HacKer

Chapter 1391: The hacker's war has never been far away

Near eight o'clock in the evening.

In accordance with Shi Lei’s instructions, Tao Wenxian slammed into the internal network of the FBI, and successfully blocked the defensive forces of the FBI and the CIA Central Intelligence Agency.

Shi Lei did not follow the internal network of the FBI, but when the CIA Central Committee supported the FBI, it killed the past!

For the CIA Central Intelligence Agency, Shi Lei knows better. He knows the cyber security forces of the CIA Central Intelligence Agency. When in action, there is usually an action notice.

This action notification usually explains the reason for the action and the goal of the action. Of course, this action notification is an automatic deletion message, which is automatically deleted after being read or the preset storage time is completed.

Shi Lei is preparing to invade the internal network of the CIA Central Intelligence Bureau to recover relevant notification information in the notification system data server of the CIA Central Intelligence Agency.

As for whether it can be successful, Shi Lei does not know for the time being.

After all, the CIA's notification system data server, in addition to a strict defense strategy, the storage medium they use is not an ordinary mechanical hard disk.

Under normal circumstances, the data information is temporarily stored in the memory and then written to the storage medium. However, the CIA's notification system requires a lot of data to be processed every day and requires a high degree of confidentiality. Therefore, the CIA uses the nandssd storage technology.

This storage technology far exceeds the read and write speed of mechanical hard disk storage technology. It is the next generation storage technology. And it is widely used in the future.

Compared with hdd mechanical hard disk technology, nandssd has many advantages, but for Shi Lei. This technology is extremely incomparable in the current situation.

Because Shi Lei wants to recover the data, read the notification information of the CIA Central Intelligence Agency. The technology of restoring data is very convenient on the hdd mechanical hard disk, even if it is data of ten years ago, it may be read.

But the nandssd technology is different, the theory of storing data is different!

I want to recover data from the nandssd hard drive. This difficulty is very high, Shi Lei only hopes that the cia Central Intelligence Agency's notification system data server. It is possible to obtain relevant data information only after the data cleanup operation has not been performed.

Otherwise, it is really not possible to recover deleted data from the nandssd hard drive.

Shi Lei told the singer that he was ready to complete the computing resources. It did not immediately invade the internal network of the CIA Central. It is looking for a better way to invade.

"Jie Shier, grab a cia CIA invading the dreamer online payment system, using the broiler server." Shi Lei thought of a good way.

According to Shi Lei's past habits, he likes to start directly from the official website of the CIA Central Intelligence Bureau, forcibly invading from the official website, breaking the defense of the internal network.

This method seems to be stupid, and it looks like it is very easy to be discovered. actually not. Just a little camouflage, cia CIA security experts. It will only be thought that this kind of invasion is a temptation of an unknown small hacker and will not attract attention.

Although the method of direct invasion is very secure, Shi Lei does not want to do that. Because, the way of invasion, the probability of failure is the greatest, and once it is seen, the security experts of the CIA Central Intelligence Bureau will definitely follow up, which will lead to more troublesome anti-tracking problems.

Therefore, Shi Lei chose a more subtle anti-tracking program, directly from the cia Central Intelligence Agency's broiler server, along the cia Central Intelligence Agency's invasion route, backtracking in the past, into the cia Central Intelligence Agency issued an invading computer.

This kind of solution is more subtle, but it is even more dangerous!

Because the ultimate source of the invasion, it must be the security experts of the CIA Central Intelligence Agency, and is operating the computer, invading Dream Entertainment's dreamer online payment system. A little bit of mishandling will be discovered by the security experts of the CIA Central Intelligence Agency.

Or should not be said to be a security expert at the CIA Central Intelligence Agency!

Because this part of the staff, like the mysterious temporary workers of Xia Guo, they do not have the preparation of the CIA Central Intelligence Bureau, nor any identity records.

Even if Shi Lei accurately tracked their location information, there is no way to buckle them on the CIA employee's hat.

Therefore, in the face of these guys who are temporary workers, Shi Lei really only has a hard time, instead of preserving relevant evidence, it makes a lot of noise.

According to Shi Lei’s instructions, Yizhe quickly seized an unimportant broiler server. The broiler server did not have a lot of data flow. Shi Lei smoothly tracked the data flow and traced the source of the upstream.

