FBI, the FBI is a special department of the United States, but is captured in this special departments do not know how many top-level hacker, London, myth, Gary is an example of squatting in it for five years, has finally been released this year.
FBI in the hacker community has a 'reputation', hackers hell, but also the hacker's demise.
FBI's internal systems, there have been daring hackers to patronize, but the consequences of not being caught is the inexplicably missing, few people fully into safe escape. A few years ago comparing the bold attacker to prove his strength to attack FBI's official website, however, in recent years, hackers have the direction they choose to attack the White House and the United States is Japan's Yasukuni Shrine, or more well-known hacker organization.
Ring in the old bird has to know why this phenomenon is entirely due to the strength of FBI suddenly increased in recent years, many, some veterans guess a lot of top FBI enlisted hackers and security experts and tracking experts.
Yang not unaware of the situation, but he broke into the FBI's internal system of choice, not the other, only to find the information brother, after all, FBI for hacking, it is entirely a database and information library.
Into not only a powerful strength of the FBI, and had to have all aspects of the master, broke into the FBI internal systems is not easy, Yang and other four for the action, a series of discussions, the risk of four Anyone in doubt are the largest, so this action must have a perfect plan and with the cooperation.
0:00 the bell sounded.
Ants dynasty headquarters, red ants keep his hands dancing on the keyboard, display the data stream also keep turning, the other party has been attacked more than an hour, up to now have not found the source of the other point of attack, this time, red ants in a hurry, but the worry is not the way to make their feelings slowly recover, and then cried in front, then wheat.
"Ray, reported the details!" Red ants using a local phone tools, the network simply can not listen.
"Now we are under attack all five main server, a WEB server is also under attack, but the 2 main server is relatively large flow of the attack, the other four main server is relatively fragmented attack!"
Ray is the organization of the team captain, all the dynamic analysis of network expertise. Red Ant frowned thought a moment, then told: "From the engine room open five fortress machine access WEB server, and then the master server, 2 full defense, if special circumstances to report immediately!"
Red Ant has just issued the command, there came a word Hades.
"The other side of the two good starts to the main server of the violent attacks, red ants, man, this is a good opportunity to access the main server 2, we released each other's attack, which took advantage of this opportunity, we will have the opportunity to track each other data stream of attacks. "
Red Ants not react, Gang Yu answer only to find the display monitor 2 master servers data flow suddenly change dramatically!
If the attack is released, I am afraid it was too late, not neglect the red ants, quickly press a small Leikai Qi five fortress machine.
30, the bastion machine successfully access the main server 2.
Relatively slow attack each other a lot, Fort machine after a successful access, the red ants glued to screen, shown above, the five main server's security level and the number of article points WEB server.
"Red, the other's attack suddenly stopped!" Yellow ant's words came.
"Strange!" Red ants reading about a low voice, but this time, they heard the sound of emergency Pluto, "Oh! Immediate access to the main server 2!"
Carter, the top five on the display monitor sudden changes in the main server, where the main server 2, the safety index suddenly fell to 4 stars (10 stars for the most secure).
Cries of angry red ants curse words, "Damn! Release attacks!" Then, quickly bring up the tools access the main server 2, and then release each other's attacks.
The release of attack, while Pluto and the other ants take advantage of confusion in six colors, which track the attack to the data stream. Release of attack is completely sacrificed 2, the main server, that is off the main server 2 network, then the other must be transferred, however, is to take advantage of this time the red ants to escape each other when the interception of the data stream.
Suddenly, the screen 2, the safety of the main server's index fell to a star!
Look at my master server is destroyed, the red ants are the extreme heart really difficult, but fortunately he had been to transfer the data on the server end, sacrificed again set up a master server, then is not only a matter of time, and thus modulation problems.
Return distressed distressed, action had to act, the red ants up her face 2 main server access, just a connection, 2, the safety of the main server becomes completely blank.
At this moment, 2 other main server has been destroyed.
"OK, catch the other's a fiction IP!" Having put this fiction Pluto IP distributed red ants.
Then came the yellow ant's words, "Pluto deserves to Hades, I was chasing the other 11 data stream, we can immediately trace the other side another fiction IP!"
General pursuit of the attacker, are from the fine start, caught each other's attacks on the data flow, which seek to fiction IP, and then tracking each other's attack source, and finally the other side of the virtual IP and real IP!
This is a difficult process, which also led to attacks on easy, chasing hard. Pursue a master course, there are attacks masters, they are different, but they can not do without this process.
As a fiction caught the other IP, red ants quickly enter the chase, while Pluto and six-color ants began to follow. Angry red ants moment forget each other's attacks did not stop.
Shanghai, wood two months late autumn, and unfortunately has been tracking the attackers broke into the periphery, then the two with the track, failed to understand the battlefield into the ants dynasty.
Proficient in the late autumn wood tracking technology, this time in a row beheaded numerous other fiction IP, on the battlefield, they chase, one escape. Suddenly, unfortunately month screamed: "that someone attacked me!"
"What?" Staring the late autumn display of wood, his hands fast dancing.
Unfortunately tilted his head sideways month, then Mak front said: "Xue Jie, Xue Jie, receiving goals fiction IP!" And she put the interception of IP to send Xuejie fiction.
Soon came the sound Xuejie voice: "bailing each other, little late, your best track! The attack of ants is not a dynasty, now the ants are still some attacks dynasty, you will continue to follow just found the man. A month, I'll give you another task, while supporting small night track, until the track this person!! "
Xi Mu late autumn months and two nod response, the full tracking of wood in late autumn, after half an hour, the other has left the dynasty of the virtual battlefield of ants, and wood in late autumn followed suit to leave.
A time into the chaos of war!...
No comments:
Post a Comment