Swallows return to the nest
In the room, Shi Ke's two hands and ten fingers seemed to bring up a residual shadow, quickly tapping on the keyboard. Fortunately, the keyboard Shi Ke bought was a silent keyboard, otherwise, the crackling sound would have been continuous.
Inside the core server cluster of Aikexin company, Shi Lei has entered the system and opened a system vulnerability, injecting his self-written permission system into the Linux system of the core server, replacing the original permission system.
For Linux systems, Shi Ke is very familiar with it, and without causing the server group's overall system to crash, he injects a brand new permission system into the server group system!
After having the new permission system, the two original super permission users were downgraded to primary permission, but their management permissions remained unchanged, still the same as before with the super permission users. The only difference is that they cannot retrieve the permission group of Shi Lei's newly established single super permission user!
Unless they thoroughly inspect the server cluster system and find that the permission system has been replaced. Otherwise, Shi Lei will have control of Ai Ke Xin's server cluster, making this small supercomputer his own first-class meat chicken!
After successfully setting up his own super privileged user, Shi Ke immediately used the super privileged user to modify the server group of Aike Xin Company, creating a system backdoor for convenient and undetectable entry next time.
Because the super permission user was in hand, the security guard of Aikexin company did not find any abnormalities, and Shi Lei established a system backdoor. From then on, even if Shi Lei swaggered into Aikexin's server group, the security guards would not suspect anything. Because Shi Lei had obtained the super permission of the server group, he changed from hacking invasion to normal access.
Ai Ke Xin company's server group will be Shi Lei's first high-end meat chicken. So-called high-end meat chicken refers to the general term for high-end server meat chickens. A hacker's strength is largely determined by the quality and quantity of meat chickens in their hands.
For example, if a hacker controls one million ordinary personal computers as zombie bots, that is also a terrifying existence! After all, these one million zombie bots can launch the most primitive violent flood DDOS attack, which is enough to make general servers drink a pot!
Of course, wanting to use violent flood attacks on supercomputers is unlikely. Any well-known supercomputer has a hardware firewall? Filtering DDOS attacks is an easy task. Unless you can launch tens of millions of zombie meat chickens for simultaneous attacks!
But if someone really controls over 10 million zombie computers, this person will definitely be harmonized by the relevant national departments unless he is a god.
The internet is in a state of disorder, but that's also based on the premise that it doesn't pose a fatal threat to the country. If a hacker truly threatens the country's core interests, don't underestimate the power of the nation. If the country really wants to find someone, there are very few people who can escape.
Even Shi Ke, now dares not say that he can escape the country's pursuit by 100%. Because, the top powers in the hacker world, the first generation of hackers, have mostly transformed into network security experts or accepted national amnesty and become national network security personnel. The strength of the first generation of hackers is absolutely profound and unfathomable!
However, if Shi Ke captured the supercomputer Swallow, then he would have the confidence that it would be absolutely impossible for anyone to capture his IP address.
Under Shi Ke's control, relying solely on the supercomputer Yan, no one can break through this pass!
Inside the Aikexin company's server group, Shi Ke used his superuser privileges to modify the server's security policies. Although Aikexin also had its own network security experts, these experts were far inferior to Shi Ke.
After modifying the security policy, Shi Ke copied the Rockwell firewall from Server No. 1 over here. The Norton firewall of Aike Xin Company had been pierced and destroyed by Shi Ke, leaving only an empty shell. How could Shi Ke possibly not repair the firewall when he was about to infiltrate the supercomputer Yan using Aike Xin's server?
In case he was exposed for his invasion of the supercomputer Yan, with the help of Aike Xin company's server and Rockwall firewall, Shi Lei could still escape safely without being hunted down by the supercomputer Yan all over the world.
Although Norton Firewall was left with only an empty shell, Shi Lei did not abandon it. Instead, he used this empty shell to integrate the Pangu Firewall into it. As a result, from the user interface of the firewall alone, it still looks like Norton Firewall. However, in reality, its internal core source code is actually the Pangu Firewall written by Shi Lei. Even if the security personnel at Aike Xun company opened up the Norton Firewall, they would not have discovered that there was a problem with the firewall!
The firewall was installed, and Shi Lei made a final check on the server cluster of Aike Xin Company. Then, Shi Lei controlled the server cluster, extracted a project that required data calculation from within the server cluster, and sent a connection request to the supercomputer Yan.
Ai Kexin Company has applied for partial usage rights of the supercomputer Yan from Tokyo Institute of Technology, they have a legitimate pass to access the supercomputer Yan!
In Tokyo Institute of Technology, the supercomputer Yan received an application from Aikexin Company and immediately searched for Aikexin's permissions and available system resources within its internal permission group, then responded to Aikexin's server cluster, allowing it to connect.
