level with the infected worm.

And how does the mother nest say, if the mother nest is used to completely defend, it is actually very abnormal, even if it is a garbage system that does not fix the loopholes, after installing the mother nest, it is like you stripped a beautiful woman. , But found that the beauty does not wear anything else, but underneath is wearing a superb alloy pants, you can see, you can touch, you can tease, but you can’t do anything.

I don’t know if it’s because of gscsd. After these American hackers came to the country, they didn’t attack the portals where hackers usually go. The target is also the domestic government website. But Zhang Yang is now mainly monitoring the traffic on the network.

Just after the Ministry of State and the official website of the State Department resumed normal visits, but these American hackers immediately targeted these two websites again. As soon as these hackers shot, Zhang Yang immediately knew that these two websites were bad and they were going to fall behind So, after Zhang Yang paused for a while, he didn’t even hesitate. He directly used the vulnerabilities of the two website systems to directly hack into the two websites, and then copied the two mother nests into the servers of the two websites. .

At the same time, the mother nest is turned on the centralized control mode. The so-called centralized control mode is actually like the ant population. The queen can control all the ants, and then each ant is a separate avatar, expressing a collective wisdom. The centralized control mode of the mother nest is similar to this.

In fact, the functions of each avatar of these mother nests are the same, but during centralized control, Zhang Yang issues an instruction, and the branch systems of these mother nests will be received, and then exchange information, such as Zhang Yang issued the mother nest avatar a An instruction to reject all illegal access requests. Then mother nests b and c will also receive this information, and will exchange information with mother nest a. Once b and c find that they have the same illegal access request as mother nest a, mother nests b and c will Immediately execute the rejection automatically, without Zhang Yang giving the order again.

These two websites were attacked, and the hackers who watched the battle naturally saw it, but before they responded, they found that some American hackers who had made progress were kicked out again, and these domestic hackers also tried to scan. After a scan, they found that the two websites were exactly the same as the website of the Ministry of Foreign Affairs, with one iron bucket, and even the methods of refusal and defense were exactly the same.

Needless to say, it must be l. Before the domestic hackers started to be surprised, the mysterious American hackers also discovered this matter. In their view, since this mysterious avatar hacked into the other two websites. Then the defense of the website of the Ministry of Foreign Affairs should not be so strict. This group of mysterious American hackers immediately returned to the website of the Ministry of Foreign Affairs again, stepping up the invasion of the website of the Ministry of Foreign Affairs.

But the results of the invasion surprised them all. There was no result of their invasion, and the opponent's defense was still watertight. Is it possible to defend several websites at the same time, the other party can still achieve such a terrible defense? Although they knew that the defense must not be operated by one person, they must have installed a new type of firewall.

But even if it is a firewall, some commands require human operation, and it is impossible for the firewall to monitor all actions against the system. Then part of it is bound to be distracted to control, but at the moment the opponent defends the three websites without any problem?

This group of mysterious hackers immediately began to divide their troops after suspending the attack, but they did not go to the official website of the Ministry of State and the State Council, but began to hack other departments, such as the National Development and Reform Commission, and the official website of the Ministry of Education. That is to say, any government website is the target of their invasion.

Their response speed is fast, but Zhang Yang's response is not slow. The above server systems use the same system. This system has been modified by the Institute of Computer Research of the Chinese Academy of Sciences. Because these systems are very unified, Zhang Yang can use the same system vulnerability when he hacks into each system. .

But the firewalls of these systems are not the same. Whether it is a mysterious hacker or a hacker who comes from the United States to fight soy sauce, they still need to analyze the system before they can choose the method of attack, but Zhang Yang does not. What Zhang Yang needs to do is, when they attack a target, Zhang Yang directly hacks the target in advance, and then copies his mother nest into it, and then directly adds the mother nest to the centralized control mode, and then ok.

Soon, the other party's attack targets spread over more than 20 government websites, and even some government websites that used soy sauce were attacked, but it was still useless. Each website still defended like an iron bucket. This time, the entire network is completely crazy. Who are these people?

Does it mean that the Martians invaded? Otherwise, a gscsd is enough to be perverted, and an equally perverted l comes up at once? Many people's heads are a little illusioned. Is this the situation of the **** horse? ! At the moment there is a black eagle among the people with ill minds.

Blackhawk smiled bitterly and looked at several large screens in the hall of hundreds of square meters. This is the data center of the National Computer Emergency Response Center. All the staff of Blackhawk and their entire branch were mobilized here because of the inexplicable outbreak of China and the United States. Hacker Wars.

It has been more than two hours since the emergence of the two sides to the now hot ~www.wuxiahere.com~, but at the moment, the scene is indeed very strange. On the American side, gscsd and many Chinese hackers are crazy, the difference is that all People’s eyes are focused on the battlefield of gscsd. After all, everyone knows that when the three official websites of the world’s largest intelligence organization are attacked by gscsd, then it means that other websites of the US government are like *The film is the same, it will be broken by gscsd.

And domestic... The situation in China is even more weird. There are several documents in the Black Eagle hands that make Black Eagle cry and laugh. The situation in China is exactly the opposite of that in the United States. At the moment, there are many American hackers gathered in the country, but they are like I ran into a thick iron plate and couldn't poke it in.

To be honest, this l is also perverted enough. Black Hawk does not have a very good way now. L is quite good, but the problem is that l is too good, and they are close to the national security that the Black Hawk they transferred, * etc. All network elites in several departments have nothing to do.

It is also true that there were not so many maintainers, staff and technicians on the website of government departments, but at the moment, they accepted all their work in the past, and they are now like those who look lively on the periphery. Like hackers, they have become onlookers of unknown truth.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like