Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 16 Invasion of the White House

Since last time he discovered that Kingson was just a high school student, Xu Yi had the plan to accept him as his apprentice, so he asked him a difficult question. He originally planned to have more than one difficult question, but he found that the other party did not know the principle of his hard disk logic lock at first, so his subsequent test questions were useless. Xu Yi also lowered his requirements. As long as the other party could handle the hard disk logic lock he left, he would be qualified. So he left a hidden file in a secret place in the Kingson system. This time he invaded, he found that the file was still there, which means that the other party successfully cracked the hard disk lock.

The idea of ​​accepting disciples was not Xu Yi for a moment, but a decision he made after careful consideration. He inherited Xiang Bin's memory and still insisted on the principle of not being a leader. He believed that as a hacker, he should make it the first priority to not expose his identity. However, after rebirth, he must do many sensational things for life and for his own hobbies. In order to avoid those who are interested in paying attention to him, Xu Yi came up with such a way that accepting disciples is just the tip of the iceberg of his plan. Moreover, Kingson's apprentice can only be said to be in the inspection period. As for whether he can get Xu Yi's affirmation in the end, it depends on whether he can withstand the test.

After disconnecting from Kongson, Xu Yi began to practice with the White House website. Since the official White House website is the US portal on the Internet, hackers in the world are targeting it. Every day, the White House servers are attacked by countless hackers around the world, so its security performance is undoubtedly first-class. Using it as a target for practice is simply ideal.

The White House website is an American portal. Some guys with IQ below normal levels think there are so many confidential files and information in it. After invading this website, they will definitely gain a lot. Do you think others are idiots? Even though you know that this server is attacked by others every day, they will put confidential information in it? Unless those Americans are crazy!

Therefore, the only use of the White House servers for hackers is the only way to practice. If you want to challenge your own technology, then the White House servers are definitely the best choice because there is the server that guardians of the world's top security personnel.

As usual, Xu Yi first logged in to broiler and started the springboard service. Some time ago, he had already found many broiler servers around the world, and now he is just connecting one by one according to the IP in the broiler list.

It is actually not difficult to find broilers. The usual steps are inseparable from these few steps. First, you can start with your own machine and use hacking tools to scan it on a large scale, or you can specifically target a certain machine invasion. After determining the target, you will start invading the target machine. After the invasion is successful, clean up the traces left during the invasion. If there are too many loopholes in this machine, you may have to help him consolidate the system.

If you are lucky, this broiler may be very luxuriously equipped, but the administrator is Caicai. Congratulations, you have won the jackpot. This broiler has become your personal belonging and can be used for a long time, and it is quite easy to use.

Generally speaking, the server configuration will definitely be much better than your own machine, so the performance is naturally unspeakable. At this time, you can start to make full use of the resources of the first broiler and find more broilers for you. The steps are the same as at the beginning. Run your vulnerability scanning tool in the broiler and strive to search for servers with specific vulnerabilities for you around the world.

Xu Yi used this method to find broilers. He wrote a scanning software himself and took advantage of some system vulnerabilities that others didn't know. The broilers he scanned were one after another, and there were so many. He just picked some top-quality broilers from them, but there were also forty or fifty machines, and they made them into a list and then saved them in his email. After all, the machine of the Data Bureau is not safe. Therefore, many of his important files are saved in the email address or in some very stable broilers.

The website of the White House in the United States is indeed difficult to deal with. Xu Yi scanned it with software. There were almost no common vulnerabilities, and there were no uncommon ones. This is not surprising because the server opened too few services, and only opened HTTP web services, and it was static, so ordinary people had no idea how to start.

Xu Yi also expressed his understanding of this. After all, hackers all over the world are staring at there. The network administrator is probably the most depressing one in the world. He is "favored" by so many hackers every day, but it would be strange if he dares to open other services!

As long as you go online, there is no absolute security. This is the creed that all hackers insist on. If you cannot invade, it does not mean there are no vulnerabilities, it is just that you are not at the same level and have not found vulnerabilities. Of course, this may not be the responsibility of the server administrator, because in many cases, the success of hacker invasion is often caused by the vulnerabilities in the system itself or the imperfect network protocols, which is unpredictable.

Although the White House server security is done well, it is not difficult for Xu Yi, who has more than ten years of knowledge. Xu Yi did not spend much effort to hack into it, and the username used to log in was still XYZ.

