Chapter 588 : Invade the Western Super Lab!

The supercomputer mine belongs to the Lawrence Livermore National Laboratory of the United States. This laboratory belongs to a comprehensive research laboratory, mainly researching life science and health, safety and energy, resources and environment, computing, chemistry, materials and so on.

As a comprehensive research laboratory, they need to calculate a lot of data, and the task of supercomputer mine is very heavy.

Chu Hao ignored the prompt and continued to search for the system vulnerabilities of the supercomputer mine.

“Sir, the system’s computing resources have been increased to 97%, and the system is running close to its limit!” 24 Yizuel issued a reminder again. The calculation tasks of the supercomputer mine are indeed very numerous. No wonder that when Chu Hao and Raphael were fighting, Rafite exposed supercomputer mines.



Chu Hao, who was sniffing for system loopholes, suddenly discovered a weird system loophole!

Chu Hao quickly checked the situation of this vulnerability, and after some calculations, it was discovered that the occurrence of this vulnerability was actually a serious system damage vulnerability. After 95% of the system’s computing resource occupancy has been checked, the system vulnerabilities are severely harmed temporarily.

Through this vulnerability, Chu Hao directly entered the permission group and obtained some permissions. After obtaining part of the permissions of the permission group, Chu Hao immediately searched the list of members of the entire permission group within the permission group.

There are many lists of permission groups for supercomputer mines. Chu Hao just searched it to see if there are hidden permission users, and did not intend to make any changes.

The process of retrieving the list of permission groups went smoothly. Under Chu Hao’s careful operation, no alarm settings were triggered. The entire authority group has a large number of B-level, C-level, and D-level authority accounts, a small number of A-level authority accounts, three S-level authority accounts, and a hidden SA super administrator account.

Under normal circumstances, including S-level authority accounts, the SA super administrator account cannot be checked. Chu Hao uses special methods to check the information of the SA super administrator account.

When inquiring about the SA super administrator’s information, Chu Hao blocked a total of three triggers. If someone with a little less skill comes, the alarm will definitely be triggered.

After finding the information of the SA super administrator, Chu Hao did not take the approach of changing the authority group as a whole this time. After all, it is very troublesome to change the authority group as a whole, and it is necessary to completely analyze the operating system of the supercomputer mine. This is not a simple matter. It will take a long time to analyze the details of a closed operating system of a supercomputer.

Chu Hao does not want to master the supercomputer mine for a long time, but intends to borrow the supercomputer mine to do a little disharmonious thing, just hold it for a short time.

Therefore, Chu Hao did not even change the situation of the authority group, and directly obtained the account password of the super computer Thunder SA super administrator through the loopholes in the 787 part of the authority group.



In other words, Chu Hao just borrowed the losing account password instead of creating an account password for himself. Simply put, it is equivalent to Chu Hao having stolen the account. You can use the stolen SA super administrator account to use all the resources of the supercomputer mine.

After obtaining the account password of the SA super administrator, Chu Hao first checked the correctness of the account and password. After confirming that the account is available, Chu Hao immediately used the authority of the SA super administrator to modify the settings of the supercomputer mine, and SA super administrator account information. .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like