About two minutes later, Shi Lei did not cause the other party's vigilance, directly killed the other party's computer, and then used the other's computer as a springboard, and naturally entered the internal network of the CIA Central Intelligence Agency.

In the internal network of the CIA Central Intelligence Bureau, Shi Lei scanned the notification information, but the CIA CIA dared to release the notification information so daringly, and also detailed the reasons and objectives to prove their confidence in the notification system.

Shi Lei did not find any notification information!

Fortunately, Shi Lei did not expect to get the information directly at the beginning. He entered a string of code on the keyboard with both hands, and he immediately scanned the data server of the cia CIA notification system.

This particular data server does use nandssd hard disk storage technology. In just a dozen seconds, in view of the excellent performance of the nandssd hard drive, the clothes have been scanned and completely.

However, there is still no residual information found in the notification information!

Shi Lei personally scanned it once and found no relevant information. In this case, it should be the data server of the notification system, let nandssd execute the command, that is, the security erase command.

This command is a special command for the nandssd hard disk. It can clean the ssd data residue very cleanly. It will not be like the ordinary hdd mechanical hard disk. Even the data of ten years ago can be retained.

Shi Lei frowned and looked at the information displayed on the server screen. If he could not get the information from the CIA's notification system, wouldn't the face and the CIA tear the face?

This is Shi Lei’s unwillingness!

‘Yes, there is this way! ‘Shi Lei suddenly thought of a way, not for the way of nandssd hard drive, but for a way of thinking.

As a world-class hacker, you need not only excellent technology, but also a quick mind. Since it is impossible to obtain information from the notification system data server of the CIA Central Information Bureau, why not obtain the required information from the computer of the relevant security personnel who accepts the notification?

Shi Lei smiled back before connecting the broiler server, the security expert's computer. In the era of 2008, although the nandssd technology has matured and been put into use, the cost is still high, and the general computer is not installed.

This security expert still uses a normal mechanical hard drive. This is not because he can't afford the cost of the nandssd hard drive, but it is completely unnecessary.

The notification message sent by the CIA Central Intelligence Bureau, if left in the internal system of the CIA, and intercepted by the hacker, is indeed a big news.

But this piece of information has flown outside, nothing at all!

Can you prove the guilt of the Central Intelligence Agency of cia because of a piece of information? That is simply funny! If there is such a simple matter, Shi Lei can forge a hundred relevant information every day to defile the CIA.

Although the clues were found, the feasibility was also determined. But Shi Lei suppressed the excitement and carefully scanned the security expert's computer.

Because this computer has been used by security experts, once there is a little bit of abnormality, or triggered a security trap set by the other party, then Shi Lei will declare the action failed.

Ordinary hdd mechanical hard disk, there is a big drawback, that is, whether the data is read or written, the hard disk light will be always on.

Shi Lei first needs to black into the computer's motherboard to force the os system, will be fixed in the program inside the os system to change, let the hard disk read and write, reduce the hard light of the hard disk.

This is not a simple job!

If you just let the hard drive light go out, it's too simple. But this security expert is using a computer. If the hard disk light is not lit, and he is writing or reading data himself, is it not clear that there is a problem?

Shi Lei carefully modified the information of the os system, which took about ten minutes, and finally changed the program to control the hard disk light.

"Let me see, what is the reason!" Shi Lei scanned the security computer's hard drive. Because of the fear of security experts, the scanning speed was very slow.

After waiting for almost half an hour, the clothes were finally scanned, and the information deleted today was restored. At the same time, the words 'Dream Entertainment', 'Xia Guo', 'Mi Rui Technology' and so on were matched and deleted. information.

After less than half a minute of screening, Yizhe showed a message in the virtual transparent screen of the lip lens information processor.

Shi Lei also finally knows why the CIA CSI's desperate bite dream entertainment online payment system!

‘According to the latest information received, Dream Entertainment’s Dreamer Online Payment System will provide convenient money laundering services for some of our country’s criminals. This information comes from the well-known hacker Rafael, with a high degree of credibility. Perform missions, invade the Dreamer's online payment system, and confirm the source of funds for each transaction and the relevant trader information. ’

Shi Lei’s expression, Rafael?

(To be continued.)