HacKer

Chapter 134: bad situation

Advented to the film and television photography company, the Wasang woman at the front desk, squinting at Shi Lei with a vertical eyebrow, said: "We are not recruiting here, please leave, otherwise I will call the police!"

Shi Leidong Zhang Xiwang nodded, turned and walked out of the film and television photography company, while walking to observe the surrounding situation.

‘four lobby surveillance cameras, no security staff, open parking. Working hours from 9 am to 5 pm, lunch at noon should be takeaway, and there is a garbage box in the trash can! Just don't know, the security monitoring system is connected to the network! ‘Shi Lei’s coming out of the film and television photography company, while calculating in his mind.

In the film and television photography company, Ichiro Ichiro went to the hall and looked at the back of Shi Lei’s departure. He was faintly familiar. “Apricot, who is that guy?”

The woman named Aoki’s front desk, Wasang, looked at the short and fat ugly. “The little dog president, the guy came to apply for a male starring, but I was driven away!”

Ichiro Ichiro put a little down, if it is for a job, then it is definitely not that person!

Shi Lei revolved around the film and television photography company, observed a circle, looked at the specific terrain around, and checked if there are any available locations.

‘Every side of the courtyard has a camera, no dead angle monitoring? It’s really troublesome! ‘Shi Lei took a taxi and returned to the hotel.

Ma Liang was monitoring the Ichiro, and Zheng Sangun prepared a plastic bomb. Ye Feng took care of Deng Xiaoling at the hospital. Shi Lei was alone in the hotel room and looked at the surveillance map drawn by Ma Liang.

‘Adventive film and television photography company, it is indeed the best place to start! ‘Shi Lei secretly whispered in his heart, then opened the computer in the hotel room, using the web search engine to inquire about the information of the film and television photography company.

The film and television photography company in Tokyo is still famous!

And as far as Shi Lei expected, this company is really a photography company that shoots love action art films!

Shi Lei opened the official homepage of the film and television photography company in the browser. The opening speed was very slow. Shi Lei’s eyes were slightly glimpsed. On their official homepage, they browsed the cover of various love action art films and new film previews.

‘So poor access speed, is it the film and television photography company, using a workstation-level server, is it a web server in the company? ’

Shi Lei secretly inferred, and then quickly adopted the code injection method, from the official web page, into the server background of the other party, and easily broke through the defense of the web server. After entering the web server, Shi Lei looked at the server configuration. As he inferred, the film and television photography company really only used the workstation-level server, and made its own official website web server.

Through this workstation-class web server, Shi Lei quickly went to the internal LAN of the film and television photography company and browsed it in an attempt to find a computer that controls the security monitoring system.

Unfortunately, Shi Lei probed all internal local area networks and found no trace of the security monitoring system. It seems that the security surveillance system of the film and television photography company should be independent of the Internet.

There are two types of security monitoring systems. The first one is the film and television photography company. It is independent of the Internet. Although it is safer, it has an Achilles heel. It is impossible to remotely monitor and requires security personnel to monitor at any time.

The other is a security monitoring system connected to the Internet. This security monitoring system can use any computer device to obtain monitoring images anytime and anywhere through the Internet. Due to this convenience, such safety monitoring systems are used in many occasions.

'trouble! **** it! There is no security monitoring system connected to the Internet. They clearly have no security personnel, how to still have an independent security monitoring system! ‘Shi Lei’s thoughts are distressed.

The security monitoring system without access to the Internet is separated from the physical connection of the Internet. Even God cannot use the Internet to black out such a system without physical connection to the Internet!

Isolated physical connection, can effectively prevent hacker invasion!

Shi Lei withdrew from the web server of the film and television photography company, and then cleaned up the intrusion of the hotel computer, and then studied the map. On the map, he found a viaduct and then used a search engine to find a place called Friendship Bridge.

The Friendship Bridge is a 16-meter-high viaduct that spans two main roads and an underpass. Here is the place where Ichiro Ichiro drives!

Shi Lei built a plan in his mind and immediately prepared to implement it. He first searched for information on the three bars on the search engine, hoping that the security monitoring system of one of the bars would be connected to the Internet and could be controlled remotely. However, Shi Lei was disappointed. The three bars did not have an official website at all. They could not find their IP information. What about the invasion?

Shi Leizi carefully searched the Internet for information on the bar C with relatively good geographical conditions. The bar C was called the peach bar. Shi Lei was prepared to investigate the IP address of the peach bar.

