Reborn Ace Hack
Chapter 180 The Great Hacker
When Gu Lang heard the news, he sat up from his seat, came to a computer, pulled up the firewall log from the server and looked at it. Sure enough, this guy finally found the trap strategy set by Gu Lang.
Then he successfully escaped from the trap.
"I don't know who this guy is. He's really clueless." Gu Lang said, looking at the time in the lower right corner of the computer. It was just a little after twelve o'clock. How could he break through and find the trap setting strategy in such a short period of time?
, it was really not simple. He put himself in his shoes and thought about it. If he were to break this trap himself, he really wouldn't have much confidence in such a period of time.
After the trap was broken through, the hacker was not kicked out of the firewall immediately. In fact, the second layer of protection of the firewall is not like the first layer of protection, which mainly kicks people. For example, the first layer of firewall is like an arrogant
As for the gatekeeper, once anyone breaks the rules, they will be kicked out without hesitation. So the second line of protection is relatively mild, but it is also much more dangerous, because the second line of protection is
It's like a dangerous swamp full of advanced techniques. If you're not careful, you will fall into it and be unable to get out. And none of these traps is weaker than the previous trap.
Of course, these traps are different from the previous trap. The fundamental purpose of the previous trap was to create an illusion. Therefore, if hackers come in and perform illegal operations, they will be kicked out. The most important thing is that the previous trap
The strategy was designed by Gu Lang, but the many traps that followed were all generated by Xuannie Firewall based on a special intelligent algorithm. It can be said that they are ever-changing and interlocking, and there is no certain way to crack them.
The hacker now fell into a trap similar to a circular logic lock. He circled it several times and found that he could not get out. So the guy wisely cut off the connection with the firewall and changed his IP address again.
Come in.
The reason why you need to change the IP is because the traps in the second layer of firewall protection are based on IP addresses. That is, once an IP address is pulled close to a trap, the IP will be forced to exit even if the network connection is disconnected.
When you come in, you will still be dragged into the original trap.
The log shows that the hacker has entered the second layer of protection twice in just a few minutes. Obviously he has discovered this, so he changed his IP address to enter, but this IP address was quickly trapped in another layer of protection.
A trap.
In this way, this guy changed many IPs one after another. In addition to normal access to the page that is open to the public on the server, he will not fall into the trap. As long as he does any other illegal actions, he will fall into the trap, and then that IP
It's useless.
At half past twelve, Gu Lang saw the guy withdrawing again and never came back.
"It seems that this guy has lost his patience this time, and I don't know if he will come back again." Gu Lang thought to himself.
"Mr. Gu, look, someone posted something on the forum." About half an hour later, at 1 a.m., an employee who was responsible for collecting information from the forum called out.
Gu Lang walked over and saw a post that had just been posted and was pinned to the top: "The person who wrote about Xuannie Firewall is really perverted. Okay, I admit that I failed. I will record the process of attacking Xuannie Firewall for my reference."
For reference by those who come later.”
The title of the post is very simple and concise, but the person who posted it is extraordinary. He is Hotfire, one of the top hackers in China. The name of the forum where he posted is called Lenghuo, and he is one of the founders of this forum.
No wonder it was pinned as soon as I posted it.
Firstly, it is because Hotfire has a great reputation, and secondly, because this post is the first top Chinese hacker to publish his experience of attacking Xuannie Firewall. More importantly, Hotfire actually admitted that he failed. All of this has become a
It is an important element to attract attention, so that within a few minutes of posting this post, it attracted countless people to watch.
The onlookers have different attitudes. Some come to worship the great god purely for the reputation of Hotfire, but are not too concerned about the content of the post. Others want to see how the attack process of Hotfire is different from that of ordinary hackers.
What's different, of course, there are still some people who come to observe and learn...
However, what disappoints everyone is that they did not see too much technical analysis in this post, but only a simple recording process like a running account, and the last two questions, but these two questions are
Ask the wolf.
"I would like to ask ghwolf two final questions. First, did you write this Xuannie Firewall? Second, are those interlocking and endless traps set up manually, or are they set up by artificial intelligence?
support?"
Gu Lang did not answer these two questions immediately, but they aroused discussions among many onlookers. Everyone expressed their own opinions and argued endlessly about these two questions.
"If this firewall was written by ghwolf, he is too powerful, but I don't think he has such ability?"
"Upstairs, do you know Luo Gulang? Why do you say he doesn't have such ability?"
"..."
"I'm very curious about the traps Li Huo mentioned. It's a pity that I don't have the ability to break through the first trap. Otherwise, I would have to experience it. Even if I get trapped, it will be worth it."
Many people on the Internet like to call hotfire a burning fire.
"It turns out that we have been walking in circles in a trap set by others for so many days. It's really embarrassing."
"Call Luo Lone Wolf and come out quickly to answer Liehuo's question."
Among the many replies, there are some that seem to resonate with many people. Among them, the one that resonates the most is the following reply.
"Lihuo has admitted defeat. Is the theory that Xuan Nirvana will lose, which we have always believed in, really true?"
