Chapter 54 (1/2)
hk054 seems to have met First Grade Zombie
essCompany, Xia Nation is called Access Company and was founded in 1984. Headquarters is located in Wo Sang Nation Tokyo City. It mainly involves management consulting, software development, mobile network services, and Waiting for Internet browsers!
essCompany’s flagship product omfront browser, the number of mobile devices in Wo Sang Nation, is quite high!
The network-based company, in order to use the name of Supercomputer Swallow, looked to Tokyo University of Technology and applied for the lease of Supercomputer Swallow.
After finding this message, Shi Lei immediately searched the Access Company’s website homepage through the Internet Search Engine. From a company’s website home page, you can know a lot of things. For example, the recent status of the company, such as the company’s financial statements, or even the company member’s personal password, etc., can be seen from a company’s home page!
Shi Lei goes to the Access Company’s home page and looks at the company’s current situation. The company has a good development potential, especially the partner of omfront browser, which is actually the two giants NTT and Sony. [
After a while, Shi Lei tried to scan the flaw of the Access Company home page to get inside the website. As the company of tIndustry, the Company’s Company home page of Access has its own independent server instead of the leased network service provider.
Shi Lei identified the Server’s System and immediately drilled into the Server from an unreleased flaw. The Server of the Access Company home page holds a large number of files. Shi Lei looked around and finally found the thing he was interested in.
Access Company rents Supercomputer Swallow’s system resources is very small, they have a powerful Server, the reason to rent Supercomputer Swallow, just for the popularity of the company!
Shi Lei found the Supercomputer Swallow Signed In account and the login password inside the Access Company’s webServer. Originally, Access Company announced the account and password of the rented Supercomputer Swallow to each of the Company’s High Grade employees. Feel free to use the part of the Supercomputer resource that the Company rents. This is not the Access Company’s generosity, but their own research project, which is in a confidential need and cannot be sent to Supercomputer Swallow for processing, but is reluctant to waste Supercomputer Swallow resources. So, let High Grade staff, free to use Supercomputer Swallow resources!
Originally this was a benefit of Access Company, but now it is a convenient channel for Shi Lei to invade Supercomputer Swallow!
Shi Lei in the Access Company’s webServer, browsed it all the time, in the heart and thought about it, decided to use the Access Company’s Server, as the First Grade Zombie, officially ready to invade the Supercomputer Swallow!
Access Company’s Server, great!
This company has five Core Servers, which form the Server group. Each Core Server has a computing speed of 02Trillion times. The computing power of the entire Server group has reached One Trillion times per second. EQ uivalent to One Small. -scale Supercomputer!
In 2006, World Supercomputer Ranked, the calculation speed of Fifth, was only 27Trillion times. Also in other words, the Access Company’s Server group is definitely in the advanced ranks on the World!
After deciding to use Access Company’s Server, Shi Lei began to invade the Access Company. Because Access’s Server group reached the level of Small-scale Supercomputer, Shi Lei carefully controlled the Number One Server and scanned the open interface of the other Server group.
Shi Lei has invaded the Access Company’s webServer, but the webServer is only used for the Company home page, and stores some unimportant file data. Company’s Core data, all of which exist in five Core Servers, the server group!
The speed of the Number One Server is ultimately unsatisfactory, and Shi Lei can’t help but secretly, but can help!
While waiting for the results of the Number One Server scan, Shi Lei is on Fantasy, and in a sci-fi novel, a broken notebook can black out the Satellite’s Exceed Grade ability. If he also has the ability to fight against the sky, how good it should be!
In Hacker’s behavior, intrusion, acquisition, and control are different meanings. For example, a server that stores confidential files does not invade into the server and can get confidential information.
There are a lot of authority settings in the same server, and confidential files are usually added with separate passwords. Therefore, even if you get a confidential file, you don’t necessarily get a secret, you also need Password Decode.
As for controlling a server, it is the most difficult! It is extremely difficult to get Controlling Right of a Server, especially the Controlling Right of High Grade Server!
The performance of High Grade Server is very powerful and it is very cool to use. But the same, High Grade Server’s Safety Strategy, Server FIRE wall, is even more difficult to fix. And, Safety On-duty Personnel!
Although Shi Lei knows a lot of Server System, the unpublished flaw, but it is not to do as one pleases, whoever wants to be black is black. Every time a Hacker intrusion happens, a network link must be established. Once the network link is established, it will cause data communication. If the High Grade Server’s Safety On-duty Personnel is ready to observe the data flow, any anomalies will be discovered. For example, the Server is likened to a pool filled with water, and the network link is like an outwardly connected water pipe. When the server is under normal conditions, there is no data exchange, that is, when the water pipe does not flow outward. If Hacker sneakily added a water pipe to the flaw, can the Safety On-duty Personnel not find water leaks?
Number One Server slowly scanned out the Access Company, the Server group interface was open, and Shi Lei was thankful for the flowers. After finding the appropriate interface, Shi Lei directly uses the Access Company’s webServer to simulate the internal communication of the Access Company and request access to the Server group. [
After the server group receives the request from the webServer, since both parties belong to the inside of the Access Company, the FIRE wall of the server group does not block the request of the webServer, Shi Lei sneaked into the server group through the unpublished flaw through the normal request!
After entering the inside of the Server group, Shi Lei did not act rashly, but began to probe the FIRE wall of the Server group. If you don’t fix the FIRE wall, I am afraid that Shi Lei will just clean up the authority group, and the FIRE wall will issue an alarm!