Chapter 175: Sleepy to send pillow (below)


Chapter 175 Sleeping and Sending a Pillow (Part 2)
Zhang Yang did not go to the nubi forum. Although the information in nubi may be more comprehensive, there are a lot of such messages in nubi. Even if someone posts some posts, I am afraid it will not be too detailed. Some domestic hacking forums are different. By the way, although these hacker forums may be relatively backward in terms of learning materials, on this kind of news, there are naturally people who have long-term irrigation forums to release the latest news. ;
Zhang Yang did not go to other places. As the Black League Forum entered the formal, there should be a lot of such news. After logging in to the Heimen Forum, he looked for it in the latest post, and Zhang Yang quickly found his goal. The title of the post is: Perfect Analysis of the Japanese Hacking Incident. Chapter 175 Sleeping and Sending Pillows (Part 2).
Clicking on this post and reading it, Zhang Yang felt a little crying and laughing. This post is very detailed and a bit wordy, but the main thing is not clear. In general, there is a lot of nonsense in it. . Somewhat depressed, Zhang Yang found several posts with similar topics, and then found a point with the most comments.
The introduction of this post is more detailed, and all the things are told, especially the things Zhang Yang most wants to know are also reported in general. When he saw the last part, Zhang Yang's face was unusually weird, he didn't know how to describe it.
Is there really a situation called, someone will give a pillow to sleep? Well, although Zhang Yang is not very satisfied with the result of this incident, at least in the analysis in these posts, the image of "invincible" established by gd in the hacking war has been shattered a lot.
When the gd retreated, it was tracked by several experts. At that time, there were definitely other hackers who were also staring at the server, and most of the domestic hackers, so it is not uncommon for someone to follow the excitement, but these tracking experts have been tracking to a level. Chapter 175 The sleepy delivery pillow (below) was rid of the gd, so difficult, at least in the eyes of these rookie hackers is quite difficult, in the eyes of these rookie forums, the should be shot Play spike
That’s why the Great God, whether it’s getting rid of the enemy or invading the server, should be killed in seconds. Although in the view of Zhang Yang’s masters, this hacker can get rid of the tracking of seven or eight masters in such a short time. The strength is already very bullish, even though it may be a little worse than Zhang Yang, but it is also worse than Zhang Yang has the technology to lead the world for several years, not the strength between the two themselves.
Of course, these rookies don't control this way, so the person who posted this post, although explaining the process of the matter, still showed a little "disappointment" to gd. Zhang Yang's emotions are a little weird. He has just pretended to be GD, and some people are now posing as him, although Zhang Yang believes that if it was him, it should be better than this master's situation.
But these are not the most crucial. The most important thing is that this master is posing, which is very beneficial to Zhang Yang’s current situation. If Bai Su is a special agent of Guoan, then Zhang Yang is really not in the dormitory at noon today, but rather Eating out, this is the biggest witness
Of course, if the master can compare the retreat of the bull fork and manage these followers, it will be more perfect. Zhang Yang thought of something YY. Of course, GD, who was depressed, did not know that he not only did not make gd depressed, but inadvertently helped gd the greatest favor.
When doing this, GD didn’t tell anyone. As a result, at the end, he almost stolen the rice and lost himself, even paying for it. Even if he didn’t finish the game completely, he lost a level of the other hackers’ This is the biggest loss in the eyes, so after recovering, GD made a decision. He will never tell anyone about this matter, otherwise, it will be too embarrassing.
Of course, Zhang Yang didn’t know GD’s depression. He was almost happy now. This is the baby, so solid, is it because God has made himself a protagonist after rebirth, not to make him too ugly ? So why did it come out like this?
After clearing the truth of the matter, Zhang Yang ignored both ing and Gao Gang. After offline QQ, Zhang Yang thought about it and quickly opened the No. 1 satellite. While Bai Su was away, Zhang Yang had to confirm Bai Although he guessed that Bai Su should be a special agent of the Internet Supervision Bureau, Zhang Yang had no evidence to prove that some plans could not be implemented.
Zhang Yang did not directly pay attention to Guoan's servers. In fact, Guoan's network utilization rate is not high, at least to the outside world, but how many things inside it are through the network, Zhang Yang has no way to determine, domestically different In the United States, large-scale network applications are spread across almost all military systems throughout the country.
One of the reasons why the combat power of the United States ~ the military is so strong is that the joint control capabilities of the various arms of the joint command combat system exceed that of any country in the world. This is an inevitable disadvantage at home. In modern warfare, joint command combat capabilities are very important and prominent. The cooperation of various arms is king.