This reply has appeared, and it has attracted a lot of people to agree with it. Some people even opened a new thread to discuss whether Xuan Nirvana loses or wins. However, in this discussion thread, the direction of the wind has quietly changed.
, no one is so sure that Xuan Nirvana will lose. A kind of pessimism is quietly growing, spreading from this forum to other influential forums, quickly forming a trend, changing the entire hacker community's view of this challenge.
Prediction of the final result of the game.
And just when this trend was gradually taking shape, a fat man walked into the underground gambling spot that Gu Xiaodong entrusted Wang Jialing to manage with a cash check of 7 million. With an odds of 1 to 8, he won the Xuan Nirvana for one time.
Winning invested 7 million, plus the 3 million Tang Sa had previously invested at odds of 1 to 10. If Xuan Nifang really wins, then the 7 million will soon become 56 million.
Tang Sa's three million became thirty million, and these two sums alone could bankrupt Gu Xiaodong.
Some people say that there is also the two million that the first fat man invested. Haha, it was a trust. Wang Jialing invested the money for himself, and he did countless things.
The public is often influenced by some celebrities. The influence of hotfire has made the public pessimistic about the theory that Xuan Nirvana will lose. However, this influence is only limited to the impact on the general public. Most of the real top hackers will only believe in their own judgment.
, originally most of the top hackers were dormant behind the scenes, quietly looking down at the overall challenge launched by Gu Lang, as if they were looking down at a farce, but they refused to take action easily.
However, Hotfire's attack and failure stimulated them. Almost unanimously, several top hackers who had not originally planned to take action began to get ready to see how powerful Xuannie Firewall was.
Gu Lang specifically posted a new post to answer Hotfire's two questions. This was an excellent opportunity to advertise for Xuannie Firewall, and he naturally would not give it up easily.
"Answers to two questions about hotfire." This is the title of the post.
"To answer the first question first, this firewall was not written by me, but was handed over to me by another great hacker, feonix, and the English name of our Xuan Nie company is feonix." This is Gu Lang's answer to the first question.
An answer to a question.
"The second question is, within the firewall, the trap that hotfire broke through was written by me based on the policy editor provided by the firewall. Here, I first apologize for misleading everyone these days. In addition to this trap
In addition, the interlocking and endless traps that follow are all automatically and randomly generated by Xuannie Firewall. That is the real essence of Xuannie Firewall, and it is also one of the main reasons why Xuannie Firewall can be called a smart firewall.
"This is Gu Lang's answer to the second question.
After Gu Lang's post was posted, it was quickly pinned to the top by hotfire himself, and another question was asked in it.
"Ghwolf, can you introduce feonix in detail? I noticed that you used the word great in your wording. What exactly is going on?" Hotfire quickly restored Gu Lang and asked a new question.
In fact, after Gu Lang posted the post, many people asked under the post who feonix was, and then someone mentioned that it seems that not long ago, a man named feonix wrote an apology letter explaining the hacker spirit. In the hacker world
It caused quite a stir. Could it be that the feonix that Gu Lang mentioned was the same person.
"Feonix is a pure hacker. I have never met him. I only communicated with him on the Internet. But he is my guide on the hacker road. He made me understand what a real hacker is and realize that hackers are actually
It is a spirit, a spirit that can be regarded as faith." Gu Lang quickly replied to hotfire.
"Hacker spirit?" Hotfire seemed to be interested in discussing this issue with Gu Lang. After Gu Lang replied to him, he immediately replied.
"Yes, the hacker spirit. I don't know if you still remember that some time ago, feonix once hijacked Nanzhou's DNS server, and then sent a letter of apology. In that apology letter, feonix had a very good attitude towards the hacker spirit.
Explanation." Gu Lang said.
"Oh, I remembered. It turned out that feonix was him. That letter touched me very much at the time. It reminded me why I became a hacker. But there are really people who pursue the purest hacker in this world.
A spiritual hacker?" After Gu Lang's reminder, hotfire remembered feonix and the apology letter, but also raised his own questions.
"Yes, feonix is, that's why I say he is a great hacker, a great hacker who regards the pure hacker spirit as his belief, and this firewall was made by him." Gu Lang replied with pride.
You'll Also Like
-
The Emperor's Dominance
Chapter 2220 2 hours ago -
Simultaneous traversal: All Abyss difficulty
Chapter 181 2 hours ago -
I'm almost reaching the maximum level of evil god, and you're advising me to change my job
Chapter 179 3 hours ago -
Hunter: I became stronger even after I died
Chapter 121 4 hours ago -
After I became a villain master, my beautiful apprentice fell in love with me
Chapter 117 4 hours ago -
Simulate a thousand times, I have a method to speed through the escape game
Chapter 518 4 hours ago -
Return to Singapore 1995
Chapter 562 4 hours ago -
Hunter x Hunter: Pokémon Master, the World's Strongest
Chapter 475 4 hours ago -
The Wizard: From Zero-Ring Wizard to Almighty Lord
Chapter 64 4 hours ago -
Xiuxian Baiyi System, I know everything
Chapter 638 4 hours ago