Reborn Ace Hack

Chapter 183: A Closer Chance

Facts have proved that Gu Lang's own worries were justified, because after the new strategy he deployed was released, he was immediately overwhelmed by the more than a thousand newcomers. This time the opponent only spent less than a minute.

The strategy he set was broken.

Seeing this situation, Gu Lang had to give up this useless effort and decided to close the trap setting, so as to shut out all latecomers. However, those IPs that had broken through the first layer of trap and entered the second layer of trap,

But they couldn't keep them out, so they could only rely on the traps in the second layer of defense to trap them.

Now that he had made this decision, Gu Lang no longer hesitated and quickly brought up the firewall configuration interface, entered a line of commands as fast as lightning, and then hit Enter to execute it.

The first trap was turned off, and the 2,048 latecomers who swarmed behind only squeezed in a small part, and were all turned away.

"Huh..." Gu Lang breathed a long sigh of relief. The short period of less than twenty minutes just now was so tense. The locust-like attack was too difficult to defend against.

"Mr. Gu, those guys started scanning our system for vulnerabilities again." Before Gu Lang could finish his breath, another employee said loudly, making everyone in the network department nervous again.

Gu Lang quickly opened the system log, glanced at it, and found that indeed four IP addresses had begun to initiate connection requests to the server, and at the same time, they kept sending data packets here, starting to detect system vulnerabilities.

"Holy shit, it's this again!" Gu Lang cursed secretly. These guys were still using a seemingly chaotic method for detection at the beginning. After each failure, they would record it, and the latecomers were using different methods.

Detection methods are similar to locust-like gnawing methods. As long as there are loopholes in the system, they may be discovered. But which system can guarantee that there are no loopholes?

"Immediately make the second protection global!" Gu Lang observed the detection of these IPs and ordered the employees nearby. In order to prevent the firewall from occupying too many server resources, the second protection set by Gu Lang was only used for that

Behind the trap, there were no settings in other directions, but the current situation did not allow him to consider whether the server was overburdened.

An employee followed Gu Lang's instructions and quickly entered a command on the firewall's control panel to expand the second protection into the global protection of the system, and the protection layer currently under attack became the first layer. Once this

If the firewall layer is broken through, then these broken IPs will also face many traps of the second layer of firewall protection.

"Mr. Gu, should we also adjust our second-layer protection strategy and kick out those IPs that have been trapped there? They are all hanging in there and won't leave."

The employee who had been paying attention to the first layer of traps was idle because of the complete closure of that layer of traps, so he took the initiative to start staring at the people who had previously entered the second layer of protection through the first layer of traps, but fell in without exception.

After observing for a moment, he found that each of these IPs seemed to have a perseverance spirit, unlike

Earlier, after those hackers entered the second layer, they were trapped for a while and could not find a way out, so they automatically disconnected. These guys were in a trap, and they made full use of this layer of protection and would not actively kick them out.

With this characteristic, he kept trying to attack the trap when he went out. The employee felt anxious and asked.

"The second layer of protection is completely controlled by the firewall, and I can't adjust it, but don't worry, since these guys are trapped in the trap, it won't be so easy to get out," Gu Lang said.

As if to confirm his idea, the firewall beeped for a while, but it turned out that a trap in the second protection had been breached. A large number of IPs trapped inside ran out one after another, but what greeted them was

Some traps were closely connected with the previous trap, so these IPs fell into them one after another, and this large group of IPs that were originally in one trap were divided into several traps. Invisibly, the cracking power of these IPs was weakened.

"It seems that there is really no need to kick them out." It was also the first time that the employee saw that the second protection trap had been breached. He couldn't help but sweat, but what happened next made him relieved.

.

It seems that the matter is under control at this point. The first layer of protection of Xuannie Firewall is not so easy to break through, and the IP trapped in the second layer of protection is trapped in layers of traps and cannot get out.

At this time, Gu Lang and all the employees had nothing to do. All that was left was to wait. Since everyone was in a state of high tension, they didn't even notice that an hour had passed without realizing it. They had already been called over.

The lunch box has also become cold, but no one has touched it.

Tang Xinyu was completely reduced to a non-staff service worker at this time. He found a microwave oven, heated up all the lunch boxes with two other employees, and arranged for everyone to eat.

Twenty minutes passed unknowingly, and the IPs that came to scan for system vulnerabilities had been kicked out by the firewall in two batches. At this time, there were sixteen IPs scanning the firewall.

"Mr. Gu, I have an idea." An employee suggested.

"What do you think?" Gu Lang asked.

"I noticed that only when all those IPs are kicked out will twice as many IPs come in. So can we change the firewall policy and allow these IPs to be scanned here without kicking them out? Then their

The quantity should not increase," the employee said.

"Well, what you said makes sense, you can give it a try." Gu Lang said.

"I'm going to make adjustments now." Seeing that Gu Lang agreed to his suggestion, the employee said excitedly, and then ran back to his computer to adjust the strategy.

However, this employee's idea was good, but the other party had obviously anticipated this situation. After discovering that the previous IPs had not been kicked out, a new batch of IPs would be added every ten minutes.

Gu Lang quickly noticed this situation and quickly adjusted his strategy again. Only then did he kick out the IP addresses that he had been relying on before. The bandwidth burden on the server was suddenly reduced a lot.

"Mr. Gu, it was my poor thinking that almost ruined the situation." The employee from before said a little embarrassedly.

"It's okay." Gu Lang comforted the employee, and then looked at the subsequent IPs again. The number of IPs in this batch had increased to 256.

"Now it can be confirmed that these IPs are definitely controlled by one person, so who can think of such a perverted method?" Gu Lang secretly thought, in just a few minutes, the next batch of 512

The IP has arrived again.

