Chapter 266: I was caught in the door


The lowest odds in the handicap is that the support time of the magic fairy technology is within 1 minute, and the odds are one to one.
It was followed by two minutes, three minutes, and one hour.
The odds for one hour are very high, reaching one for ten.
In the end, there is a very funny odds, that is to lose ten thousand, betting on the magic fairy technology to win the contest against the world with its own strength.
Everyone believes that this is the organizer's intentional mockery of the magic fairy technology.
After all, in the hacker world, masters are indeed important, but the advantages of numbers are also obvious. At the same time I can enter more instructions than you, which is an advantage.
Of course, this number does not refer to those typewriters who can only type keyboards at random, but people who have certain network attack and defense capabilities and can carry out effective attacks.
How big is your fantasy technology? You are an industrial company with only one network management department responsible for repairing computers and maintaining websites.
Many people have bet that Huanxian Technology can support the time within one minute. Although the odds are low, no matter how little money is, isn't it?
In addition, some people pressed for two or three minutes. Their opinion is that since Magic Fairy dared to do so, they would have a certain degree of confidence.
In almost a short period of time, all bets have grown to $ 1 billion, and it must be said that these hackers are quite rich.
It also illustrates how sensational this matter is, and countless people are paying attention to it.
However, when it was about to be closed, an anonymous account suddenly smashed a million US dollars to win the magic fairy technology.
Is this so funny? You have a lot of money, right? Or are you crazy about money?
Ten thousand times the odds, this is really very tempting, but who can make it? There are still millions of odds for the China Lottery, but what are the odds of winning a special prize? In this matter, the magic odds of winning technology is even lower than the Grand Prize in the special prize.
The person who casts this bet must be caught in the door.
...
At this time, even those who are not in the mysterious profession of hacking on weekdays have more or less learned some news, and some social networking sites in China are even more lively.
The reception phone of Magic Fairy Technology was directly exploded, because numerous people warned Magic Fairy Technology over the phone that they must immediately shut down their servers and transfer the data away.
It's even better to destroy that server humanely, because for a master, even if you delete the data on the hard disk, they can still recover.
At this moment, the most distressed is the telephone operator of the administrative department of the magic fairy technology. The telephones they used to receive were mostly business consulting or after-sales services. However, the calls received now are all alarm calls from Huaxia people. .
These people are of good intentions and can't be scolded, so they can only say that it is a company's senior decision after expressing their gratitude.
What else can the caller say? Just to say that your high-level mind was caught by the door, and then hung up.
A few little girls who answered the phone laughed bitterly or bitterly this day, because what they heard the most today was this sentence. In the end, they all thought that the company's senior executives' brains were caught by the door.
...
Naga is an ordinary college student in France, with the romantic feelings unique to French people. For example, last night, he had a romantic encounter with a beautiful school girl, and finally went to a small hotel.
Waking up from this romance this morning, he forgets who the other party is. In his eyes, there was only one piece of news on the computer.
A piece of news related to Magic Fairy.
Although he is a native of France, he has also heard the name of Magic Fairy Technology, because he himself has a product of Magic Fairy Telescope.
This is a product that fills Naga with worship, and since having it, he finds that his lonely nightlife is much more interesting.
So he remembered the name of Magic Fairy Technology.
In Nagar's view, this is a ridiculous piece of news. How does Huaxian Technology put the technical information that is the lifeblood of the company on the official website server?
At this moment, Naga was excited. He thought that this was an opportunity for himself, an opportunity to become the world's top rich man.
No one knows that Naga has another identity, Naga, also known as Naga in Chinese.
Naga himself does not worship Hindu mythology, but after accidentally seeing the word Naga on the Internet, he liked the title that is homonymous to his name. Since then, he has given him another hidden identity and named him Naga.
As a result, there was a top hacker named Naga on the Internet. In just two years, his strength was recognized by hackers, and his ranking quickly reached the peers, becoming the top hacker who has climbed fastest in history.
However, in reality, Naga's life has not changed much, and he never thought about relying on hacking technology to make money in the bank, which is a taboo for hackers, and it is also almost impossible to do.
