I Created An Internet Empire

Chapter 123 Hackers are attacking~?\r

The light keeps flickering, and it looks densely packed, there are thousands of paths.

This is a tracking program developed by Chen Fan, Yuan Renguang, Chen Daqing, and 50 security alliance elites!

It can be clearly seen how many data flows are infiltrating the Koutou Trading Center, as well as the data flows infiltrating the databases and servers of China Merchants Bank's online banking!

Thousands!

Each dot of light represents a hacker's IP!

In other words, there are actually thousands of people attacking these two institutions at the same time.

Thousands of hackers, just people inside the Dragon Kingdom, are there so many?

absolutely not

Therefore, the behavior this time is definitely a premeditated joint behavior.

Criminal forces at home and abroad have been dispatched at this very moment.

Seeing these data streams, Li Wu smiled, took out his mobile phone and called someone: "Prepare to cooperate with the security department of Red Star Company and set traps for that group of people."

After saying this, he hung up the phone and glanced at Chen Fan

Seeing his gaze, Chen Fan smiled and nodded.

So he picked up the phone again and dialed a number that everyone was very familiar with

"Hey, is it Officer Liu? Are you ready? It can be said that it will be a nationwide super crime, and even a criminal organization with transnational activities. Let's get ready, the show is about to begin. It's gone!"

As soon as the words fell, the police officer Liu over there laughed: "Don't worry, the troops are ready, and the arresting organizations across the country are fully armed. As long as you find their real address here, we will be the first. Time to catch it!"

"Also, thank the boy Chen Fan for me, how many surprises this guy has created for our Dragon Kingdom!"

pat!

Hang up!

You have brought so many surprises to the Dragon Kingdom! ”, Officer Liu asked me to give you a message, saying that Li Wu gave Chen Fan a thumbs up: “Mr. Chen

Take your seat! As the commander-in-chief of this battle, I am ready to start! "Zhou Cheng, Brother Yuan (Yuan Renguang) Chen Fan listened to this, hehe smiled, and then waved his hand:"

"clear!"

Drop drop drop.

A crisp prompt sound resounded in the very inconspicuous office in Kyoto. if

If it is a normal chat, maybe this voice will be very, very pleasant, however, such as

If there are ordinary people who see the content of the message, they will definitely be shocked! Moreover, this interface is not the chat group interface of the button, but through the browser, enter the

Entering a black web page, all the text displayed on it are green, just like the hacker data stream in the movie!

"Team T1 completes preparations, discovers the honeypot, ditches the first set of servers, and clears

user data and is exploiting a second set of servers for infiltration. "" The T2 team successfully evaded 12 honeypot traps and entered the periphery of the server.

In our intranet center, we found a lot of deducted user data! ""T3 team successfully hacked the server and is obtaining user data permissions...

"The T4 team has figured out the layout framework of China Merchants Bank and is preparing to implant the Trojan horse...

"The T5 team found the database login address and is cracking the database password."

One message after another flashed on this page, and a moment later, a

The vest has spoken: Be careful of their backhand and attack the headquarters of the Red Star Company.

top layer.

conference room.

Chen Fan sits in front of the main computer, or, in other words, in front of a server-configured mainframe, he takes advantage of this

A server, logged on to the button, and then opened a thousand people!

Yes! This is his internal preparation for the internal employees of the company in response to the occurrence of certain things.

Version of the buckle!

Thousands of people! At this moment, there are nearly a thousand people inside! "How's the data?"

Chen Fan typed out a line of words.

"A group of data is normal, they have been guided into the deep honeypot, and they are trying to track back

their real IP addresses. "

"Group 2 throws out a fake database, and they are cracking the password of the database. There is a tracking Trojan in this database. As long as it is cracked, the Trojan can be detonated, thereby starting anti-tracking.

"The 3 sets of data are normal. The first honeypot was deliberately exposed, and the second honeypot made them a little more difficult. They broke the second honeypot. There was a trap in the third honeypot, and they fell into it!"

"Group 4 is normal..." "Group 5 has started anti-tracking!"

"Group 6...

"China Merchants Bank 1 set of data is intact, they infiltrated into the back door we left, and they are

The IP of the other party guides into the trap of Red Star Technology"

"China Merchants Bank Group 2 is the same as above." "Group 3 is the same as above!"

A series of instructions are continuously replied and deployed, whether it is Red Star Technology or China Merchants Bank Technology

In the surgery department, at this moment, the dense sound of the keyboard continued to tap,

Strings of codes, switching between different pages, sometimes the server interface, sometimes the database interface, sometimes looking for data flow records, sometimes deploying

Other traps... dazzling pages, people who don't know how to read it will only feel boring and helpless. This is completely different from the hacker war described in the movie!

a moment later

In that humble little office.

The leading hacker suddenly noticed something was wrong.

He felt that this time the invasion was too simple.

He remembered that today's Red Star Technology is very powerful, selling so many in a short period of time

The Red Star system, and the creation of a powerful digital system that can withstand the peak pressure of up to 1.5 billion daily searches

According to spit the ferry search engine.

For such a large company, has the security department considered the pressure on servers? wrong! Absolutely not!

"Quick! This is a trap! Quick! Quick!!!"

He took off his earphones and yelled!

Because he discovered a huge conspiracy! Maybe the other party made them do it on purpose

"Quick! Turn off the power! Can't stay here! Let's go!"

He saw that everyone was still quickly clearing the IP traces on the server, and hurriedly shouted

If any police have been deployed in advance, they should leave as soon as possible, this place may

It's no longer safe!

"Forget about the computer! Come on, get out of here!"

The man shouted, the first one left the office, and quickly ran to the company gate, bang!

He kicked open the door of the office.

He had a ferocious face, but after kicking away, he became quiet.

Because in front of him are more than a dozen icy handcuffs and a group of police officers with guns

"Yo, my heart is beating so fast, this boss, you kicked open the door of the company, this is your plan to go

Where? "

Officer Liu shook the bright handcuffs and laughed at the man.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like