Dominate South Asia

Chapter 501: Hacker Attack and Defense

A girl in fashionable clothes, holding a stack of books in her hands, walked in a hurry through the tree-lined road and went straight to the teaching building. Tall and straight Pakistani boys were riding bicycles, making a clattering sound. Some people were on the back seat. on, sitting smiling girl.

This scene is very similar to domestic universities. Seeing this, Hamad seemed to recall his college life. Although the life in the military academy was boring, it also had a lot of fun. For example, every time on the weekend, you could go to the medical university next door and take a look. Girls there.

Later, Hamad got a girlfriend, and he can still clearly remember that she looked very similar to Bai Xue.

Today's Pakistan has a lot of contact with the West and the social atmosphere has become very civilized. Hamad likes this, gradually diluting those traditions and making Pakistan a modern country.

"That's the School of Computer and Information Engineering." The accompanying Minister of Education said that the construction of this university is a key project of the Ministry of Education. He has been here several times and is familiar with its distribution.

"Let's go and take a look." Hamad said, leading everyone towards the teaching building.

In later generations, it was generally called computer school. It was not until many years later that information engineering was added. Computers alone cannot exert all their functions. Only when combined with the network and become a computer network can the application be fully utilized. Some functions come.

Therefore, after the establishment of Pakistan's computer industry, it has attached great importance to networking. The computer systems of all universities in Pakistan are connected to the Internet. With the university's backbone network as the core, a network covering a wide area has been established. Therefore, learning computer knowledge requires learning network knowledge.

It was time for class now. Mhammad casually opened the back door of a classroom, walked in gently, and sat behind the desk.

There were about a hundred students in front of them, listening attentively to the teacher above. They were so focused that they didn't notice that there were many people coming from behind to listen to the class.

Hamad looked at the lecturer in front of him. I was suddenly startled, isn't this Kevin Mitnick?

When he first went to Grumman, Mhamad relied on this talented hacker to obtain the fire control source code of the Tomcat fighter from Grumman, which played a very important role in imitating the flat-panel gap radar. Later, Mhamad just asked Pakistan's intelligence agency to keep a close eye on this talented hacker and bring him to Pakistan when necessary, but he did not think of it. He has already arrived?

"Everyone is welcome to take my course. The name of the course is called Network Offense and Defense." Kevin said exactly what he said: "Computer network is a great invention. When all computers are connected together through the network , can promote the progress of our entire era. Telegraphs and telephones are no longer needed. Just send an email on the Internet. When we hold meetings, we can also use the Internet. Use the Internet to conduct video conferencing. With the popularization of the Internet in the military, the president's orders can quickly reach the grassroots units through the network system. Police wanted criminals can be quickly spread throughout the country. However, the Internet is not very safe. , On the Internet, there is a type of person who specializes in invading other people’s computer systems, called hackers. What we are learning now is the hacker’s attack and defense techniques.”

"Teacher. Are you a hacker?" one student asked.

"Yes." Kevin said smugly.

"Then can you demonstrate it to us?" the student continued to ask.

"Okay." Kevin said, "Now, I will show you how to hack into a computer."

After speaking, Kevin sat down. There was a computer used for teaching in this classroom, and there was also a projector that projected onto the big screen in front of the classroom.

The students near the window closed the curtains next to them and the screen became clearer.

In fact, projectors have been around for a long time. If we want to say the origin, it is probably the ancient shadow puppet show, which is the prototype of the projector. The modern projector started in the 1950s and used CRT technology. Like a television, it is very large and expensive. Pakistan attaches great importance to education and has invested huge sums of money to equip universities with such advanced equipment.

At this time, the rows of letters above were beating continuously. It was not yet the 1990s, and there was no graphical operating interface at all. They were all the simplest DOS systems.

Time passed little by little, and when Principal Adil opened the door and came to Mhammad's side, the jumping characters on the screen suddenly stopped.

"Let's see what's on this computer." Kevin said, expertly entering a DIR command.

