Zhao Yi felt a little headache looking at the large piece of information, so he simply asked the idle Xiao Zhicheng to help 'chat', and he went to work with Professor Liu to write codes to prepare for the intrusion based on the obtained IP and port.

The job is simple.

Because the intrusion program has already been compiled, he only needs to fill in the target IP and port, and run and send them one by one.

If you know how to do it, it is even a bit like repetitive physical labor, but Zhao Yi and Professor Liu are very energetic.

Even Professor Liu finds it interesting.

The reason why hackers are attractive to people is probably because destruction is the nature of human beings, just like the "heroes" in some movies, who always have strong force values ​​and strong destructive capabilities. A technological, disruptive achievement.

Obviously.

Just looking for the IP of the target website and the corresponding open port is not difficult at all for the team members who have a certain technical level and have many software assistances.

Zhao Yi assigned about [-] URLs to each person, and it took less than half an hour, and the IPs and open ports of almost all the websites were sent over one by one.

Eighty percent of these IPs and open ports meet the requirements.

Zhao Yi also continued to run the intrusion program, and hung up the 'network bug' one by one on the specific port of the website.

……

Oakland, California.

Old Jem's son has signed up for the Oakland police training, and if he passes it, he can officially become a probationary policeman.

Old Jem cared about his son very much. When he woke up in the morning, he opened the website of the Oakland Police Department to see if there was a new list in the latest announcement on the website. He had opened the website several times and could easily find the news column.

This time is different.

When the website is loaded, a prompt pops up at the bottom of the browser, "Do you want to load the XXX program, from the website..."

"load!"

Old Jem chose to load it without hesitation, because the program came from the website of the police station. The website of the police station must not contain viruses, right?

Immediately he stopped thinking so.

After clicking Load, the computer seemed to be stuck for two or three seconds, and then a large blood-red word suddenly popped up in the middle of the screen——

"caution!"

"Your computer has been invaded by a Trojan horse!"

The words faded away.

Near the middle, a black eagle pattern appeared. The pattern is purely composed of numbers, and the painting is really crude.

But...that's not the point!

Old Jem stared blankly at the computer screen, stood up suddenly and said angrily, "What kind of police station is this! They even sent a Trojan horse to my computer!"

Simultaneously.

Many users who visited the police station's website found that they had been "hit by a Trojan horse". They directly blamed the police station and made complaint calls one after another.

The Oakland Police Department received a large number of complaints, and hurried to find professionals to see what was going on with the website, and found that the problem could not be found in a short time, so they simply shut down the server.

The same thing happens on many sites.

The last attack target of overseas hackers was a domestic public service website, and the attack target of Heart Alliance is also a public service website, that is, an extranet that is closely related to government departments.

Most of the public service websites now only have the function of 'publicity', and it is rare to have services.

Rare doesn't mean nonexistent.

The tax agency of Texas has opened a portal for querying tax refunds on its external public service website, so that taxpayers can check the specific tax refunds and overpaid amounts of the previous year.

This service is nothing more than ten years later, but it is a bit ahead of the curve now.

The tax agency in Texas is well received and has also increased a large number of visiting users, especially when the service is open during business hours, the number of visits increases sharply.

The visiting users of this day did not have any good comments on the Texas tax agency. They found that their computers were 'installed' with a Trojan horse virus by the tax agency's website?

Definitely installed!

'Your computer has been invaded by a Trojan horse' is written in the middle of the computer screen.

Immediately.

A flood of complaints ensued.

This matter was on the media page immediately, and because of the media reports, more interested people visited the Texas tax website, and then the complaints became more.

This is an infinite loop...

Bad news for the Texas tax agency, whose tax website was overwhelmed with traffic and servers crashed, but good news, too, because there will be no new complaints.

If a website has a problem, it may be just a case. Dozens of websites have problems at the same time. Coupled with the actions of other teams, and more websites have been blasted and invaded, the problem becomes obvious. up.

Reports soon appeared --

"Our public services website has been hacked!"

"Hackers from the East!"

"Dozens or hundreds of websites will be installed with Trojan horse viruses. Terrible Trojan horse viruses can infiltrate users' computers!"

"This method is really terrible!"

"..."

The whole network is shocked!

Although there are many websites that have been invaded and attacked, Zhao Yi's "Hanging Eagle" is undoubtedly the most obvious, because "Hanging Eagle" follows the website and invades to the user level, and also makes the attacked website department be annoyed. The people are devastated.

No matter how serious the damage to other teams was, it was only at the website level.

As a result, the "website hanging eagle" has become a sign of being invaded. Almost all the media reported on the picture of the "hanging eagle" on the computer. In comparison, the destruction of other teams seems a bit small There is trouble.

Although "Hanging Eagle" does not have the function of Trojan horse or virus, it can make the visiting users feel that there is a virus in their computer.