"Damn, it's endless." Gu Lang watched batch after batch of IP connections coming in, like a revolving door. In a blink of an eye, there were already a batch of 4,096.

Suddenly the firewall beeped an alarm, which startled Gu Lang who was staring blankly at the computer screen. He quickly looked at the computer screen, but it turned out that the IP address was actually on the first layer of the Xuannie firewall.

Found one on defense

loophole, and then used this loophole to break through, and other IPs, like hungry wolves smelling the fishy smell, followed that IP and used that loophole to break through the first layer of protection, enter the second layer of protection, and then were trapped one after another.

Got inside.

But when this batch of IPs entered the second layer, the next batch of 8,182 IPs swarmed in and broke in through the previous loophole.

It only took about ten minutes from the time the vulnerability was discovered to the time when more than 8,000 IPs broke in. However, the vulnerability was something he had never thought of. At this time, if he wanted to fix the vulnerability, he needed to analyze the cause of the vulnerability and write a code.

Vulnerability patching cannot be completed in a short time, so at this moment he has no choice but to watch as more and more IP addresses are accumulated in the second layer of protection.

After the first layer of defense was breached, the firewall kept beeping the alarm, making everyone in the network department very nervous. No one was in the mood to eat anymore, so Tang Xinyu worked hard.

The hot lunch box became cold again.

But Tang Xinyu couldn't care about all this. He stood behind Gu Lang, also looking at the open log file on the computer, looking worried.

"Gu Lang, won't the second layer of protection be eaten through by these locusts?" Tang Xinyu asked softly.

"Probably not." Gu Lang said.

But Tang Xinyu heard a trace of uncertainty from his tone, because there were too many locusts, and it was different from the previous large-scale denial of service attack. Although there were more people at that time, they were not organized, and the attacks were

Since the methods all come from the software released by thunder, they are very simple. Therefore, although the firewall eventually had to disconnect due to network congestion, it had no fatal impact, and no protection was broken.

But this time it is different. These IPs are obviously organized. It feels as if there is a wise commander behind these IPs who is conducting overall command. Therefore, the role played by these IPs is not the same as the tens of thousands of mobs last time.

Nothing can be compared.

It's just that Gu Lang was a little confused. Such a large-scale command requires a lot of calculations, so how did the other party do it? Did the other party use a giant computer or a large computer cluster to complete this attack?

But he laughed again. It seemed unlikely that he would use a computer worth hundreds of millions for his challenge. It was possible for a large computer cluster, but this possibility was also very low. After all, a large computer cluster

Although clusters are not as expensive as supercomputers, they are still valuable and require specially written software for them. Such systems generally only exist in some universities or research institutes and are used for scientific calculations and hackers.

Attack, some overkill.

While I was thinking about it, the next wave of 16,384 IPs swarmed in again and broke into the second layer of protection of the firewall. The addition of more than 10,000 new people caused a fundamental reversal of the entire situation.

In theory, Xuannie Firewall can use its own intelligent core to generate nearly infinite traps, but to generate so many traps and take care of each trap requires a large amount of memory space and ultra-high server computing speed.

, if the server used by Xuan Nie Company at this time is

A giant computer, or a large computer cluster, even if hundreds of thousands of IPs break in, there will be no problem. But the problem now is that Tang Xinyu and Gu Lang are only using a small computer.

When dealing with so many IP organized attacks, memory and CPU resources are exhausted.

The firewall has no memory resources, and no more CPU resources are available. The original traps are constantly being broken, but new traps are not generated in time, and the situation has become very critical.

Beep beep beep, a very rapid alarm sound sounded. When Gu Lang heard this alarm sound, his expression suddenly changed greatly, because this was the highest level alarm issued by the firewall, which meant that the firewall was about to be unable to withstand it.

Lived.

As the core figure of the Luo Department, Gu Lang's sudden change of expression made the atmosphere in the Luo Department suddenly freeze. Apart from the rapid sound of the alarm, there was no other sound.

"Is it true that after persisting for half a month, at the last minute, we are really going to lose?" This thought came to almost everyone's mind.

Tang Xinyu patted Gu Lang on the shoulder and said, "It's up to people to do things, and it's up to God to make things happen. Have we tried our best?"

Gu Lang shook his head unwillingly, and then said: "Maybe there is another way."

"What method?" Tang Xinyu was shocked and asked quickly.

"Feonix comes here in person, maybe we can drive out these locusts." Gu Lang said.

"Haha, are feonix willing to take care of such a thing?" Tang Xinyu said with a wry smile.

"Feonix doesn't want to take care of it, but his apprentice might have a way. We forgot about Xiao Yuan. By the way, Xinyu, call Xiao Yuan quickly." Gu Lang suddenly said with his eyes lit up.

"Holy crap, why did you forget this guy? I'll call him right away." Tang Xinyu slapped his head and said loudly. After speaking, he rushed to the phone, but before he could rush to the phone, the phone rang.

The bell rang.

"Whoever called at this time is really in trouble!" Tang Xinyu cursed, picked up the phone and said loudly, "Whoever you are, I have something urgent to use now. Please hang up first and call back later!"

"Xinyu, what's wrong with you? Have you taken any medicine? I'm Xiao Yuan. I'm at the train station now. You sent a car to pick me up. I'll go to the company to see how you did in the challenge." Xiao

Yuan's surprised voice came over.

"Haha, Xiao Yuan, have you come to Jiangzhou? That's great, I love you so much." Tang Xinyu was overjoyed when he heard the voice on the other end of the phone and kissed the phone hard.

"Damn it, what are you trying to do? It's really confusing." Xiao Yuan took away the receiver of the public phone and muttered something incomprehensible.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like