The Strongest Hacker

Chapter 77 Why Are Flowers So Red (Part 2)

Chapter 77: Why Are Flowers So Red (Part 2)

No matter in his previous life or in this life, his actual combat experience is too little. Although he was ranked No. 1 in the red field in his previous life, it is a pity. That ranking is just that. In fact, although he managed the invasion himself, thanatos gave him a lot of advice and help. At least some side details were handled by thanatos for him.

Technology and experience complement each other, and only when both of them have reached a certain height can one be a real super master. Just like some recruits may be very good at shooting targets, and they may be very good at using sniper rifles, but after going to the battlefield, I am afraid that some veterans who have not undergone systematic shooting training will kill more people than him. This is the basis of experience. importance.

Of course, when this recruit becomes a veteran, his strength will be terribly improved!

The reason why this person scanned the power system was not aimlessly, but premeditated. The power system and the telecommunications system have the same purpose.

The power system in the United States has an independent power supply network. Don't underestimate these power supply networks. Although Symantec does not have many employees, Symantec has a huge server group, so what Symantec needs There will be a dedicated person in charge of the power network.

And the power network that provides power supply is bound to connect with Symantec's internal network, and then coordinate the power supply. It is obviously more unthinkable to think about it than the telecommunications network, but it is also very difficult to invade from here. After all, there are too few places where the power network exchanges with the ordinary network.

Although he didn't know the purpose of this person, Zhang Yang quickly began to hide his data flow, because Zhang Yang came in first, so Zhang Yang saw all the traps he set, and carefully kept himself from touching these traps, Zhang Yang Soon followed this person into the power system.

Zhang Yang soon discovered that the person's goal did not seem to be to invade Symantec's network through the power system, but to first open the power management system of the block where Symantec was located. You know, the US network The use is more comprehensive than that in China, just like the power network system, which can be directly operated in the city management system, and then shut down the power supply of each block.

From the power management system, it can be easily seen that there are three power gates in charge of Symantec, two of which are backup gates. The power supply of these large security enterprises must be guaranteed at the first time. From another level, it can be seen that the crisis awareness of the United States is really strong.

This can be seen from Hollywood movies. There are not one or two movies about hackers in Hollywood movies. For example, the hackers in the super blockbuster "Die Hard 4" are a bit exaggerated, but they also react from the side. America's sense of crisis.

And this backup power is obviously there to deal with these emergencies. Soon Zhang Yang saw that this person hit the target in a power supply area. This is the backup server of Symantec. These backup servers are usually in a dormant state, but they are also running at any time. Once there is a problem with the main server, Standby servers that are dormant will be activated automatically, and the network interface between them will directly transfer traffic to the standby server.

This hacker directly shut down the power supply of the backup server of Symantec. It has to be said that although Symantec has a data center in Cupertino, the backup server and the main server are not in the same data center.

It seems that the data center where the main server is located is newly built by Symantec, and the backup server is a former small data center.

The moment he shut down the backup server, Zhang Yang figured it out. There is a network interface and a trigger system between the backup server and the main server, so that the traffic can be transferred to the backup server as soon as the main server has a problem. For one thing, when the standby server is powered off, there will be a shortage of data exchange in the system on the main server side.

Even if these data exchanges are on the intranet, the system is the system, and the main server will conduct self-inspection immediately to check what is wrong. In this way, most of the performance of the main server will be transferred to self-inspection Above, this gives these hackers an opportunity.

"A master." Zhang Yang couldn't help admiring. At this moment, he was sure that this person was definitely a domestic hacker. Otherwise, hackers from other countries would not come to trouble Symantec at this moment. .

Soon Zhang Yang noticed that at the moment when the hacker cut off the backup server, the Symantec server monitored by Zhang Yang was immediately attacked by a large number of ddos ​​attacks. attack, but it is almost the same, and at this moment, we must know that Symantec's main server has started self-checking.

In this way, the huge amount of computing almost instantly increases the CPU usage of the main server. "It's still a group battle." Zhang Yang was happy.

At this time, Zhang Yang had already seen that this hacker secretly began to invade Symantec's internal network from the power system as Zhang Yang thought, and what he used seemed to be similar to viruses. Maybe let your own data flow analyze these things, in that case he will be exposed soon.

At this moment, Zhang Yang was already sure that Symantec was going to miss. Although they had prepared everything, they were still going to fall. This was the pain point of defense. Zhang Yang quickly erased all traces of himself, left the city management system of Cupertino City, and then really started to watch the excitement.

"Who is this person? Could this be the genuine GOD?" Zhang Yang rubbed his chin, thoughtfully, even GOD said it, this person's technical strength is definitely not bad, don't look at these things that seem to be very strange. Simple, but the technology involved here is not simple at all.

Even if Zhang Yang does it by himself, it is impossible to do better than this person, or even worse than others. This person's experience is of a terrifying kind.

Sure enough, the rapid ddos ​​attack did not last long, it was over in about 20 minutes, but after the ddos ​​attack ended, Zhang Yang found that Symantec's official website had been directly killed, and the official website An announcement has been posted.

***********

I'm speechless, and there are still people reading the comments from readers, tsk tsk, who am I to offend again, brothers, if you have nothing to do, let's click on the comments from readers! ! My ass hurts. The new book list has been blown up, 5555, please vote!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like