This power is greater than Trojan horses and viruses.

Those website departments that have been 'hawked' can't find the reason in a short time. In order to reduce the pressure from the public, they can only choose to temporarily shut down the server.

The overseas media that reported the incident also named the intrusion program --- "Internet Black Hawk Virus". The reports described the virus as "terrible", "temporarily unsolvable", and "the attacked website can only be shut down. server to cope'.

'Network Black Hawk virus' has quickly become synonymous with 'terrible'.

Chapter 135 The Legend of the Eagle

"Yeah~~"

"Good job!"

Zhao Yi excitedly gave Professor Liu a high five, and Professor Liu also showed a happy smile.

This is indeed a success.

Professor Liu is the world's top computer research expert, but the field of computer is too big. His research content is related to artificial intelligence, and he has not studied the intrusion technology of hackers in depth.

of course.

That didn't help Professor Liu either.

It is also a novel experience for Professor Liu to be able to invade foreign websites together with Zhao Yi, especially the invasion was very successful. The released program invaded thousands, tens of thousands, or even more users' computers, forcing several [-]. Hundreds of websites shut down their servers, which can be said to have a very large impact.

Although there is no real damage, it is more powerful than direct damage.

Professor Liu thought more.

In many things in the world, where there is white, there will be black. Since the development of computer technology, the confrontation between black hats and white hats has always been staged in corners invisible to the public.

This is a battlefield without gunpowder.

The country's network security department must be pure white internally, and it does not necessarily mean 'white'. 'White' means that it can only passively defend. Extremely passive, occasionally you have to be more active in order to truly deter your opponent.

The intrusion program developed by Zhao Yi is so powerful that there is no need to directly intrude, but to directly track the user's IP on the port, which can almost be called a "cross-dimensional attack".

This intrusion program is too effective in defending security and deterring opponents.

……

The nineteenth squadron exploded.

The members of the [-]th team were very depressed because they had an 'irresponsible' captain, because they had little communication with each other, and they didn't understand the captain's skills.

When they heard that only IP and open ports are needed, they were full of doubts, wondering how to complete the intrusion through vulnerabilities?

They all have a certain technical level, at least they know some common sense of intrusion, and some can write related codes, but they still do it.

The players and captains of the League of Hearts do not belong to the real sense of superior-subordinate relationship, but there are too many ordinary players, and the skills to be captains are definitely not bad.

What the team members didn't expect was that the invasion effect was so good?

In fact, for more than an hour at the beginning, they didn't feel any effect, and even felt that the captain was paddling.

Overseas users will be "hacked" when they open the website, but they use a proxy server. When they open the "hacked" website, the program can only be traced back to the proxy server, and they can't see anything.

later……

Can't open every website?

If only one or two websites cannot be opened, it can be said to be a website problem, but if many target websites cannot be opened, it is definitely not a simple problem.

"Have you found out? Our target website can't be opened?"

"Most of them won't open!"

"Some can still be opened, but I found that the latest user comments on the website are all cursing..."

"Look, screenshot!"

"This website can't be opened either!"

"What did Captain Yiying do? This is too awesome! Yiying! Call Captain Yiying!"

"@一鹰!"

……

Cyber ​​Security Department.

In an office with a lot of display screens and a sense of technology, Zhou Ming sat with a few colleagues, all looking a little anxious.

Huang Guocheng is the department director of the security department. He is in charge of this counterattack on the overseas network. He tapped the keyboard continuously with his fingers, and a lot of garbled characters appeared on the screen. He asked suspiciously, "The other party is so powerful? They chased us so quickly server?"

"impossible!"

"What are these? A bunch of packets with calls to low-level functions?"

"Is it a Trojan horse program?"

"It seems to be tracking our visiting IP, looking for who the visiting IP is!"

soon.

The security department found the information. They tracked the location of several IPs and found that they were all from the [-]th team...

Team [-]?

Zhou Ming asked Zhao Yi when he opened the Penguin. He typed a line and simply deleted it. He found the target website information assigned by the [-]th team and tried to open it one by one.

Can't open most of them?

what happened?

"Look! The latest reports from overseas media!" A sudden exclamation came from the office.

A few people went over to watch right away.

The media in Oakland, California, reported the latest news --

Oakland Police Department website hacked! "

The article mentioned in the report that users who visit the website of the Oakland Police Department will be tracked by the hacker's Trojan horse program, and users are reminded to 'do not open the program that prompts to load'.

"There should be other reports, let's take a look!"

When looking for the latest overseas reports seriously, they quickly learned a lot of content--

"Super Virus Appears, Invading Users' Computers from Regular Websites!" "

"Terrifying Internet Black Hawk Virus! "

"Network Security Bureau: Our public service website has been attacked by hackers from the East! "

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like