Therefore, the US military system has a common interface. Even the intelligence departments of countries such as CIA, FBI, and NA have relatively independent intelligence network systems, but they can also quickly access the military system at critical moments and complete the complete Redeployment to provide intelligence support to all levels of troops operating overseas
However, the domestic situation is much worse in this respect. This is both good and bad. The advantage is that in today’s relatively peaceful international environment, there is no unified system, and the speed of information transmission is not so slow. Go, but the cost for the enemy to obtain intelligence is much higher.
Especially in terms of network security, Guoan’s pressure will be much higher. After all, his internal intelligence system is not unified, and even if a hacker invades an intelligence system, it is impossible to get all the intelligence. This is one of the few benefits. At least there is no way to publicize it. Domestic public opinion monitoring is actually quite powerful. Unlike the United States, various ministries are responsible for the people, so many of his intelligence department systems are also almost public.
And some domestic intelligence department systems are not publicly available at all. If you want to invade these systems, you must at least find them? This search process is more troublesome.
Therefore, Zhang Yang was not prepared to invade the Guoan system. Even if he invaded the network system of the Guoan branch in City H, he might not be able to find his own information. Zhang Yang sneaked into the city’s public security system.
Guoan belongs to the police system, but it does not mean that the origin of the members of the Guoan is also under the police system. In fact, the police school cannot train the talents needed by Guoan, so most of the talents of Guoan are transferred from the army, then enter the police system, and finally allocated to In the name of Guoan, even so, a considerable number of military positions are still retained in some ministries within Guoan.
Compared with the national security system, the network of the police system is more comprehensive and unified. It is not difficult to enter the public security system in H city. The difficulty is to obtain a high-level account of the public security system. Zhang Yang is not just as simple as an invasion. He must also obtain a highly authorized account of the system so that he can find the information he needs in the public security system.
In fact, the administrator account mentioned in the usual invasion is two concepts. Since the invasion is successful, it means that Zhang Yang has the administrator account of the system, but this system is only a server operating system, and does not represent the entire public security. System, this is completely different.
The most vivid analogy is that the system administrator account obtained by Zhang Yang's invasion is just to log in to your computer, but he wants to steal your QQ, it is not necessary to know your computer system management account, You also need to get your QQ number and crack your QQ password.
Probably this is the case, the public security system is also divided into two, one is a large-scale WAN similar to the local area network, all public security organs across the country are in this network, and the other is a data network in this WAN The database, the host of this system is in the data center of the Ministry of Public Security, and the local public security organs need access to this database, account number and password.
Unless Zhang Yang invaded the server of the Ministry of Public Security, he still needs to crack the account. Relatively speaking, cracking the account is much simpler than invading the main server of the Ministry of Public Security. The server has confidential information from the Ministry of Public Security and various security mechanisms. Zhang Yang wants to invade it is not impossible, but he wants to consider the consequences after the invasion, and more importantly, wants to find information in it, It must invade silently and leave silently, which takes a lot of time.
Regardless of the country, the defense level of the server storing important information is extremely strict. In the public security system, Zhang Yang could easily find the computer of the director of the H City Public Security Bureau. In fact, it is not difficult to find this in the internal network.
It took less than twenty minutes for Zhang Yang to easily invade the computer of the chief of the public security bureau with an infected bug. In 2004, the popularity of the Internet was not particularly fast. More importantly, in this era~EbookFREE.me ~ People who are competent as directors of public security bureaus are probably over 40 years old. City H is a municipality directly under the Central Government, and in city H, the director of public security bureau must be one of the members of the Standing Committee of the municipal party committee, that is, provincial and ministerial officials, people of this age At least forty years of age, how many people at this age do you know about computers and networks?
This provides a large enough leak to know that the director of the municipal public security bureau has absolutely high authority in the public security system, and these officials themselves may not understand network security, and can complete basic computer operations, that is already The result of studying carefully.
In the system log, Zhang Yang easily found a login information. The security of the director’s personal computer is the responsibility of the network supervision detachment of the public security. For example, there must be a lot of important information in the personal computer of this level of officials, so the system has Backup.
After retrieving the login information file, Zhang Yang basically found nothing he needed with little effort. With this login account and password, the rest is simple, directly using the director's computer as a springboard, Zhang Yang quickly logged into the public security database, and then directly used the advanced permissions of this account for retrieval. A! ! ! ;
;
--------------
-------------
Latest chapter of Ebook The Strongest Hacker Click here