Chapter 350: You just made soy sauce (Part 1)


Chapter 350: You are only making soy sauce (Part 1)
Chapter 350: You are only making soy sauce (Part 1)
After pondering for a while, Zhang Yang made a decision. Sooner or later, he will meet with the people of Anubis. This point is certainly undoubted. Even if Zhang Yang does not go to the other party, the other party may find every way to find Zhang Yang. Simply evading is not a publicity. You have to take the initiative to attack. Besides, evading every day may not necessarily avoid the other party.
Since he could not find news about anubis, Zhang Yang did not believe that there was no news about anubis in intelligence agencies like fbi. Zhang Yang could have asked the Black Hawk, but Zhang Yang had a hunch that the Ministry of National Security is in this regard. There may not be all the news of fbi.
If you want to get news from fbi, there is only one option to completely hack into fbi's system, not just the other party's official website. This is not so easy to do. The location of fbi's main server is confidential, and no one knows where it is, but there must be a network connection between fbi's main server and the official website. The difference is that there must be a firewall between the two.
After a pause, Zhang Yang simply left this place, turned directly to the United States, and returned to the official website of fbi. He sneakily scanned the official website server of fbi. The back door he left was gone. Obviously it was given by the other party. Turned off completely, it seems that there are masters in the fbi technical staff, and the other party is indeed ruthless enough to directly format the hard drive.
The system is still that system, but many of the flaws that Zhang Yang made during the invasion have been patched, and Zhang Yang also noticed that the version of the firewall seems to have been updated. Obviously, when the ID of the gscsd replaced by the infested insect appeared, it caused quite a shock to several intelligence agencies such as fbi.
I scanned the other party's official website. Although the firewall has been updated and the system has been patched a lot, it is not very useful for Zhang Yang. There is no way. Who let Zhang Yang know some system vulnerabilities that the other party does not know about? Quietly sent a few fraudulent access confidences, tentatively tested the server's access bottom line, Zhang Yanggang was ready to start, and suddenly he stopped his movements.
Turn on the scanner and rescan the progress of the fbi official website server. The corner of Yang Yang's mouth couldn't help but evoke a trace of loneliness, nnd, I didn't expect anyone to have the same idea as myself? Just a moment ago, Zhang Yang noticed that an equally deceptive access was also sent to the server. Although Zhang Yang immediately stopped his actions, he could not guarantee that he was discovered by the other party.
Because he didn't pay attention just now, he thought it was the security personnel of the server who was guarding the computer, but at the moment, after scanning by the scanner, Zhang Yang knew that this guy is also a hacker, and he also aims to invade the fbi official website, but he What exactly is the purpose of Zhang Yang?
Hesitated for a while, there is a colleague here, if Zhang Yang also invades, it is difficult for the technical staff of fbi and this hacker to find out that they are not intruded. After a pause, Zhang Yang immediately and decisively shifted his goal, but he did not put it here, but quickly wrote a proactive attack trigger program for the broiler who visited the fbi website.
Once Zhang Yang activates this program, the broiler will immediately issue a threatening attack step, and the fbi official website server will soon call the police. After setting up, Zhang Yang carefully cleared all login logs and information of his login to this broiler, and retained the trigger mechanism before turning to cia's official website.
If there is a second hacker who sees Zhang Yang’s actions, he will definitely be able to help me cry! Wretched, quite wretched, you are a great god, how can you do such a thing? Zhang Yang placed such a thing, obviously it was prepared just in case, if he can't run, he is ready to play with his hands behind his back.
If the fans of gscsd on the Internet know what the great gods are doing in their minds, don't they know that the image of gscsd in their minds will collapse? However, Zhang Yang obviously does not have this psychological burden. Anyway, as long as he does not stare at them by fbi, Zhang Yang does not care. Who makes this buddy bad luck? I am ready to start the server.
Because Zhang Yang wasn’t sure if the hacker had found himself, he was still paying attention to the situation while scanning the cia official website carefully. When Zhang Yang found that the hacker once again issued a fraudulent access request, At the same time, when he began to crack the port, and when he was about to place the Trojan horse, Zhang Yang knew that this guy probably didn't find himself. Otherwise, he would never invade like that.
