Learning God in Hand, I Have the World
Chapter 62 The Story of the Panxia 12┃Zhuang Li: I like Zhu Jianrui a little bit.
Friends, attack them together.
7480 kept shaking his head, and his attitude became more and more relaxed: "It's useless, they are not Zhu Jianrui's opponents."
Only then did Zhuang Li post a new post.
Thanks to the previous post, his popularity on the dark web has reached its peak. As soon as he spoke, hackers all over the world flocked to listen carefully.This time, instead of praising how powerful MIK's network is, he pointed out two fatal loopholes in the network - "meltdown" and "ghost".
Through the "meltdown" vulnerability, low-privileged users can also access the system's memory beyond the boundary, thereby downloading local data.
Through the "Specter" vulnerability, an attacker can use a malicious application to obtain user-level private data that should be quarantined.
In other words, as long as these two loopholes are identified, the previously impenetrable MIK network will become a sieve.
Zhuang Li picked up his coffee cup after posting the post, and sat in the afternoon sun to enjoy the comfort and tranquility of this moment.
But there was an extreme carnival on the Internet.In order to verify whether these two vulnerabilities really existed, countless hackers poured into MIK, and were pleasantly surprised to find that they succeeded!
At the same time, Zhu Jianrui, who was sitting in front of the computer laughing and watching the hackers fall into the sand, showed a shocked expression.His computer went black, and no matter what key he pressed, he couldn't start it up, and he couldn't force it to shut down.
Immediately afterwards, his secretary rushed in and quickly said, "President Zhu is not well, the screens of the computers in the whole company are all black!"
"You calm everyone down, don't panic, I can solve this problem right away." Zhu Jianrui took out his laptop, connected to the intranet, and started to fight back.
But to no avail, these hackers have flooded into MIK's management background, and wantonly logged off PCs and servers.
Within seconds of Zhu Jianrui turning on his laptop, more than 1000 personal computers and 500 servers in MIK were logged off, and all backups were cleared.
Zhu Jianrui wanted to restore the data, but found that the boot sector had also been deleted, and all internal data had been stolen and shredded.That is to say, there is no way to restore MIK's system, and the lost files will never be retrieved.
A lot of cold sweat broke out on his forehead in an instant, and without thinking, he took out another mobile phone from the hidden compartment of the drawer and sent a message: "Help!"
As the most powerful hacker in Huaguo, a large group of hackers naturally gathered around him, and he was their leader, with the authority to respond to everyone.
These people quickly joined the battle and tried their best to help Zhu Jianrui rebuild MIK's defense network.
Sitting in the afternoon sun, Zhuang Li watched this scene leisurely and comfortably through his laptop.He had already expected that Zhu Jianrui was not fighting alone, but to his surprise, the broker named Mima was also a hacker, and he was completely under Zhu Jianrui's orders.
That's interesting.
Mima secretly helped the Gong family with many things. If he is Zhu Jianrui's subordinate, it can be seen that Zhu Jianrui knew his life experience a long time ago, and secretly influenced the development of the Gong family.How old was he then?
"Zhu Jianrui is getting more and more interesting." Zhuang Li sighed carelessly towards the dense forest outside the window.
7480 secretly encouraged Zhu Jianrui: Come on, protagonist!You can do it, you are so powerful, you must do it!Hold on!
Fortunately, Zhu Jianrui's team really held on.They rewrote a set of defense programs at breakneck speed, covering up the previous loopholes. MIK's network is once again impeccable.
At this moment, Zhuang Li posted another post as a US hacker, pointing out several loopholes in the newly written defense program.
This kind of vulnerability is called "zero-day vulnerability" in the industry, also known as zero-day attack, which refers to a security hole that is exploited maliciously immediately after being discovered.They are not known to the general public and thus are vulnerable to hackers.The company being attacked doesn't even know how to defend against counterattacks.
The network is constructed of tens of millions or even hundreds of millions of programs, and it is impossible for every program to be seamlessly connected together.When running, they will always produce calculation errors of one kind or another, which is what the public calls loopholes.
In fact, the more programs there are, the more vulnerabilities there are.However, Zhu Jianrui's team prides itself on its superb technology, and the newly built defense system is actually composed of tens of millions of programs.
In the eyes of other hackers, it is solid.
But in Zhuang Li's eyes, it is a big net with loopholes and loopholes.
The zero-day attack has begun, and it's another frenzied looting. MIK's new network collapsed not long after it was built, and this time, Zhu Jianrui, who had gathered dozens of the best hackers around him and couldn't make a comeback, finally smashed the computer in frustration.
He growled like a madman, grabbed his hair, and finally fell to his knees.
He knew that the MIK he had just acquired was over!Because its database not only saves the private files and scandals of all stars, but also saves all the films and TV series that MIK has invested in and produced recently.
MIK will become notorious if hackers spread the scandal of those stars to the Internet.
If hackers make those movies and TV series into torrents for free download, the billions invested by MIK will be lost.
As soon as Zhu Jianrui bought this company, he faced bankruptcy. Counting the time since he took over the skyscraper, it was less than a day.
Outside the window, a bloody setting sun slowly descended, just as the brilliant life of this genius boy had ended before it even started.
7480 kept shaking his head, and his attitude became more and more relaxed: "It's useless, they are not Zhu Jianrui's opponents."
Only then did Zhuang Li post a new post.
Thanks to the previous post, his popularity on the dark web has reached its peak. As soon as he spoke, hackers all over the world flocked to listen carefully.This time, instead of praising how powerful MIK's network is, he pointed out two fatal loopholes in the network - "meltdown" and "ghost".
