According to reports, this story begins at an entirely unscientific moment: Zhou Ziye, a designer who rose from creating counterfeit mobile phones, suddenly time-traveled back to the year 1984.
...Xiao Tian's team was prepared to attack the root server, and they chose to do so during the day, so that it would be dark on the other side of the ocean.
There are staff on duty in the server room, but the main staff have all gone home to sleep. They plan to finish within an hour.
A large number of broiler chickens were prepared, including GPS servers.
Entering once is essentially the same as entering multiple times. Think changing your password will solve everything? Then you still can't escape the nature of using letters and numbers.
As equipment continues to upgrade, processing speeds are also increasing, and dictionary queries no longer take long, sometimes only a few minutes.
It was a standard eight o'clock in the morning. Xiao Tian glanced at his watch and said, "Attack."
The team, consisting of dozens of people, began to frantically type on their keyboards.
Beneath the black background, there are blinking cursors, with lines of code appearing one by one.
The Enter key and spacebar were pounded loudly, just like the rhythm game Audition back in the day—clanging and banging, it was really energetic, but unfortunately there was no music.
"Firewall, encryption level three."
"Dictionary package #1 finished running, nothing. Started dictionary package #2, it matched, it's a Greek letter."
According to the continuous reports from the technicians, the situation was good and the offensive was progressing smoothly, without any major battles involving a showdown of firepower between the two sides.
"Report! The other side's personnel have discovered that they are changing the encryption password," one of the technicians shouted.
Xiao Tian walked over, glanced at it, and said, "pmgmt.msc".
"conf -- netmeeting starts, enter policy group".
Xiao Tian hurriedly spoke, and the technician beside him quickly typed out letters and pressed Enter several times.
That kind of force would have ruined this keyboard if it weren't a mechanical keyboard.
Once the other party changes the password, the technician changes the policy group, which modifies the registry, computer management, and configuration.
Especially the registry modifications, because the goal is to compromise the server and allow malware to be injected, but with the firewall blocking them, only one modification can be made.
Modify the firewall's registry to weaken it. For example, if you change the password, reset it in the settings and go back to the previous level. This way, the password packets that are generated will still be usable.
The key is who is faster.
Since the root server cannot be disconnected from the network or cut off from power, it has to be technically kept running.
"The first firewall has been breached. The password is Alpha, Beta, Gamma..."
"Report: The password is blocked and invalid."
"The strategy group has been changed..."
"I can't operate anymore, it seems like I've been kicked out."
The first wave of attacks ended in failure.
The mountaintop was difficult to conquer, which was expected. If it were that easy, would it still be called a root server? It would have been ruined by the hell long ago.
Of course, if you mess it up, you won't be able to go online anymore, which is no different from slitting a knife down your own throat.
Having gained some experience from the first probe, we now prepare for the second wave of attack, divided into three groups: one for a feint, one for the main attack, and one for support.
Even fast typing has its limits. If you type for too long, your fingers might cramp and become unresponsive, making it easy to mistype letters. Isn't it a waste of time to just delete things?
It's a pity we didn't win the first wave. We just caught the opponent off guard; there wasn't much advanced technique involved.
This time, their main force might already be in position and in the trenches.
This time it's a real test of technology. To be honest, we started late in the field of technology and are far behind in terms of technology. But once we become familiar with programming and commands and use them skillfully, the technical gap won't be that big.
It's all the same stuff; it just comes down to who can type faster and who can memorize instructions faster.
Their advantage lies in their native language; they can even type without thinking. We need to consider that there's a weakness in that pause.
They focused on that group and quickly took down the GPS server. Before the other side could react, they had already used the GPS server's connection to reach the root server.
A feint attack was launched against the root server to lure the technical staff there.
The main players took to the field and began cracking the updated code.
Before Xiaotian could begin, he needed to prepare by integrating servers from several companies in North America for interconnection.
If the power of a single server is insufficient, the number of servers can be increased to meet the demand.
More than a hundred large servers that could be used began attacking the root server.
In a short time, more than a hundred companies with servers were scrambling to seize control.
The main force used hacking software to suppress them, preventing them from seizing control, that is, the highest level of authority, for the time being.
Time was tight, and everyone was racing against the clock.
The feint attack team kept the root server technical team occupied, preventing them from extricating themselves for the time being.
But at the same time, they could feel more than a hundred targets attacking them.
It took nearly four hours to breach three firewalls, finally succeeding in breaking through them when it got dark in Hong Kong.
At this time, it was also dawn in North America.
After breaching the root server and implanting the malicious virus developed by Xing Baohua, they quickly withdrew.
After the blocking mechanism was activated, they all evacuated safely, and the backup team began to clean up the traces.
Both those who were feinting and those who were attacking stood up from their seats, jumping, bouncing, and hugging each other, they were so happy!
In short, it's quite an achievement that the team managed to break through the root server.
Once the virus was implanted and started, within a minute, almost every network server connected through the root server was infected.
Many computers display a chubby orange tiger, just like the little chubby tiger in the painting "Tiger in the Forest". If it weren't for the "king" character on its head, you would think it was Garfield.
This chapter is not finished yet. Please click on the next page to continue reading the exciting content!