Font Size:
Theme:

Chapter 266:Brain got caught in the door

The lowest odds in the mouth is that the support time of the magic fairy technology is within 1 minute, and the odds are one hundred.

Then two minutes, three minutes until an hour.

The odds for an hour are high, reaching one loss of ten.

In the end, there is a very funny odds, that is, a loss of 10,000, gambling fantasy technology in this to fight against the world to win.

Everyone believes that this is the organizer deliberately laughing at the magic fairy technology.

After all, in the hacker world, the master is obviously important, but the advantages of the number of people are equally obvious.I can enter more instructions than you at the same time, which is an advantage.

Of course, this number does not refer to those typists who can only knock on the keyboard indiscriminately, but those who really have certain network offensive and defensive capabilities and can carry out effective attacks.

How big is your magic technology?You are an industrial company, there is only one network management department responsible for repairing computers and maintaining websites, how to talk about the enemy of the world?

Many people will bet to the magic fairy technology can support the time of less than a minute, although the odds are low, but no less money is money, is not money?

There are also some people who press for two minutes and three minutes, and their view is that since Magician Technology dares to do this, it is also certain to think of it.

Almost in a very short period of time, all the amount has increased to $1 billion, and I have to say that these hackers are very rich.

At the same time, it shows how sensational this matter is, and countless people are paying attention to it.

However, when I saw that the market was about to be closed, an anonymous account suddenly smashed a million dollars to win the magic fairy technology.

Is that funny?It burns too much, right?Or do you think money is crazy?

Ten thousand times the odds, this is really very attractive, but who can get it?Huaxia** still has millions of times the odds, but the special prize rate?And this thing, the probability of magic technology winning is lower than the special prize.

The person who put this bet must have had his brain caught in the door.

...

At this time, even if it is a person who does not share the mysterious profession of hacking on weekdays, he also knows some news, and some social networking sites in China are even more lively.

The reception phone of Fanxian Technology was directly exploded, because countless people warned by phone that the company must immediately shut down its servers and transfer the data.

Even if it is better to destroy the server humanely, because for the master, even if you delete the data on the hard disk, they can still recover it.

At this moment, the most difficult is the telephone operator of the administrative department of phantom science and technology, before they answered the phone basically are some business consulting or after-sales, but now the phone received, all of them are the alarm calls from the Chinese.

These people are from good intentions, can not scold it, so they can only say after thanking the company's senior decision.

What can the caller say when he hears this?Directly, your high-level brain is caught in the door, and then hang up the phone.

A few little girls who answered the phone on this day in addition to bitter laughter or bitter laughter, because the most they heard today is this sentence, and in the end they think that the head of the company's top is not caught by the door.

...

Nagar is an ordinary French university student, with the French unique romantic feelings, such as last night, he came to a romantic encounter with a beautiful student sister, and finally met to a small hotel.

This morning, waking up from this romance, he forgot who the other party was.There is only one piece of news on the computer.

A piece of news related to fantasy technology.

Although he is a native Frenchman, he has also heard the name of Magician Technology, because he has a vision telescope for the product of phantom technology.

It was a product that filled Nanga with adoration, and since having it, he found himself alone y:e life was much more interesting.

So he remembered the name of Magician Technology.

In Nagar's view, this is a very absurd news, how can Magic Technology be put on the official website server as the technical data of the company's lifeblood?

At this moment, Nagar was moved, and he thought it was an opportunity for himself, an opportunity to become the world's top billionaire.

No one knows that Naga has another identity, naga, which is called Naga in Chinese.

Naga himself does not worship Indian mythology, but once accidentally saw the word Naga on the Internet, he liked the title of this homophonic name with his own name, and since then he has given himself another secret identity to naga.

So there is a top hacker named Naga on the network, in just two years, its strength has been recognized by the hacker industry, ranking quickly, becoming the fastest-rising top hacker in history.

However, in reality, Naga's life has not changed much, and he never thought of relying on the bank to get money, which is a hacker's taboo, but also an almost impossible thing to do.