Since he did not find out, Zhang Yang did not pay attention, but after putting in place the early warning system, he placed it wholeheartedly on the server side of cia. cia's official website server has been given to Zhang Yang. This time Zhang Yang came in already familiar with the car. Although it took a lot of work, but it has already been difficult for Zhang Yang.
"Then you're playing first, I'll go to bed first." Li Keqing has taken a shower, and seeing Zhang Yang tossing the computer, she can't understand it, and immediately greeted Zhang Yang.
"Well, you go first, I will go to sleep in a moment." Zhang Yang nodded and said. Watching Li Keqing into the bedroom, Zhang Yang put his eyes on the official website in front of him. "Ding Dong" sounded a clear reminder, Zhang Yang looked Yixi, Bingo, became. The page on the computer screen changed, and Zhang Yang once again successfully entered the cia's official website server. However, this time Zhang Yang did not do those boring actions such as modifying the official website homepage.
First, after a thorough scan of the inside of the system to figure out the location of some honeypots, Zhang Yang carefully began to send a verification message requesting access to the window where cia logs into the internal system. Soon a bright red dialog box appeared on the screen, but the server did not refuse, but a prompt box appeared, asking for the account number and password.
Zhang Yang stopped his finger and didn't do it. Instead, he switched to the operation panel of the infected insect and issued a command. As the analysis progress bar on the infected insect side was advancing rapidly, Zhang Yang's fingers also beat on the desktop rhythmically. Got up.
"Uncle! Play with me this set." Zhang Yang looked at the analysis results of the infestation and was speechless. Judging from the analysis of the landing frame by the infected insects, Zhang Yang has understood that this landing frame is basically a honeypot from beginning to end. In other words, no matter how you operate this login box, your information will be sent to the alarm system, which will soon cause the other party's technicians to be alerted.
Zhang Yang picked up the mouse and quickly clicked a red cross in the upper right corner of the landing box. After closing the login box, the page returned to normal. Zhang Yang once again issued an application for access, and soon an identical dialog box popped up. After this dialog box popped up, Zhang Yang turned his attention to the real-time scanning of infected insects.
very good, very powerful! This is the real login box! This system does enough! While evaluating the sentence in his heart, Zhang Yang quickly searched on the official website server to see if there was anything that could be used. cia's internal system is different from the official website system.
The internal system is part of the US system, in other words, it has the same characteristics as the satellites 1 and 2 that Zhang Yang invaded. This login window has a separate alarm system. There are only two results if you want to invade. The first is to hack the US military system, and then invade the server. may.
The first is the things that thanatos did in his last life. He invaded the North American Air Defense Command, which was to crack the US military system, and then directly entered the North American Air Defense Command, and Zhang Yang became his substitute. The difference is that Yes, how long it took thanatos to crack the US side system. Zhang Yang didn’t know. What he knew was that thanatos wasted several years in order to find him a substitute for the dead ghost~EbookFREE.me~ Obviously that system is not so easy to crack Yes, then the second possibility remains. Thinking of this, Zhang Yang began to search again on the official website server. Although it is unlikely that there will be too much important information in the official website server, some outdated or insignificant information must be available, such as this, Zhang Yangfan Here comes a list of records about cia's staff.
Of course, it is impossible for those secret agents to appear here. The employees on this list are all public workers. Looking at the position, Zhang Yang directly aimed his eyes at a deputy director. Turner Card, deputy director of cia, is mainly responsible for the intelligence collection and aggregation of cia abroad. Here is a brief introduction about his responsibility.
The reason for not looking for the director of cia is that although the director of cia has the highest official authority and the highest authority, it may not be the best to use. And the director of cia knows too many people. If you log in to the cia system, someone will definitely pay attention to his account. If you find that the login location is wrong, it will be tragic.
And the responsibility of this deputy director proves that he must have high authority, even if it is not higher than the director, but it is estimated to be similar, and his actions must be more secret than the director of cia, and the account is easier to use.
Latest chapter of Ebook The Strongest Hacker Click here