Suddenly, a lot of documents jumped out, and Kevin read: "Government work report, annual financial summary of the Free Government, report on increasing production in the Karashan Mining Area. Everyone, what we are invading now is the office computer of the Free Government of Afghanistan! "

These files are indeed from the computer of the Afghan Free Government! In order to facilitate the work of the Afghan Free Government, Pakistan provided a batch of computers, and also laid a network all the way to Jalalabad. I never expected that right before my eyes, I would be invaded by Kevin!

Fortunately, Pakistan's military network is separate from civilian use. Otherwise, Pakistan's military would have no secrets!

"I'm sorry, President." Adil felt his forehead and immediately broke out in a cold sweat: "This lecturer is one we recently invited."

Having hacked into the Afghan government's computer system, if any secrets are leaked, he will probably become a wanted criminal!

"Pa, pa, pa." Muhammad took the lead in applauding.

All the students followed suit and applauded. Some of them turned their heads and looked at the person who came in from behind. Why did he look so familiar?

"President Muhammad!" A girl shouted. She recognized that the person was the President of Pakistan!

Mhammad smiled and saluted Kevin in front of him. The two of them had a friendship.

"We rescued him from the United States this year." After getting in touch with the intelligence system, Muhammad heard the assistant's report to him.

Kevin Mitnick, the most famous hacker in history, was not idle at all. He went to Grumman with Muhammad and hacked into the system there. Kevin felt very satisfied. Later, he successfully broke into the "North American Air Defense Command System" and turned his target to other websites, such as the communication network system of the famous "Pacific Telephone Company" in the United States, and even the network system of the Federal Bureau of Investigation.

After entering the FBI, Kevin browsed the information there and found that the FBI was investigating a hacker. He was shocked at the time. This "hacker" was himself. So Kevin finally knew that the FBI couldn't do anything to him, and he was even more excited. The vulnerable network system was his target of attack! He could find endless fun in it! In a short period of time, he successively hacked into the networks of five major companies in the United States and destroyed the network systems, causing huge losses to these companies. As a result, this year, he was finally arrested by the FBI. Pakistani intelligence officers rescued Kevin and took him to Pakistan before the FBI police arrived.

Now, in a conference room at the university, Muhammad expressed a warm welcome to Kevin.

"Kevin, welcome to Pakistan." Muhammad said: "We had a pleasant cooperation in the United States. Now, we can finally cooperate again."

Kevin looked at Muhammad in front of him. Although he was a hacker, it did not mean that he did not understand the world situation. The person in front of him was simply a person who repeatedly created miracles. This was why Kevin came here from the distant United States. He felt that only by coming here could he better realize his ambitions.

"I am also very happy." Kevin said: "Otherwise, I would be in the FBI prison now. However, I can only teach students here, but I can't actually operate. It doesn't mean much."

Kevin's lifelong interest is in intrusion. If he can't be a hacker, his life will be very boring. This is why he came here to teach students the knowledge of network intrusion. He can only find a trace of satisfaction from the admiring eyes of those students, especially the fiery eyes of some female students, which makes him very comfortable.

"Kevin, you can hack into any network in Pakistan." Muhammad said, "I will not issue you an arrest warrant, but there is one thing, you can only hack, not destroy, and after the hack, you need to tell the other party that the computer has a vulnerability, and find out how to fill the vulnerability."

What Muhammad said is naturally the task of information security experts. Many information security experts have been hackers.

Pakistan's computer network is of course fragile. In the future, network attack and defense will also be a form of war, so Muhammad allowed Kevin to do this, test various networks in Pakistan, find loopholes and fill them.

In this way, Pakistan's network is more robust than that of the United States.

"Okay, then I won't be polite." Kevin said, "I promise you that I will only hack, not destroy, and find a solution."

"At the same time, you are also welcome to continue teaching here and teach students attack and defense knowledge." Muhammad said, "We need more people to learn network security."

There will definitely be talents among these students. After a few years, at the right time, a special information force will be established to deal with Americans! (To be continued ~^~)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like