Now he sees the news, but he sees hope.

If you can steal the technology on the official website server, you can definitely sell it for a good price.

Not to mention otherwise, just the normal temperature superconducting material, at least worth tens of billions of dollars, once successful, Forbes rich list will have its own place.

He has confidence in himself, and this confidence has even reached the level of pride.

So he made up his mind that he would not only steal this data, but also delete the original data from the server, which is typical of others, so that others have no way to go.

Although proud, he is not stupid, has been lurking in the dark waiting, while all the hacking tools he wrote are placed in the fastest place to open, just waiting for the fire on the network to start.

...

The time is 2 p.m. on March 3, when employees are at work.

More than 80% of the world’s hackers are crouching next to their computers, staring closely at a row of monitoring data on the screen.

Suddenly, a small fluctuation appeared, which was someone launched a tcp syn message to the official website server of the magic fairy technology, and according to the protocol rules, the official website server immediately returned a TCP ACK message.

Under normal circumstances, the visitor should return a TCP ack message at this time, and the connection between the two can be established.

But not!Just another tcp syn message.

This is a typical TCP syn denial of service attack, one of the most commonly used means of cyberattacks, once such attacks form a certain scale, the target server network will be paralyzed.

Of course, the attackers did not want to paralyze the server, but they just wanted to cover up their intrusion into the target server.

“The move!”At the moment of this hordes of TCP syn message, all the serious hackers understood that the time had come.

If you don’t do it, I’m afraid I won’t even have a chance to drink soup.

For a time, these hacker groups, such as the Eight Immortals across the sea, have aimed their firepower at the official website server of Magic Fairy Technology.

There is no doubt that this is a technical job for hackers all over the world, they not only have to attack the servers of Magic Fairy Technology, but also to beware of the destruction of their peers, if someone is too strong, the server hangs up, it will have no fun.

In fact, we also have a worry, that is, if the magic fairy technology can not open, directly the server power or network cable to pick up, we also have no fun.

But this possibility is low, because for now, the managers of the technology seem to be a big deal, at all costs, in order to cause this cyber world war.

Naga also had such concerns, he used a string of normal code to hide himself and sneak into the server, everything seemed normal.

However, the moment he opened the server disk, he immediately understood that he was fooled.

Because no matter which folder he clicks on, there are countless folders below, and even if he continues to click, this folder is not much.

A normal server can't have so many folders, so it should be a virtual environment, and everything you see right now is just a simulation.

In professional terms, I have entered the honeypot set by others.

Brother-in-law!You are a top hacker, how can you make this kind of low-level mistake?Not found before entering the honeypot for Mao himself?Poor himself just clicked a few folders hard, and I don't know if this has exposed itself.

Encounter this scene naturally more than Nagar, everyone who sneaks into the "server" is in the same situation, there are too many folders, and there is no way to start.

Many people know that they may have entered the honeypot, but how can they quit?

Cut off the data, re-enter, open or this page, this can't be done.

Some people do not believe in evil, and then open the official website address of Magic Fairy Technology again, or hang on the Internet at a good end.

Can you follow the past and get into the honeypot according to this address?

They carry out network intrusion, naturally according to the vulnerability they scanned, but the honeypot is too successful to disguise, in addition to these loopholes that allow them to enter, there is no other outlet.

It feels like a black house...

Destroyed?To destroy, you have to find the gap first, right?

Another way to invade?It is true that there are many vulnerabilities on this server, but when they come in, they naturally run to this small black house, which cannot be done.

The old CIA has a cybersecurity office, and it is equally busy at this moment.

They differ from other separate hackers, and there is an exchange of information between them.

When everyone enters this strange honeypot, they know that things are not as simple as they think.

“Destre on honey!”

“Attack with DDOS, first let the other person’s system crash!”

“It’s not like an artificial operation, it’s like a preset trap!”

Comments

No comments yet. Be the first to comment on this chapter!