Under the premise of nDC, they can only make real guesses.

"There is a one-fifth chance of guessing right..." Chu Ying wiped her hands, "I guessed it casually?"

"Yeah." Shi Ye said.

Chu Yingzong resolutely guessed Fennel's No. 2 unit first, and pulled out the Viper to analyze it.

Viper concluded the target port, merged Lyrebird to automatically conduct a large number of dictionary attacks, but the other party responded quickly and limited the number of login attempts, resulting in the failure of dictionary attacks.

Under Shi Ye's command, Chu Yingzong chose to cheat Fennel on the gateway, trying to obtain information about the data path from his nDC network.

They quickly located Fennel's gateway device, then used DNS spoofing to finally gain access to its network administrator.

However, their problem now is: even if they get Fennel's gateway, they still cannot decrypt the plaintext content of all data packets.

Regarding this, Shi Ye decided: "Stay still, don't let him find out."

While they secretly infiltrated the Fennel network, Fennel did the opposite and carried out a full-scale attack swaggeringly——

He used the method of SYN flooding to attack all the equipment of Signale directly like a tide.

Because Signale uses the onion network, a secure but complicated anonymous protocol, it is easy to cause network delays under SYN flooding.

At one point, his internet speed dropped to the point where it was almost disconnected.

Until Shiye quickly made a counterattack strategy, restricted all half-open ports, and at the same time reverse-engineered to find the No. 3 device Fennel used to attack, and began to block his communication with similar means.

4:00 am sharp.

Both parties have carried out at least two rounds of attacks. Currently, Signale and Fennel have 5 and 4 devices left respectively.

It's time again to release news.

[Fennel: I'm still trying to find your real host, but you seem to have started the process of guessing?Pinning your hopes on luck is not a good decision. 】

[Signale: LOGS injection is not a good method either. 】

In the new development, Fennel also cracked Signale's website as expected.

He tried to inject logs, and at the same time used a lot of SYN flooding methods to try to divert Signale's attention.

But Shi Ye was obviously not fooled by him, and said to Chu Yingzong: "He is very interested in database logs."

Chu Ying pondered for a while and said, "It's obviously just a lite-level database, so there's no need to spend a lot of time."

Shi Ye said: "Maybe there is something hidden in his database."

After hearing this, Chu Ying decisively decided to attack Fennel's database.

4:21am.

They obtained Fennel's back-end database through SQL injection, and found Fennel's data packet path from it.

Chu Yingzong was very surprised: "He actually hid the route table in the back-end database! Why is that?"

Shi Ye thought for a moment, and said, "He is good at flood attacks. It seems that he did this because he thought we would use the same method."

As soon as the voice fell, the honeypot firewall suddenly began to call the police in a hurry.

——Fennel's DDOS offensive has begun!

DDOS (pronounced "D Dawes"), that is, "denial of service attack", an indiscriminate flood attack method, is intended to make the device unable to communicate with the outside world and block the entire network.

Fennel's DDOS attack was extremely rapid, and after DNS amplification, it could be divided into several continuous waves. The peak time period once reached 200 visits per second, directly blocking their network with its amazing efficiency.

Although their CDN countermeasures are very complete, when the network is blocked, the defense command cannot quickly pass from the host to each terminal device!

The drawbacks of the Onion Network are thus apparent. Before their order is delivered, two terminal devices lost contact.

At 4:30 in the morning, the new rule time came.

The remaining equipment of Signale and Fennel are: 3 and 4 respectively.

[Fennel: It seems that I have the advantage again. 】

[Signale: DDOS, an ancient method. 】

[Fennel: The methods are not new or old, as long as they are useful. 】

[Signale: Indeed. 】

[Fennel: It looks like you're still looking for my host, so good luck. 】

[Signale: Same. 】

At the same time, sweat dripped from Chu Yingzong's forehead, and she moved her hands quickly on the keyboard.

Taking advantage of the time when the two seemed to be chatting, he quickly used the Fennel gateway they had just conquered - device No. 2, to perform a DNS spoofing on all other devices.

At 4:37, his attack had a miraculous effect, and he took down Fennel's No. 6 machine at a lightning speed.

However, neither No. 2 nor No. 6 is Fennel's host.

"boom!"

Chu Ying patted the table anxiously: "Damn, why are you so unlucky!"

There are still 3 devices left on both sides, and it seems that the real host is hidden in it.

