My Super Black Technology Empire

Chapter 207 A group of sand sculptures

() You can search for "My Super Black Tech Empire ()" in Baidu to find the latest chapter!

At this time, what was displayed on the computer screen was a large series of complex codes, which were constantly flashing.

This is a large number of IP addresses of types A to E of the major meat machines, as well as some attack packets and source codes of MAC addresses.

61.0.50.0-61.4.63.255 Amiken New York

61.4.80.0-61.5.80.255America Washington

128.210.0.0-128.210.255.255 Hanguo Seoul

128.211.0.0-128.211.255.255 Sun Empire Tokyo

......

At the same time, a large amount of data was continuously leaked, and there was a light green progress bar above it, indicating that the progress had reached 100%.

"Shet, Obo, we succeeded! Hahaha, it really is the firewall set up by those yellow-skinned monkeys, but it is not comparable to our offensive methods." Everyone leaned over there and looked at the screen. The data displayed, he said with a smile.

"Copy all of their databases, and system log files, etc., make a copy, GOGOGO, guys, we can make a lot of money this time!"

"Tsk tsk, I really don't know what important information that game company has, and even the top management came forward in person, but it's his business, 30 million US dollars, he can earn it now."

Soon, everyone was happily discussing your words.

At this time, Obo quickly entered a cd command. This cd command can directly enter the target's system database, so as to modify the key in it to get the data he wants.

The general idea is to use the cd command to enter the C: Windwossystem32 subdirectory, and modify the administrator password in it.

Obo enters the cdc: command in the "Command Prompt (cmd)" window, and presses the Enter key to switch the directory to the root directory of the C drive administrator, and then enter cdWindowssystem32 to successfully invade.

The second step is to enter the dir command during the blank period when the other party's firewall is compromised.

What this dir command does is,

List all or specified file directories on the disk. The contents that can be displayed include volume label, file name, file size, file creation date and time, directory name, and remaining disk space.

Type dir and press Enter

Results:

root directory file:

"Heavy Nuclear Fusion Technology".Doxc, file size 1028MB, date of creation: April 27, 2020.

"Hey, it looks like we're looking for this document, get this document first, and then copy their database."

A sharp-eyed hacker standing beside him quickly saw the file name displayed on Obo's screen and spoke immediately.

"I know, you don't need to say more." Ou Bo rolled his eyes at him, and quickly established their organization, a direct connection channel with Datang Technology.

They can choose to use the meat machine to jump layer by layer, and then hide their IP address and MAC address segment as much as possible, so as to achieve the purpose of coming and going without a trace.

It’s just that this is risky. After all, one more jump in the meat machine will slow down the speed of a network, and if you use the meat machine to jump layer by layer, at least 5000+ jump channels are required to achieve the effect of stealth. .

However, in this case, the network transmission will be directly 5,000 times slower. If the Internet speed on the meat machine side is fast, it's okay to say, if the Internet speed is slow, they will also be slow here.

Therefore, the most hidden is the least safe. After all, the firewall of the other party can be repaired at any time, and then all the data that has not been sent will be deleted directly, or the files that are still in transit in the meat machine will be recovered through special means. .

The way they send it is to divide a file into 2048 small copies on average, like a volume compression, and then forward it to their original server at the same time, so as long as there is a problem with one small file, the whole file will be garbled .

Ober directly entered a Ping command and a netstat command.

The Ping command is a command under Windows, Unix and Linux systems. It belongs to a communication protocol and is part of the TCPIP protocol.

Netstat is a console command and is a very useful tool for monitoring TCPIP networks. It can display routing tables, actual network connections, and status information for each network interface device.

Netstat is used to display statistical data related to IP, TCP, UDP and ICMP protocols, and is generally used to check the network connection of each port of the machine.

Soon, a point-to-point communication link appeared on the computer screen, and a progress bar appeared.

"Successful establishment of the line, hey guys, you have to step up too, I just checked the information from their syslog, their firewall will take two minutes to restart." Obo looked at the progress bar displayed on the computer screen. , I also breathed a sigh of relief.

It only takes 30 seconds at most, the point-to-point transmission can be completed directly, and soon they will be able to ask Amejian for 30 million US dollars with this document.

At the same time, if time permits, they can also directly copy a copy of Datang Technology's data database, so as to use this information to threaten Datang Technology to hand over a large amount of data and ask for this data back and forth.

After all, in their eyes, Datang Technology is an excellent game company. The core code of the game can be said that no one has been able to crack it so far, and even their top hacker team has no clue about this code.

So if they can get a large ransom from Datang Technology, their income will definitely increase a lot, and even if they don't get it, they will not lose at all.

Even selling this data to other game companies can get a lot of money.

"Hehe, Obo, their stupid firewall has an IQ worse than that of my stupid cat, and this code of mine can directly shut down their firewall for a minute." And Wei Ohm also spoke at this time.

He quickly opened the cmd command line and typed shutdown-s-t60. Soon, a line of words was displayed on the computer screen.

[The firewall system of the other party will be closed in 60 seconds. 】

Because firewalls generally have power backup and undead systems, after being invaded, they will generally restart and restore directly.

So this code can directly drag the firewall for one minute.

....

at the same time.

Datang Technology, inside the quantum computer matrix.

In a bunch of data streams, Yuan Yuan also sneered when he saw the hacker's rude operation.

"A bunch of idiots."

For the convenience of reading next time, you can click "Favorites" below to record the reading record of this time (Chapter 215 A group of sand sculptures), and you can see it when you open the bookshelf next time!

If you like "My Super Black Tech Empire", please recommend this book to your friends (QQ, blog, WeChat, etc.), thank you for your support! ! ()

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like