Since there is no official website, you can't get IP intrusion from the official website. You can only start with the actual address of the peach bar, and then look for the IP address corresponding to the address in the user database of the Internet service provider. This process is equivalent to tracking the network to an IP address and then looking up the actual address based on the IP address, which is reversed.

Through the web search engine, Shi Lei finds the phone number of many network service providers in the area where the peach bar is located. Then he smiled and took out a prepaid unregistered mobile phone that he bought before. According to the number on the screen, he selected a dialing call to prepare the peach bar, which network service provider to purchase, and the broadband service, Shi Lei It is good for the invasion.

"Hello, So-net network, what can I do for you?" A sweet voice came from the telephone receiver. So-net is one of the network service providers in Tokyo and is part of Sony Corporation.

Shi Lei responded with a standard Osaka sound Japanese: "Hello, I want to apply for a broadband line."

So-net's customer service lady replied: "Mr., where are you? How much bandwidth broadband service do you need to apply for?"

Shi Lei is a serious man: "I am at No. 27, Liuchome, Sumida-ku, Tokyo!"

Miss customer service inquired, strangely replied: "Sir, are you a customer of the peach bar? You have applied for a broadband line, are you planning to apply for another one? Or are you ready to increase the speed?"

"Hey? Is it? Sorry, I am a peach-colored bar, the newly recruited staff, may have misunderstood the leadership's orders. I am sorry, I am bothered!" Shi Lei said a sincere apology, but his heart was sneer. I finally decided on the Internet service provider in the peach bar, so I can start looking for their IP address!

"It doesn't matter! So-net network, I wish you a happy life, goodbye!" Miss customer service hung up.

Shi Lei used the hotel's computer to access ACCESS's first-class broiler chicken, and then invaded into So-net's official server through ACCESS' first-class broiler chicken. Without the technicians who alerted So-net, it was easy to find the peach color. The IP address of the bar, and then cleaned up all the intrusion marks, leaving without a break!

The whole process, no more than three minutes!

After obtaining the IP address of the peach-colored bar, Shi Lei controlled the ACCESS first-class broiler and smoothly entered the interior of the peach-colored bar and connected to the computer with the Internet. Using this computer, Shi Lei first retrieved all the connections in the internal local area network and found that there were only three devices in the peach bar, which were connected to the Internet.

Two of them are ordinary personal computers, and the other is an audio player that controls the music on demand system of the entire peach bar.

Shi Lei did not find any particularly useful information on the two personal computers, and the other party's security monitoring system, as expected, did not connect to the Internet, which made Shi Lei very depressed!

Leaving the peach bar, Shi Lei once again used the little trick to install the broadband scorpion, found the IP of the other two bars, and then checked their situation. The security monitoring system of the other two bars is also independent of the Internet, and there is only one personal computer connected to the network, making Shi Lei quite difficult!

Similar to bars, which are very resistant to the Internet, the role of hackers is not obvious.

Shi Lei once again entered the internal network of the peach bar, spying on the audio player, which is currently the only thing that can be used.

After carefully inspecting the information in the two personal computers, Shi Lei found a very interesting news, and the seller of the audio player actually went bankrupt!

In other words, if the audio player is damaged, the peach bar can only repair itself!

Looking at this news, Shi Lei suddenly laughed!

Because, he finally found a way to deal with the Ichiro, and left no evidence!

Shi Lei controls ACCESS's first-class broiler. In the audio player, a timed virus is implanted, and then a professional repair is added to a list of personal computers in the peach bar. Contact phone for various audio players!

Looking at the timing virus of the audio player, it will erupt at 7 o'clock this evening. Shi Lei Lisuo cleaned up the invading traces, then laid comfortably on the bed and rested.

At noon, Shi Lei casually ate some ramen in the hotel, then looked at the road monitoring system in Tokyo, and tried to attack several times.

The road monitoring system in Tokyo has a strong defense force, at least with the hotel's computer, it is absolutely impossible to break! Shi Lei just tried it out and quietly retreated.

In the afternoon, Shi Lei bought two portable wireless network cards in the outside electronic market and returned to the hotel.

Near six o'clock, Zheng Sangun took a suitcase and came to Shi Lei's room. He whispered: "Boss, got a plastic bomb!"

Shi Lei clapped: "Exactly, I also thought of a seamless plan!" (To be continued. If you like this work, you are welcome to come to the astronomical registered members to recommend this work, your support is my greatest motivation. )

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like