The Technology Tree of Xueba

Chapter 58: Hacking (Part 1)

Xiaomi, what's the situation in the data center? Is the data connection between the Protoss bracelet and the data center interrupted?

Zhou Yu immediately contacted Xiaomi and asked him what he was most concerned about.

Xiaomi: [The data center was attacked, the hacker did not break through the firewall of the data center server, the data was intact, and the server provided normal network services for the Protoss bracelet. 】

After Zhou Yu finished reading Xiaomi's report, he said relaxedly: The data center is fine, and the services of the Protoss bracelet are not affected.

Don’t worry, our data center has very strong security. There is no other way to get the data except sending people into the data center to directly read the data through the storage matrix. In the most critical moment, Xiaomi can directly destroy the hardware. Cyber ​​attacks are completely child’s play for it.

Zhang Yunqiang wiped the sweat from his brow, and said cheerfully: This is the first time I have encountered a full-scale hacker attack, and I feel a little flustered. I will go back to find the reason and solve the situation that the network cannot be accessed.

I'll go with you, and you can call Xiaomi to solve any difficult problems, but some functions of Xiaomi cannot be used with your permission.

Xiaomi, crack the hacking method and try to fight back. Zhou Yu said.

Zhou Yu and Zhang Yunqiang came to Xinghuo Smart’s office area together, and the R\u0026D center moved to the high-tech park in DX District. Most of the area was empty on this floor. Even if Xinghuo Smart expanded its staff several times, this place is enough to accommodate them.

Xiaomi: [The specific cause of the problem has been found. Our company website cannot be parsed, which prevents the outside world from accessing our company official website. 】

[A honeypot decoy system is being deployed on the server, hacker information is collected through anti-intrusion programs, and preparations are made to find out the hacker's real location and identity. 】

Seeing the analysis results displayed by Xiaomi, Zhang Yunqiang speculated: If there is an accident with the root server, all websites will be inaccessible, and now only our company website is inaccessible.

I speculate that the hacker attacked the DNS server. He polluted the DNS server and made our company's domain name unresolvable.

The DNS server is the domain name of the backup root server. The DNS service provider arranges DNS servers in each area, and they resolve local domain name access requests.

This kind of attack is easy to solve. I immediately contacted a well-known DNS service provider and asked them to restore the resolution of our company's domain name.

Zhang Yunqiang began to send multiple emails to the world's mainstream DNS service providers.

When he received the feedback from the DNS service provider, his face changed slightly, and he immediately reported to Zhou Yuhui: Mr. Zhou, it's not a DNS problem, it's the US main root server that deleted our company's domain name.

This is equivalent to our company website being directly removed from the Internet.

The U.S. authorities are so ruthless, they are not afraid of causing a chain reaction. Lin Yun, who had just walked into Zhang Yunqiang's office, asked.

She came to find Zhang Yunqiang urgently because the official website could not be accessed, and the express company could not read the express delivery information of Xinghuo Technology.

Zhang Yunqiang immediately introduced: The IPV4 root server is managed by the Internet Corporation for Assigned Names and Numbers, which is a private company, and it is not directly managed by the US authorities.

You can directly cancel the corresponding domain name according to the company's internal rules and regulations.

I understand. As soon as the protoss bracelet came out, Apple's stock price fell slightly, and the U.S. stock market suddenly fluctuated.

International capital took action to let this domain name management company directly blacklist us, create topics, and take the opportunity to damage our company's reputation.

I remember that there is not an IPV6 root server in China, can it not provide us with analysis services? Zhou Yu asked.

Zhang Yunqiang introduced with a wry smile: Mr. Zhou, we senior people in the industry have always understood that the word Internet is not accurate, and the word that really accurately describes the Internet is 'US Internet'.

The United States is the absolute hegemon in the Internet field. More than 99% of the network protocols are established by the United States. They also control the main root server for all domain name resolution.

Domestic Snowman plans to establish an IPV6 root server network, which needs to connect data from the root server of Japan.

To put it bluntly, the Snowman Project is to build a local area network with IPV6 as the core, and its role is not as great as imagined.

Our company can rely on the IPV6 root server to provide resolution services in China.

However, the IPV6 network protocol has not been popularized, and most networks still use the IPV4 network protocol, and foreign netizens cannot visit our official website.

Why hasn't the network service of the Protoss bracelet been affected? Zhou Yu responded and asked.

Mr. Zhou, the root server resolves the domain name. The IP address of our server is built into the Morningstar system, and it does not need to be resolved by the root server.

To make an inappropriate analogy, when you travel abroad, you need map software to guide you.

But when you go back to your own home, you already know this direction, so you don't need a map software to navigate.

Not only the Morningstar system accesses our company's official website, but also the Android system uses the software we developed, and can also directly access the official website. Zhang Yunqiang explained vividly.

Then is there a way for netizens to directly access our company's website through a browser, and the courier data must be restored as soon as possible. Lin Yun urged anxiously.

Zhang Yunqiang shook his head and said: Without a domain name, it is definitely impossible to access, unless he directly enters our company's IP address.

Using an IP address to access is very complicated. To open each webpage, you need to enter a different IP address again. Who would access a website through such a troublesome method.

Zhou Yu suggested: You can develop a small desktop program. Just click on this small program to directly call the browser to log in to our company's official website, and automatically assign an IP address to it.

This is a 'no way' method, and it is easier than entering an IP address. Zhang Yunqiang sighed.

He immediately wrote a small desktop program, which only needs to be run once, and the computer will permanently remember the IP address of any interface on the Spark Technology official website.

On the other side of the ocean, Jamiestin, a network engineer of Apple, is staring at the computer, typing on the keyboard from time to time. He has another identity, Lucifer, the captain of the famous dark net hacker team Dark Gemini.

[Lucifer]: Hades, have you broken through the firewall of the Spark Technology data center server?

[Hades]: I have conquered the 100th layer firewall, but still haven't conquered the server.

Now it has been discovered by Xinghuo technology technicians, and I am dealing with them.

How do you feel that the firewall is endless, and you can't find a chance to start.

[Lucifer]: As long as you get the source code of Xinghuo Technology's artificial intelligence technology, you can get 500 million US dollars.

[Hades]: The bounty on the dark web was blocked by us, and now it seems that the money is not easy to earn, so we directly removed the bounty block.

Directly causing hackers from all over the world to attack Xinghuo Technology, muddying the water and then waiting for an opportunity, I don't believe that Xinghuo Technology can resist the attacks of hackers all over the world.

[Lucifer]: This idea is really good, but not all hackers are lawful and evil like us, who only attack mission targets and do not take the initiative to harm others.

Many of the hackers who are as famous as us are violent. Their actions will definitely cause great disturbances. I don't believe that Xinghuo Technology will not show its flaws by then.

The world-renowned dark web has announced a huge reward.

Xinghuo Technology's artificial intelligence source code is worth 500 million U.S. dollars.

This bounty is guaranteed by several well-known organizations on the dark web, absolutely authentic and credible, and the rewards are guaranteed to be redeemable.

The high price of the reward immediately made the international hackers move.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like