When Shi Lei controlled the server group of Aike Xin Company and connected to the supercomputer Yan, he was excited. In his previous life, the supercomputer Yan was Shi Lei's first supercomputer meat chicken!
In this life, Supercomputer Yan, finally wants to return to his arms again!
After connecting to the supercomputer Yan, Shi Ke first transmitted the computing tasks extracted from the Aike Xin company server group to the supercomputer Yan.
Supercomputer Swallow, upon receiving a file from Aikexin Company, will first automatically detect the security of the file. Then, its internal security personnel will re-examine it manually. If there is no problem with the file, it will be handed over to Supercomputer Swallow for calculation in a sandbox environment.
Shi Ke didn't do anything fishy in the files that needed to be calculated. After all, the other party would go through several checks, and if a problem was found, Tokyo Institute of Technology would definitely notify Aikesheng Company, and Aikesheng Company would suspect them and wouldn't apply for any computing tasks on the supercomputer Yan. The only possibility is that the server was hacked!
So, the file uploaded by Shi Ke is indeed a calculation file of Aike Xin Company. Then, he himself uses Aike Xin Company to connect to the legitimate channel of supercomputer Yan and directly launches an attack on the serious system vulnerability of supercomputer Yan!
Capturing the supercomputer Swallow, the most difficult step is also the first step, which is how to connect to the supercomputer Swallow! Without a normal connection method, it will be rejected by the supercomputer Swallow. If hacking is used, it will alarm the opponent's security personnel.
Only by finding a legitimate connection path like Shi Ke, connecting to the supercomputer Yan with impunity, and then attacking the serious system vulnerabilities of the supercomputer Yan!
Supercomputer Swan, after entering the field of commercial cooperation, there is a serious vulnerability in the system. Business users who cooperate can exploit the system vulnerability to elevate their privileges!
Shi Ke used this vulnerability in his previous life to elevate his permissions to super user!
The document of Aike Xinxin Company was sent to the sandbox environment of supercomputer Yan after being detected, and started executing computing tasks. Shi Lei carefully found that serious system vulnerability in supercomputer Yan!
After finding the system vulnerability, Shi Ke did not immediately attack, but instead probed to see if it was a honeypot trap. Although the supercomputer's defense is very reliable, it still cannot be ruled out that the opponent has set up traps on the server periphery.
After probing for a while, Shi Ke confirmed that this was the serious system vulnerability he knew. Shi Ke directly followed the pre-set plan, typing away at the code, attacking the vulnerability.
Because of the previous invasion of this vulnerability, Shi Ke was familiar with drilling into the true interior of the supercomputer Yan from the vulnerability, rather than the external commercial cooperation space!
After entering the internal system of Super Computing Yan, Shi Ke first utilized a vulnerability to elevate the privileges for AiKeXin company's account. Once AiKeXin company's privileges were elevated to level three, allowing new user creation, Shi Ke immediately created a brand new user and then downgraded AiKeXin company's privileges back to ordinary business cooperation user.
Then, Shi Ke upgraded the user he created through a vulnerability to level 1 authority and immediately stopped. This serious system vulnerability can only be upgraded to level 1 authority, but not super authority. If you use the vulnerability to try to upgrade to super authority, it will trigger the super authority user protection mechanism, and the entire supercomputer will immediately issue an alarm!
After Shi Ke obtained the primary permission user, he can normally enter the permission user group and manage low-permission users to a certain extent. With the primary permission in hand, Shi Ke accessed the system's security policy through the primary permission and began to modify the supercomputer Yan's system settings using the primary permission.
The first step to make changes is to cancel the protection mechanism of super permission users, and canceling the protection mechanism of super permission users requires the permission of super permission users. If you don't cancel the protection mechanism of super permission users, once you take action against super permission users, it will trigger the protection mechanism and issue an alarm inside the supercomputer.
This is a dead loop!
No super privileges, unable to cancel protection mechanism, unable to cancel protection mechanism, cannot get super privileges!
The protection mechanism of the super permission user is protected by an independent hardware chip, which is independent of the supercomputer system and is not affected by system interference. It only accepts instructions from super permission users!
Shi Ke looked at the super-privileged user protection mechanism displayed on the computer screen and revealed a cold smile!
————————————————————————————————————————————
PS: Currently recommended votes 9950+, the goal is 10300, that is to reach 600 votes today! Hope everyone supports Shan Shan, let Shan Shan's recommended votes be a little more! Reach the target at 20:06 and update!
According to everyone's request, the book review area small activity will be opened for another period. This time, the prizes include a seven-digit YY account number, an eight-digit Penguin account number, and a Penguin couple account. For details, please see the book review area, which will be completed by this afternoon.
Collection, recommendation, member clicks, rewards, comments, everything!
——
[Tip of Appreciation] Floating with the wind, smiling again, tip 100.
.
.
.

