HacKer
Chapter 1138: Big Penguin? Hardware level vulnerability!
.
At 9 am on June 28th.
Shi Lei repeatedly investigated the clues that supercomputer lightning was invaded. Originally, he thought it was an internal crime, but through the security monitoring system, it was determined that there is no internal crime conditions.
After excluding internal crimes, Shi Lei was only helplessly accepted, supercomputer lightning, and was externally invaded. Moreover, external intruders, with unknown means, bypassed the external defense of the endless defense system, and the verification of the clothes, directly into the interior of the supercomputer lightning.
Shi Lei is very confident in the endless defense system and the clothes. According to Shi Lei’s prediction, even the first giant of the Angels’ Parliament cannot break through the defense of supercomputer lightning.
What kind of hacker is it that breaks through the defense of supercomputer lightning?
"The sorcerer, logically infers the identity of the invader." After more than an hour of investigation, Shi Lei still found no evidence, only the dead horse as a living horse doctor, and ordered the logic of the invaders.
Logical reasoning hacker identity information mainly relies on judging the intruder's operational command characteristics to determine possible identities.
"Sir, according to the logic of the system, the intruder may be a big penguin company." Yi Zhuer said a possible answer.
Shi Lei's brow wrinkled, and the technical strength of Big Penguin Company, Shi Lei is clear, they can never bypass the endless defense system and enter the super computer lightning.
If Big Penguin has such technical strength, they are competing with Dream Entertainment. Not too bad to be defeated!
“How high is this possibility?” Shi Lei asked.
"I can't give accurate data, there is no benchmark. There is only one answer to the system logic reasoning." Yi Zhuer could not answer Shi Lei's question, and this question could not be specifically digitized.
Shi Lei licked his temples. Although he did not believe that Big Penguin had such technical strength, he was still preparing to investigate, at least this is an evidence clue.
In language, you can despise Big Penguin, but in action, you can't take Big Penguin too flat!
"Jie Shier. Integrate IWN secret network resources!" Shi Lei operated the No. 1 server and obtained the resources of the IWN secret network. From a second-level webpage owned by Big Penguin, he entered the internal network of Big Penguin.
The booths laid by the Big Penguin Company are a bit large, and with the strength of Shi Lei, they easily break into their internal network. In the internal network, Shi Lei ordered the clothes to be stunned. Query information about lightning bolts in supercomputers.
If Shi Lei asks for himself, it is as difficult as finding a needle in a haystack!
About two minutes later, the clothes issued a reminder that abnormal information was found in the internal network of Big Penguin.
"Sir, found suspicious connection IP address system record log. After system comparison, the connection IP address is the supercomputer lightning network address!"
The prompt of the clothes, let Shi Lei a glimpse, the screen of the No. 1 server, popped up to a display interface. Shows the system log information obtained from the internal network of Big Penguin.
Looking at a server of Big Penguin. Directly connected to the supercomputer lightning, Shi Lei's expression is a bit strange.
“Is it really a big penguin company?” Shi Lei said to himself, and he found the server of Big Penguin, and the evidence of accessing the supercomputer lightning. Shi Lei also began to suspect that the invasion of supercomputer lightning and the big penguin Company related.
Shi Lei personally investigated the system log of the server of Big Penguin, the internal network. Shi Lei looked very seriously, although the previous system log was removed by the system. However, Shi Lei extracted most of the system log by deep disk recovery technology and fragment information integration technology.
By analyzing the system log, Shi Lei found a suspicious place.
That is, Big Penguin's server, although directly linked to supercomputer lightning, is not a source of intrusion, it is just a transit server, which is a broiler server.
Long before Shi Lei investigated Big Penguin, the server of Big Penguin had been invaded by other personnel. If it is not Shi Lei's data recovery technology is sufficiently sophisticated, most of the deleted system log information is restored. Then, the Big Penguin Company will be properly framed, and Dream Entertainment and Shi Lei will only smother the Big Penguin Company and will not continue to investigate.
‘Insidious guy! ‘Shi Lei’s heart was cold, and based on the server of Big Penguin, he began to investigate the black hand of the big penguin company.
Shi Lei does not think that the other party is so expensive, just to frame the Big Penguin company. In this strange invasion, Big Penguin was only lying in the gun, it was just a blind eye behind the scenes, trying to interfere with the stumbling block of Mi Rui Technology's post-mortem investigation.
The hackers who really invade the supercomputer lightning are still hidden in the fog!
‘What is it? Although the Big Penguin company is not very powerful, it is not a cat and a dog can bully. The other party can control the server of Big Penguin, as a transit springboard, but not discovered by Big Penguin, but also deliberately leave the connection IP address as a trap, this guy is definitely not simple! ’
Shi Lei’s brow has become a word of 'Chuan'.
If you want to play Big Penguin between applause, you need at least a world-class hacker. However, if you want to invade the supercomputer lightning without a sound, Shi Lei does not know, what level of hackers can do it.
The world's peak-level hackers can't do it!
The world's top-level hackers among the first generation of hackers can't do it!