Now he saw the news, but he saw hope.
If you can steal the technology of the magic fairy technology on the official website server, you can definitely sell it for a good price.
Not to mention other, just the normal temperature superconducting material can be worth at least tens of billions of dollars. Once successful, Forbes rich list will have its own place.
He has confidence in his hacking skills, and this confidence has even reached a level of pride.
So he made up his mind not only to steal this information, but also to delete the original information from the server. This is a typical way of taking others and leaving others with no way.
Although he is arrogant, he is not stupid. He has been lurking in the dark, and at the same time, he has put all the hacking tools he has written on the fastest opening position, waiting for the battle on the Internet to begin.
...
The time points to noon on March 3 at 2 pm, when employees are at work.
More than 80% of hackers in the world are squatting next to their computers, staring closely at the monitoring data on the screen.
Suddenly, a slight fluctuation appeared. It was someone who sent a TCPSYN message to the server of the magic fairy's official website. According to the protocol rules, the official website server immediately returned a TCPACK message.
Under normal circumstances, the access initiator should return a TCPACK message at this moment, and the two can establish a connection.
No! Just another series of TCPSYN packets was sent over.
This is a typical TCPSYN denial-of-service attack, which is one of the most commonly used means of network attacks. Once this attack has formed a certain scale, the target server network will be paralyzed.
Of course, the attackers are not forced to paralyze the server, they just want to use this method to cover up their intrusion into the target server.
"It's moving!" At the moment when the hordes of TCPSYN packets were sent out, all the hackers who were waiting could understand that the time had come.
If you don't do it again, I'm afraid you won't even have the chance to drink soup.
For a time, these hacking organizations such as the Eight Immortals showed their magical powers across the sea, and they aimed their firepower at the server of the magic fairy's official website.
There is no doubt that this is a technical job for hackers all over the world. They not only have to attack the server of the magic fairy technology, but also beware of the destruction of their peers. In case someone goes too hard, the server is hung up , Then there is no need to play.
In fact, everyone has another worry, that is, if you can't figure out, Xianxian Technology will directly cut off the server power or network cable.
But this possibility is very low, because for the time being, the managers of Huanxian Technology seem to have a brain, at all costs, just to cause this online world war.
Naga also has such concerns. He hides himself with a string of normal code and sneaks into the server. Everything seems normal.
However, the moment he opened the server disk, he immediately realized that he had been fooled.
Because no matter which folder he clicks, there are countless folders below, and even if he continues to click, this folder is not rare.
A normal server cannot have so many folders, so this should be a virtual environment. Everything you see so far is just a simulation.
In technical terms, I am in a honeypot set by others.
Nimei! How can you make such a low-level mistake if you are a top-level hacker? Didn't find out before Mao entered the honeypot? Poor I just clicked on several folders severely just now, and I don't know if this has exposed himself.
It is not only Naga that encounters this scene. Everyone who sneaks into the "server" encounters the same situation. There are too many folders to start.
Many people know that they may have entered the honeypot, but how did they exit?
Cut off the data and re-enter it. This page is still open. This is impossible.
Some people do n’t believe in evil. After logging out, they will open the official website address of Huanxian Technology again.
Why do you enter the honeypot after following this address?
They invaded the network and naturally intruded according to the vulnerabilities they scanned ~ EbookFREE.me ~ But this honeypot was too successful to pretend, except for the vulnerabilities that allowed them to enter, no other can find Exit.
It feels like the little black house is closed ...
damage? There is no way to talk, you must find the gap first to destroy it?
Looking for another way to invade? It is true that there are many loopholes on this server, but after coming in, they naturally ran into this little black room, which could not be done.
The old US Central Intelligence Agency has a dedicated cybersecurity office, which is equally busy at the moment.
They are different from other individual hackers in that they exchange information.
When everyone invariably entered this weird honeypot, they knew that things were not as simple as imagined.
"Destroy the honeypot!"
"DDoS attack, let the other's system crash!"
"It's not like it's artificial, it's like a preset trap!"
Latest chapter of Ebook Fairy Technology Click here