Reborn Ace Hack

Chapter 157: The First Wave of Attack - Cannon Fodder Charges Forward

(In the new book issue, please give me flowers and collections!) "It's begun."

After the IP address of the server under attack was sent out, a graph of the server traffic monitoring software installed on the computer in front of Gu Lang suddenly became extremely steep and upward, showing that the traffic data began to increase wildly.

"Although it's not DDOS, it's better than DDOS!"

Tang Xinyu looked at the curve that kept rising crazily, and couldn't help but sigh. At this moment, his palms were full of sweat, even though he knew that the throughput of the server under attack in the company was extremely high, and Xuan Nirvana

The firewall has a very smart strategy to prevent network congestion, but seeing the skyrocketing network traffic, I still feel very nervous, worried that the server will suddenly be unable to sustain such a large amount of network traffic and collapse.

Gu Lang opened another software and looked at the attack logs received by the firewall. He smiled calmly and said: "This is the first test. It seems that the network traffic has increased dramatically, but they are all cannon fodder, or some scripts."

Boy, use the tools provided by the experts on the forum to attack. Although it is fierce, it is nothing to worry about. The real test will come when the cannon fodder is defeated and it is the turn of the real experts hiding behind to take action.

.”

"Brother, Xuannie Firewall is a technology provided by feonix. You will rely on it to conquer the world for a long time in the future. Can you have some confidence?" Tang Sa saw Tang Xinyu still looking nervous.

, said with a smile, although she said this, she was actually very nervous.

"Yeah, I'm actually very confident, but caring is confusing and involuntary." Tang Xinyu nodded and said.

The network traffic is still rising, and soon exceeds 50% of the server's network bandwidth. If the network traffic reaches or exceeds the maximum value that the network bandwidth can bear, even if the server can handle it, the network will not be able to handle it.

It will be blocked, and no one will be able to come in. This situation is like a factory. The production capacity is obviously very strong, but the road leading to the factory is blocked, raw materials cannot be transported in, and products cannot get out.

To a certain extent, this can be regarded as a successful DDoS attack.

Of course, in reality, the factory will definitely take corresponding measures to deal with this situation, or further widen the road, or send special personnel to manage and clear the road to ensure that the road is smooth.

For servers that are under attack, certain measures also need to be taken to prevent network congestion. It is impossible to widen roads, that is, increase bandwidth. Then only road dredges can be sent to the roads to clear the roads, and all of this will be done by

Xuannie Firewall to automate execution.

A very important means for Xuannie Firewall to prevent DDoS attacks is to detect the network traffic of the server and the growth trend of the traffic, intelligently judge the upcoming bandwidth situation, and take measures when necessary to prevent the server bandwidth from being overloaded and causing network problems.

congestion.

Therefore, when Gu Lang sent out the IP address and the network traffic began to grow wildly, Xuannie Firewall, on the one hand, was resisting various endless attacks, and it had already begun to screen and judge the data flow coming from the attack, but the network

The traffic has not reached the upper limit for the firewall to take further measures, so it has not taken any further measures.

However, as the traffic continued to increase, the limit for further action by the firewall was soon reached, and the firewall began to take action.

…………

"Quack, service denied, that IP address cannot be accessed!"

"You can't even resist a simple denial of service attack, but you still want to challenge it all. Haha, Gu Lang, you are too arrogant!"

"..."

With the further action of the firewall, many script kiddies who stayed up late sitting in front of the computer and using network tools or scripts downloaded from the Internet to attack suddenly found that their attacks were rejected, and even the IP address of the server was rejected.

The access was no longer possible, so based on the simple network attack and defense knowledge learned on the Internet, he made the following judgment: The server set up by Gu Lang suddenly suffered a large number of attacks, causing network congestion, and the server could not respond. In other words, they

I accidentally cooperated with a distributed denial of service attack (DDoS) and succeeded.

