Chapter 479 Major Discovery



Shortly after Geng Xin left, the same bespectacled trainee handed Xing Baohua a piece of paper with the crew's IP address written on it.

"Boss, these addresses were previously selected and have been confirmed as real addresses, belonging to the Ryukyu Islands of Japan."

Xing Baohua glanced at it and said, "Thank you."

"Shouldn't the leader test the waters?" the bespectacled student said.

"Did you understand the steps I showed you yesterday?"

"You mean, let us give it a try?"

"Okay, you guys work together and divide the tasks, I'll help you from the side. Let's see who this guy is," Xing Baohua said with a smile.

Internships require hands-on experience, and Xing Baohua does indeed have some of the sharper, more cunning of the Japanese. I felt I didn't need to personally demonstrate; I could use him as a trainee.

They calmly made way for the trainees to assign tasks themselves.

Booting up all the small servers and activating the compromised machines is indeed very troublesome and time-consuming.

But the trainees were very happy to have this hands-on experience.

Watching the trainees follow his steps from yesterday, one by one, they first hacked into the Ryukyu branch server of R-Telecom and found the actual location of the IP.

The rest will require manual investigation.

Xing Baohua has connections in R-ben. Just call the R-ben Haina branch and find a map to see the actual address.

The map was found, but there are no markings. From the drawing, there are several lines that look like an airport.

Upon further inquiry, it turned out to be the US base in Okinawa.

Well, thank goodness we didn't send anyone over, otherwise it would have been like throwing a meat bun to a dog—gone and never to return.

Let alone going in to find someone, it's difficult to even get close.

Xing Baohua asked the bespectacled trainee, "Where was the last area of ​​the botnet you controlled displayed?"

"stick"

"Control the botnets and find several R-licensed botnets, set up blocking programs on each botnet, and use a server as the last line of defense?" Xing Baohua said, as if he had thought of something.

He couldn't find a set of addresses on his own computer, so he read them to the student with glasses and asked him to control that set of servers and allocate some space.

It took more than two hours to bring the server under control. The server side has already discovered that it has been hacked and is trying to get Xing Baohua's side to take control.

The two sides are vying for management authority.

This is also known as a password battle. As long as the Japanese server changes the password to 8 digits or less, Xing Baohua can crack it in no time by taking advantage of the server's performance.

The battles for control were fought several times and were extremely fierce.

"The leader has initiated an investigation, and they've already triggered the first stage of the 'botnet' process. Should we stop it?" one of the trainees' team members responsible for surveillance hurriedly reported.

"No need. Just tell me how long it will take to build the server space when we reach the third line of defense, and quickly implant the destructive program into the allocated space," Xing Baohua asked hurriedly.

"Two minutes."

After receiving a response, Xing Baohua nodded helplessly. A novice? Perhaps when typing commands, he sometimes makes mistakes with letters due to the progress; a single delete key can delete several letters.

Repeat, repeat the typing and deleting.

Computer intrusion requires speed; both sides are vying for control of permissions, trying to gain that precious time.

The other party changed the password, Xing Baohua cracked it, then Xing Baohua changed the password again, and so on. Time was squeezed out little by little like this.

The other party was so focused on gaining control that they didn't have time to scan the entire system, and they were unaware that someone had set up a virtual space on their server to store programs.

Two minutes may seem short, but in reality, it just feels slow psychologically when you're working.

The entire studio was filled with the rapid clatter of keyboards, like small firecrackers going off.

It was all blind typing, and the speed was very fast.

Two minutes later, the space inside R's server was completed, and after the necessary tools and viruses were implanted, everyone withdrew.

Meanwhile, the other side, which followed the botnet's lead, has already activated three firewalls.

Xing Baohua had them set up a defense line with each machine, and their mission was finally completed when they broke through the third machine.

A perfect retreat, and the devastating disruption of the third broiler chicken.

"Boss, who owns this server? If we withdraw, will they conduct a full virus scan and upgrade their protection?" a trainee asked worriedly.

"It's alright. The concealment technology you and Geng Xin developed is quite advanced. Current protection levels and scanning technologies can't detect it," Xing Baohua said proudly.

“Is it hot in here? You’re all sweating profusely. Take a break and catch your breath. You still have work to do later. This is too small a scene for you. You need to get used to it.” Xing Baohua said with a smile, telling the trainees to go and get some water or go to the toilet.

About an hour later, Xing Baohua said to the student with glasses, "Activate the R-side server virus, remotely control the virus to enter the computer of the American anti-black team, and implant it to cause damage and block it. Burn all their equipment?"

"Boss, burning their equipment is too simplistic. We need to at least scan the data off their hard drives," the programmer said.

"Would you store important files on a device used for attacks?" Xing Baohua asked rhetorically, and everyone shook their heads slightly.

They need to know about the computers they use for work. Basically, apart from commonly used tools, there aren't many files on the drives.

People usually save the files they get or other files separately.

I'm afraid someone might use a reverse intrusion attack and burn out my device, making it difficult to recover any files.

This is the most basic code of conduct for a hater.

However, Xing Baohua still followed the programmer's instructions and had the student with glasses scan the machine before attempting to damage it.

This chapter is not finished, please click the next page to continue reading!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List