Chapter 38: The Vampire's New Discovery
Thank you to book friend "Unknown" for the second reward! Europe, in Lyon, France, a curly-haired young man is sitting in a bright office, with a personal computer in front of him. At this moment, his hands are flying, constantly controlling the computer to issue various commands.
After a flurry of activity, he stopped and muttered to himself: "Strange... really strange... every time I increase the data flow for my attack, the attacks I receive also increase. If I reduce the flood attack, the attacks I receive will decrease. What's going on?"
If Feng Xiaotian could hear this, he would definitely say: "There is a computer on the server that has been pulling saws, and it turns out that you are the culprit."
The young man's name is Sachi, a researcher at a well-known French research institute. His research topic is the security aspect of computer networks, which is only his public identity. In private, he has another very loud name - Vampire. The name "Vampire" is very loud in the hacker community. Sachi used this pseudonym to do many shocking things, such as breaking into Siemens' internal network in Germany and causing losses of over 120 million German marks for the company. Recently, the hacking attack on General Electric in the United States was also done by him, resulting in a loss of over $8 million for the company.
Satch's own skills were excellent, and he also had the right to use a supercomputer in the institute, so he had always been invincible. In just two years, he made a big name for himself in the hacker world. But today, something strange happened that left him bewildered, because the thing itself seemed unthinkable!
As a well-known figure in the hacker community, Sachi naturally didn't want to miss this hacking competition. However, after participating, he couldn't crack the server provided by the organizer. Although he had a supercomputer with a calculation speed of over 10 billion times per second, this server was not easy to deal with. Through Sachi's observation, he discovered a situation that shocked him - this server was actually composed of 100 supercomputers! Although each computer's calculation speed was only 10 million times per second, a good tiger can't withstand a pack of wolves. With just ten such computers, they could offset the supercomputer in Sachi's hands.
After learning about the situation, Satch didn't retreat. Instead, a thrill rose up in his heart. Satch wasn't a fool; he knew that whoever could provide such powerful servers was no ordinary person. However, having been in the hacker world for so long, he yearned to face even greater challenges. So, he immediately controlled all the resources at his disposal and launched a fierce attack on the server without pause. For an hour, he did this, although it didn't have any effect. Satch wasn't one to easily give up; while attacking, he waited - for what? Of course, for other hackers to create opportunities for him.
In general, such a big game, all capable hackers can't help but participate, no matter how strong these people are, at least they will increase the server's information processing volume after launching an attack on the server. As long as this kind of attack reaches a certain critical value, Saji's opportunity has come, so he persists, and before the game time arrives, he will persist.
However, Sachi soon discovered that there was a considerable chaos within the server, which was naturally a good opportunity for him. He didn't hesitate at all and immediately seized this opportunity. Sachi manipulated his supercomputer to launch an attack on the server, and this time, his attack finally succeeded - one of the servers' computers was about to be taken down by him.
Just then, something happened that left Sachi bewildered: the computer was on the verge of total collapse, but at this critical moment, Sachi suddenly found himself under attack by someone else! Sachi didn't dare to slack off. On one hand, he mobilized his resources to deal with these attacks on himself, while on the other hand, he gathered all his remaining strength and launched a fierce flood attack on the computer that was about to collapse. In Sachi's view, as long as he could hold on for a few more seconds, he would be able to take down this computer, and then he would go all out to deal with the guy who had attacked him. Hmph, I'll let him know the terror of a vampire!
Sachie's idea was good, but reality was cruel. When he launched the most violent flood attack on this computer, his own computer suddenly sent out an alarm. Sachie took a look and was completely stunned. The content of this alarm was: Warning! Your computer is under strong flood attack! Due to the excessive strength of the attack, please handle it in time!
What's going on? I'm holding a supercomputer that can perform calculations at speeds of over 10 billion times per second! To trigger such an alert, the other party must have a computer with equivalent capabilities. But looking around the world, apart from national institutions and powerful well-known companies, how could an individual possibly own such a computer?
Sachie thought of this and immediately took action, reducing the flood attack on the server and focusing on dealing with his own attacks. However, when he reduced the attack on the server, he found that the attack he received also decreased. As a master hacker, Sachie's intuition told him that there was something fishy going on, so he immediately controlled the computer to start tracing the source of the data flow in reverse. When the result came out, Sachie was stunned!
The IP he tracked actually came from this server!
How is this possible? This server is withstanding attacks from hackers all over the world, how can it still have the ability to attack me? Did the organizers of this competition use other resources? Otherwise, why would this be the case?
Sachie was stunned, paused for a moment, and then started to move. Three minutes later, Sachie stopped his actions, only to see him staring wide-eyed, stuttering: "Th-th-this... Saint Mary... the opponent actually has a 'Mirror Reflection System'!"
The so-called "mirror reflection system", this is the name that Sachi gave to his new discovery of this software, until now, he finally knew the truth! Through his constant probing and final analysis results, the other party must have installed a brand new software on the computer being attacked, the function of which is to reflect all attacks back!
It's too unbelievable! Too shocking! Sachi felt that his hacker values were almost overturned! Is there such software in the world? Who developed it?