As a result, people began to post in forums or broadcast on an IRC channel to celebrate, and many people responded immediately, because many people's attacks were rejected. These forums and IRC chat channels experienced a short period of calm.

, became lively again.

"A bunch of noobs, pretending to understand and shouting randomly!"

Gu Lang saw the commotion on the forum and sneered coldly. He didn't pay attention to the clamor of these guys. Instead, he posted a post on one of the most popular forums. In the post, he wrote:

He gave an address and asked those guys who were clamoring for Xuan Nie's server to change their IP address. Go to the address he gave and see. The reason for changing the IP address was because the IP address those guys were using had already been used by Xuan Nie.

The firewall blocked it.

This post was quickly highlighted by the forum moderator, so some onlookers opened the address first, and what they saw was a long list. Each line of the list was an IP address, followed by a brief description.

, after reading these instructions, everyone understood that this was a list of IP addresses blocked by the Xuannie server. This explanation gave the reason why the IP address was blocked.

A few minutes after Gu Lang's post was posted, those guys who clamored that the Xuannie server was paralyzed collectively lost their voices. Only their previous posts mocking the Xuannie server were still hanging high on the forum's homepage, accepting the comments of latecomers.

Ridicule, quite a bit of irony.

Soon, Gu Lang's post was forwarded to other forums and many IRC chat rooms, and the farce-like noise quickly subsided.

The attack is still continuing, but compared with the period just after midnight, the growth of network traffic has passed its peak, gradually stabilized, and started to decline. At this time, the network statistics program that comes with the firewall

We have summarized the attacks during that period.

At 0:00 on January 1, within just ten minutes after Gu Lang released the IP address of Xuannie's server, their server was visited millions of times in total, with the peak visit occurring at the seventh minute. Such data ratio

The maximum number of visits per second experienced by large companies in later generations, such as Taobao, Baidu, and Tencent, is much smaller. However, you must know that Xuannie has only one server, and companies such as Taobao, Baidu, and Tencent, in order to ensure that the server is

To respond normally when access data increases dramatically, a distributed server cluster consisting of a large number of servers is generally used, which is not comparable to the maximum number of visits that a single server can withstand.

After the server traffic gradually stabilized, Gu Lang looked at the time and saw that more than half an hour had passed. So he turned to Tang Xinyu and Tang Sa and said: "This wave of attacks has come to an end, but the cannon fodder has not

After all the commotion, a real master will not take action easily, so there shouldn’t be much to see today.”

"Okay, it's almost one o'clock. My sister has gone to rest. You two can stay here." Tang Sa said with a yawn. After that, Niao Tingting left, leaving Tang Xinyu and Gu Lang still guarding the computer.

.

"Gu Lang, we set the challenge for half a month. Isn't it too long?" Tang Xinyu stretched and moved his body and then asked.

"If they can't break in after such a long time, doesn't it mean that our firewall is powerful?" Gu Lang joked, and then explained, "Invading a server is not as simple as imagined, except

In addition to technology, patience and time are also essential. It takes a lot of time to analyze server passwords and scan for vulnerabilities. Even if vulnerabilities are found, it will take a lot of time to find and analyze the vulnerabilities discovered. Half a month is enough for a real master.

It is said that the time is not long. If we set the time too short, it will be based on the actual situation and it will be difficult to convince people."

"So that's it, haha." Tang Xinyu said, "I thought that when a master moves, it will be like what is written in martial arts novels. It takes less time to defeat the enemy with one move?"

"Masters need longer time. It is also written in martial arts novels that a fight between masters will last for three days and three nights, or even ten days and a half, when the sky is dark and the earth is dark, and the mountains collapse and the earth cracks." Gu Lang said with a smile.

While the two were chatting, the computer suddenly made a beeping alarm, which attracted their attention. They saw that the network traffic surged, surpassing the highest value reached just now almost instantly. The curve

It also changed from the original green to orange-red.

"A master is here." Gu Lang looked serious and said in a deep voice.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like