After Chu Yingzong's attack just now, Fennel reacted quickly, decisively abandoned the No. 2 machine, and re-selected his own gateway to avoid the other devices from being deceived again.

Chu Yingzong looked back at Shi Ye asking for help, and said, "What should I do next?"

Shi Ye calmly said: "In the absence of deception equipment, we can only use attack methods."

Chu Yingzong nodded, and said: "You choose, I really don't have much confidence..."

"Don't be nervous." Shi Ye said casually, "Unit 3."

They started the really difficult process of attacking the fortifications—just like the ancient city walls that were piled up with human lives, through a lot of analysis by Vipers and manpower, they went to find the firewall loopholes of Unit 3.

This process lasted for more than 20 minutes, until another set time at 5:00, they just found a clue.

At this time, Fennel's new news has been released in advance.

【Fennel: Such a coincidence, did you also give up website defense completely? 】

[Fennel: But you forgot that there are important things hidden in the database. 】

……

Seeing this, Chu Yingzong was taken aback, looked back at Shi Ye and said, "No wonder he attaches so much importance to the database, did we overlook something?"

Shi Ye frowned slightly and did not speak.

Chu Yingzong immediately quit Fennel's backstage, returned to Signale's website backstage, and looked at the latest logs—and found nothing. Fennel either did nothing, or had enough time to clean up all the traces.

When Chu Yingzong was confused, he only heard Shi Ye say: "It's been tricked."

Chu Yingzong: "!!!"

Oops, fooled.

Fennel didn't do anything to the database at all, but tricked them into going back to Signale's backend - a leaky webpage!

Their XSS cross-site attack didn't work, but they stepped into the CSRF (cross-site request forgery) trap set by Fennel!

Fortunately, their visits have always been using their remaining No. 6 machine as a springboard, not the real host.

Chu Ying broke out in a cold sweat, and wanted to check the status of No. 6 aircraft.

Shi Ye stopped him and said, "Unit 6 has fallen, don't be deceived. It can be removed now."

Chu Yingzong's stupid hair drooped, and he said listlessly: "I'm sorry, it's all because I was too anxious."

Shi Ye shook his head and said, "It's not your problem."

At 5:06 in the morning, Fennel made another move.

【Signale: Nicetrick.】(Nice trick.)

[Fennel: thx:)] (Thank you.)

The remaining equipment of both parties:

2:3.

At 5:26 in the morning, Shiye successfully found the loophole of Fennel Unit 3 at the critical moment.

A buffer overflow vulnerability was left in their system, which they used to gain access to the system and successfully escalate their privileges to obtain an administrator account.

On this machine No. 3, they successfully found the running web server.

"YES!!!"

Chu Ying couldn't hide her excitement: "This is it!!! It seems that the No. [-] machine is the host of Fennel!!! Baby, you guessed right!"

Compared to his excitement, Shi Ye seemed very calm, and even watched in silence for a while, and said, "Stop the service first."

Chu Yingzong hurriedly sat back, and first controlled machine No. 3 to interrupt all services—that is, down Fennel's social networking site.

According to the rules of "Russian roulette," once Fennel's website is inaccessible, then it is Signale's victory.

However, things are not that simple.

5:30am.

【Fennel: Surprisingly, Unit 3 also lost contact. 】

【Fennel: You really are a genius in invasion. 】

But in fact, it was Chu Yingzong who was really surprised: "...What do you mean!! Why is his webpage service interrupted, and he can still post news?"

Shi Ye leaned closer, frowned slightly, and said, "Distributed services."

Chu Ying took a deep breath: "This is also okay? Kill a chicken with a sledgehammer?!"

Distributed service, Distributedsystem - Fennel entrusts the back end of the website to more than one machine.

This kind of practice generally belongs to very large-scale websites, such as TB, such as the real Facebook. The general reason is that a supercomputer can no longer afford huge calculations, so multiple servers are used to share the pressure.

However, due to the existence of the Matthew effect, the more servers there are, the lower the efficiency will be, and the greater the computing power and energy required to build the architecture.

Fennel's approach is more than just killing chickens with a sledgehammer, it should almost be compared to "anti-aircraft guns hitting mosquitoes".

From here, we can also see the difference between him and Signale——

Signale is a pure-blooded hacker, and almost all the tools at hand are used for aggressive intrusion;

But Fennel is also the builder of the decrypted website and the manager of the organization, and he also has top-level construction technology at hand.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like