Chapter 34: One-Minute Invasion
Professor Vincent returned to his office, leisurely sipping his coffee. Today must be the best day for US network security, as all the hackers have gone to participate in the competition. How long has it been since such a peaceful day appeared? It would be a waste of God's blessing if he didn't relax properly.
Professor Vincent was sipping his coffee here, while on the other end of the globe, Feng Xiaotian was still busy at work. After more than half an hour, he still had nothing to show for it. There was no way around it - this server was just too powerful. Even if he knew a viable method, the server itself refused any internal file browsing permissions. Without a password, Feng Xiaotian couldn't even enter the system to view the login logs - which brought the problem back full circle: in order to control it, you first had to defeat it.
Feng Xiang Tian asked himself if he still didn't have the ability, through long-term observation, he found that this server was simply **! The software matrix mode also eliminated all possibilities of cracking, one hundred sets of processing systems, how can you crack? Okay, even if you go and attack one by one, will the other party just sit and wait to be cracked? This is obviously impossible! In general, such a large competition, the organizer must monitor the server's changes in real-time, any small change cannot escape their eyes.
Feng Xiaotian let out a breath, he was still thinking, and now he even had a faint sense of excitement. When facing challenges, Feng Xiaotian always had an impulse to overcome difficulties, of course, this only applied to the aspects that interested him.
After more than a dozen minutes, Feng Xiaotian, who had been stunned, suddenly slapped his forehead and scolded himself, "How could I have overlooked this point?!"
After saying this, he controlled the computer to exit the server and then logged in to the website that published the server address.
What did Feng Xiaotian overlook? The answer is simple, he overlooked the information about the organizers. This time, the organizer of the hacking competition did not show up and seemed very mysterious. Others didn't know who they were at all. Feng Xiaotian didn't care about this. What he cared about was the information about the relevant working staff of the organizer.
Feng Xiaotian wants to gain control of the server, but he can't crack it, so he has to start with the person in charge of the server. Since this website has released the news of the hacker competition, the person who released the news must have a close relationship with the organizer. If we follow this clue, maybe we can get the password of the server!
This was the most feasible plan that Feng Xiaotian could think of, so he immediately took action. Fifteen minutes after logging onto the website, he gained control over it through his own reverse engineering program. He then checked the website's information release record and found what he wanted in less than ten seconds.
Feng Xiaotian began to track down the publisher of this message based on the information he had grasped, and three minutes later, the other party's computer was hacked by him. Compared with that powerful server, this guy's personal computer was as weak as a baby. Feng Xiaotian easily controlled the computer through system vulnerabilities. Unfortunately, the person's computer used Windows 3.0 operating system, which Feng Xiaotian was extremely familiar with, knowing that there were thirteen loopholes in this system!
He immediately began browsing the communication records on the computer. It seemed that this guy rarely used a computer to communicate with people, so there were only three people in the computer's communication log. Feng Xiaotian continued to track the IP of these three people. Fifteen minutes later, he ruled out two of them and turned his attention to the person who was screened out.
Feng Xiaotian felt that he was getting closer and closer to his goal, and in his excitement, he quickened his pace. Within half an hour, Feng Xiaotian had been continuously tracking and cracking through the network, and finally, through his persistent efforts, he saw a glimmer of light - Feng Xiaotian found a very special computer, because this computer was actually installed with a firewall, and it was exactly the same as the one on that server!
Feng Xiaotian couldn't break through the server's firewall, because this server has as many as 100 sets of firewalls, and there are personnel guarding behind the server. However, this computer is different, it's just a personal computer, and no one is on guard, that's all.
Feng Xiao Tian faced the computer's firewall, revealing a determined smile, and then he began to take action.
What is a firewall? It's actually a protective tool with isolation and filtering functions. Simply put, it filters out threatening data to isolate it from your computer's core program, so your computer can avoid harm from things like Trojan viruses. To break through the firewall, you need to disguise your data so that the firewall doesn't think it's threatening, then you can enter the other person's computer. (Firewalls first appeared in 1993, with some minor modifications here.)
How to crack the firewall? Feng Xiaotian's method is very simple. He directly wrote a deceptive program, hiding his true instructions in the middle of the program, and sent a data exchange request to the computer. As long as he deceived the firewall, the computer's operating system would be exposed in front of him. Is there still difficulty for Feng Xiaotian to operate the system?
At the same time, in a cave on Cheyenne Mountain in Colorado, USA, the data monitoring center of the North American Air Defense Command suddenly sounded an ear-piercing alarm. A staff member turned to look at the location of the alarm and immediately changed his face: "Hurry up and inform Commander Leiche! His personal computer is being invaded! Also, the network security department will take action immediately! Can't let this guy succeed!"
As soon as the words were spoken, the staff in the room immediately became busy. The personnel on duty informed Lecce Commander of the news through internal telephone. Lecce Commander was sitting in his office handling documents and after hearing the news, he first stunned for a moment, then said to the receiver: "Although there is no confidential information on my computer, this person cannot be allowed to succeed in invading it, otherwise it will be a shocking scandal! You immediately organize manpower to take action and catch this reckless guy!"
"The full-time staff replied: 'Commander, we have already taken action - oh, please wait a moment, there is very important news to report to you.'"
Lai Cheh's commander heard this and responded with a "yes", then he heard the following conversation coming from the telephone receiver:
"Peter... The commander's computer has been hacked..."
"What did you say? This... how is this possible?! It's been less than a minute since the alarm sounded!"
"Although it's regrettable, that's the fact... However, our security personnel are tracking this person's IP and I believe he won't be able to escape... Pitt, you'd better inform Commander Liche about this message..."