To say an exaggeration, even the origin of the Internet, DARPA Advanced Bureau can not break the endless defense system silently, deceiving the advanced pseudo artificial intelligence system.
unless…
Shi Lei suddenly thought of a situation, his face changed dramatically!
Before the rebirth, the world's top 500 supercomputers. Ninety-nine percent of them use the server CPU produced by Intel and the supercomputer of AMD's server CPU. Very few, comparable to the 'national treasure'.
It is precisely because of this situation that Shi Lei subconsciously ignored, supercomputer lightning, is the use of AMD's server CPU, built.
In the last generation, the server CPU produced by AMD was difficult to be elegant. More is applied to small and medium enterprises. In a hacker technical discussion conference, a hacker published his new discovery, that is, the server CPU produced by AMD, there is a fatal hardware vulnerability.
That's right, it's a hardware bug!
AMD's server CPU has a very fatal hardware vulnerability. As long as you master this hardware vulnerability, hackers can enter directly. The server built with AMD's server CPU completely ignores any firewall and security system and directly disguise itself as the core program of the CPU, avoiding all the troubles.
‘Is that the hardware vulnerability? ‘Shi Lei’s thoughts in his mind, his hard memory, the hacker who published AMD’s server CPU hardware vulnerabilities. Which one is it.
From the current situation, the person who invaded the supercomputer lightning should be the hacker.
Although the other party announced the time of AMD's server CPU hardware vulnerabilities, it is still several years later, but no one is sure. The hardware vulnerability that the hacker discovered when.
Shi Lei's memory is very good, if it is important information. As long as you slowly recall, Shi Lei can remember it.
'I remembered! It’s Maha Kamal! ‘Shi Lei’s face showed a touch of joy, his hands on the keyboard, and quickly entered the name of 'Maha Kamal’.
The name is not the real name, but the name of the hacker's vest.
"Well, search for information about ‘Maha, Kamal’ in the Internet! Yes, the other is an Inca national, mainly focusing on investigating information in the Inca region.” Shi Lei told him.
Maha Kamal is a native of Inca, and Shi Lei will not remember correctly. At the beginning of the hacking technical discussion conference, every participant had to use the real vest to land. When Maha Kamal introduced himself, he voluntarily admitted that he was an Inca national.
The overall national strength of the Incas is far less than that of Xia, but the Inca people are very strong in terms of software and technical strength. They have built a world-renowned software industry chain and become a software outsourcing service provider all over the world.
After analyzing the possible suspects, Shi Lei was greatly relieved.
A powerful enemy is not terrible. What is truly terrible is an unknown enemy! The unknown enemy makes it easy for people to feel powerless.
"Maha Kamal, hey!" Shi Lei's tone was a touch of disdain. Maha Kamal's hacking technique reached a world-class level, but it was far from the peak of the world.
As long as Shi Lei knows the other's means, he is not afraid of the hardware-level vulnerabilities that the other party has mastered. This loophole has been disclosed by the other party, and Shi Lei has personally verified it.
In the afterlife, supercomputers and large servers using AMD's server CPUs basically do not exist. This hardware-level vulnerability is very tasteless, so Maha Kamal will be announced and increase his reputation.
Shi Lei tried to use hardware vulnerabilities as a breakthrough to invade supercomputer lightning. As Shi Lei guessed, he easily entered the interior of the supercomputer lightning, neither causing a counterattack from the endless defense system, nor causing an alarm.
"Sure enough!" Shi Lei sighed.
After finding the crux of the problem, Shi Lei immediately began to deal with the hardware vulnerability of AMD's server CPU, wrote the corresponding defense assistant program, and completely blocked the hardware vulnerability by using the defense assistant program.
Moreover, once someone uses the hardware vulnerability again and attempts to enter the supercomputer lightning, it will be counter-tracked by the defense assistant program until the real IP address of the other party is found.
After dealing with the security aids for hardware vulnerabilities, Shi Lei began to look forward to it. He would like to see Maha Kamal, how much skill!
.
PS: Shanshan: I guess the ending, but there is no guessing process! Germany won the championship, but it is overtime! Damn Asian plate! Set up automatic updates at night, goodbye, everyone, I want to go to the rooftop!
You'll Also Like
-
Time Space: The Rough Man’s Sick Beauty Turned Wild
Chapter 1150 9 hours ago -
My cultivation increased my power ten thousand times, and I became the nightmare of all races!
Chapter 1099 23 hours ago -
Unlimited additional gold items for each type of soldier, what's wrong with being invincible?
Chapter 127 23 hours ago -
The villain's younger brother: Start by deceiving the sister-in-law
Chapter 164 23 hours ago -
Naruto from the beginning six eyes to cultivate Lin
Chapter 212 23 hours ago -
Fantasy, I suddenly realized the chaos body
Chapter 1440 1 days ago -
You are as rustic as the wind and as beautiful as the flowers
Chapter 304 1 days ago -
Ancestor, stop being stubborn, the universe is going to disappear.
Chapter 782 1 days ago -
The start was really bankrupt and I was kicked out of the family group
Chapter 197 1 days ago -
Slay demons and gain sixty years of skill at the beginning
Chapter 1059 1 days ago