It's quite contradictory. Hackers have always made it the top priority to not expose their identity, but sometimes their approach goes against this principle. Just like Xu Yi, he can get another meaningless name when logging into the target system. This is absolutely safe and secure. If others want to investigate, there is no way to investigate. However, hackers are often keen on using an ID they have identified, and the chance of identity exposure will be greatly increased. The reason is that this may be caused by the vanity of hackers. Although they are unwilling to be known by the public, they subconsciously hope to be recognized by their peers. The ID they use after their debut is like creating a brand. The stronger your technology is, the higher your value will be.

Now Xu Yi also has this strange thing. He himself thought about this problem, and finally decided to make the name XYZ a name. If it were before, he might not care about this false name anymore, but with the memory of a junior high school student, he still has the desire to express himself. This desire for expression has become very weak under the suppression of Xiang Bin's introverted personality, but it still exists after all.

Xu Yi walked around the server and there was nothing interesting. Just when he wanted to exit, he found that someone had successfully invaded the machine, and the intrusion ID was "Null".

Being able to penetrate in means that the other party still has two tricks. Xu Yi was bored and immediately became competing. So he took advantage of the other party's departure before he discovered that he had, but he obtained the IP address of the other party's invasion. He began to track the target from this IP address. Of course, Xu Yi knew that the other party would not be so stupid that he would invade this machine without a springboard. You must know that the US FBI is not a group of soft-fighting guys. Although this machine does not have confidential information, the other party may not pay attention to these invaders, but who can guarantee that they will be bored one day and want to play the game of cat-catching mice.

As Xu Yi expected, that IP was just a broiler from the other party. Its geographical location is in Switzerland, and the security of this broiler has been invaded and consolidated very strongly, but this did not stop Xu Yi. Through this broiler, Xu Yi found another British IP. After the invasion was successful, he found that it was still a broiler. It seemed that the other party was also a cautious person, and he didn't know how many layers of springboards he had set up. When Xu Yi wanted to track it, the other party finally found that he was being tracked down. He began to defend and also began to track Xu Yi's source. The two of them spread their back and forth to compete for the station, both defending and attacking, and seeing who discovered the other party's real address first.

After all, Xu Yi is a hacker from the future. After Null broke through only two broilers, he encountered trouble. He tracked XYZ's third broiler operating system, which he was not very familiar with. Solaris is also a branch of Unix, but Null didn't study it much. He tried it a few times and several loopholes he knew were filled by the other party. He no longer had time to temporarily find the loopholes because he found that XYZ had broken through the third of his four-layer defense line in a short time. He knew that he had lost this contest, so he had to withdraw from the battlefield. XYZ, he remembered this name and hoped to compete with him next time.

Xu Yi saw that the other party had withdrawn from the battlefield and stopped invading. He was not very happy to win, but he was still a little happy. This happiness was not because he won the victory, but because he was happy to meet his colleagues with extraordinary skills. This invasion took a lot of effort and energy. He did not break through the opponent's defense line within the time he had planned. The guy named Null was obviously much more powerful than Kingson.

At this time, Wang Bin also came back from outside. He was sweating slightly on his head. He just came in and called him tired, saying that his colleagues didn't know any computer at all, and he asked him to pick up and deal with anything he encountered. He didn't move at all.

Xu Yi smiled. He had such an experience. Xiang Bin used to work as an Internet cafe. He couldn't turn on the computer, turned on the monitor, switched input methods, and didn't... Wait and wait a lot of people, and they just came to the Internet administrator if they encountered any small things. During the time he was an Internet administrator, he was in a state of crazy, worried that he might run wild at any time. At that time, he really wanted to pinch the other person to death, and then knead it into a ball, then roll it into a twist, put it in a pan, fry it in an oil pan, and then take it out and smash it into pieces.

Looking at the time, it was almost lunch, so Xu Yi turned off the machine and said goodbye to Wang Bin.

"Xu Yi, didn't you say that I would treat you today, why are you leaving again?"

Xu Yi smiled apologetically and said, "Brother Wang, I just remembered that something happened at noon, next time."

Seeing Xu Yi say this, Wang Bin didn't insist anymore: "Okay."

When Xu Yi came, he said he would treat him casually. Besides, he was rushing to Sister Su Lan’s place later. Besides, he was not very close to Wang Bin and did not want to have too much contact with him.
Chapter completed!
Prev Index    Favorite Next