Through the "meltdown" vulnerability, low-privileged users can also access the system's memory beyond the boundary, thereby downloading local data.
Through the "Specter" vulnerability, an attacker can use a malicious application to obtain user-level private data that should be quarantined.
In other words, as long as these two loopholes are identified, the previously impenetrable MIK network will become a sieve.
Zhuang Li picked up his coffee cup after posting the post, and sat in the afternoon sun to enjoy the comfort and tranquility of this moment.
But there was an extreme carnival on the Internet.In order to verify whether these two vulnerabilities really existed, countless hackers poured into MIK, and were pleasantly surprised to find that they succeeded!
At the same time, Zhu Jianrui, who was sitting in front of the computer laughing and watching the hackers fall into the sand, showed a shocked expression.His computer went black, and no matter what key he pressed, he couldn't start it up, and he couldn't force it to shut down.
Immediately afterwards, his secretary rushed in and quickly said, "President Zhu is not well, the screens of the computers in the whole company are all black!"
"You calm everyone down, don't panic, I can solve this problem right away." Zhu Jianrui took out his laptop, connected to the intranet, and started to fight back.
But to no avail, these hackers have flooded into MIK's management background, and wantonly logged off PCs and servers.
Within seconds of Zhu Jianrui turning on his laptop, more than 1000 personal computers and 500 servers in MIK were logged off, and all backups were cleared.
Zhu Jianrui wanted to restore the data, but found that the boot sector had also been deleted, and all internal data had been stolen and shredded.That is to say, there is no way to restore MIK's system, and the lost files will never be retrieved.
A lot of cold sweat broke out on his forehead in an instant, and without thinking, he took out another mobile phone from the hidden compartment of the drawer and sent a message: "Help!"
As the most powerful hacker in Huaguo, a large group of hackers naturally gathered around him, and he was their leader, with the authority to respond to everyone.
These people quickly joined the battle and tried their best to help Zhu Jianrui rebuild MIK's defense network.
Sitting in the afternoon sun, Zhuang Li watched this scene leisurely and comfortably through his laptop.He had already expected that Zhu Jianrui was not fighting alone, but to his surprise, the broker named Mima was also a hacker, and he was completely under Zhu Jianrui's orders.
That's interesting.
Mima secretly helped the Gong family with many things. If he is Zhu Jianrui's subordinate, it can be seen that Zhu Jianrui knew his life experience a long time ago, and secretly influenced the development of the Gong family.How old was he then?
"Zhu Jianrui is getting more and more interesting." Zhuang Li sighed carelessly towards the dense forest outside the window.
7480 secretly encouraged Zhu Jianrui: Come on, protagonist!You can do it, you are so powerful, you must do it!Hold on!
Fortunately, Zhu Jianrui's team really held on.They rewrote a set of defense programs at breakneck speed, covering up the previous loopholes. MIK's network is once again impeccable.
At this moment, Zhuang Li posted another post as a US hacker, pointing out several loopholes in the newly written defense program.
This kind of vulnerability is called "zero-day vulnerability" in the industry, also known as zero-day attack, which refers to a security hole that is exploited maliciously immediately after being discovered.They are not known to the general public and thus are vulnerable to hackers.The company being attacked doesn't even know how to defend against counterattacks.
The network is constructed of tens of millions or even hundreds of millions of programs, and it is impossible for every program to be seamlessly connected together.When running, they will always produce calculation errors of one kind or another, which is what the public calls loopholes.
In fact, the more programs there are, the more vulnerabilities there are.However, Zhu Jianrui's team prides itself on its superb technology, and the newly built defense system is actually composed of tens of millions of programs.
In the eyes of other hackers, it is solid.
But in Zhuang Li's eyes, it is a big net with loopholes and loopholes.
The zero-day attack has begun, and it's another frenzied looting. MIK's new network collapsed not long after it was built, and this time, Zhu Jianrui, who had gathered dozens of the best hackers around him and couldn't make a comeback, finally smashed the computer in frustration.
He growled like a madman, grabbed his hair, and finally fell to his knees.
He knew that the MIK he had just acquired was over!Because its database not only saves the private files and scandals of all stars, but also saves all the films and TV series that MIK has invested in and produced recently.
MIK will become notorious if hackers spread the scandal of those stars to the Internet.
If hackers make those movies and TV series into torrents for free download, the billions invested by MIK will be lost.
As soon as Zhu Jianrui bought this company, he faced bankruptcy. Counting the time since he took over the skyscraper, it was less than a day.
Outside the window, a bloody setting sun slowly descended, just as the brilliant life of this genius boy had ended before it even started.
You'll Also Like
-
Reborn Nobleman: Starting From Eagle Sauce, He Made Hundreds Of Billions
Chapter 156 1 hours ago -
I Traveled Through 36 Worlds At The Same Time
Chapter 289 1 hours ago -
Journey to the West: Reform of the Underworld and the Start of Developing the Internet
Chapter 188 1 hours ago -
Reversing life starts with saving the most beautiful educated youth
Chapter 188 1 hours ago -
Diamond company shoots commercials, you shoot Titanic
Chapter 139 1 hours ago -
Curse Back: From Demonic Hollow to Heroic Spirit Summoning
Chapter 131 1 hours ago -
The World of Omniscient Spirits
Chapter 187 11 hours ago -
Holy Covenant Master
Chapter 103 11 hours ago -
Quick Wear: The yandere boss always wants to monopolize me
Chapter 117 11 hours ago -
Undertale starts with Sans' abilities
Chapter 92 11 hours ago