home

search

Chapter 46: Unexpected Harvest (Part 1)

  Chapter 46: Unexpected Harvest (Part 1)

  As soon as Yang Yawei pressed the Enter key, the notebook's page directly switched to a new page, and then lines of code began to appear on the screen. Yang Yawei immediately looked at them carefully. These codes were the invasive programs that Yang Yawei wrote into the mechanical mouse. Some programs required a large amount of computation, but now the biological modification instrument was assisting beside him, so the computational power was not a problem at all. What Yang Yawei cared about now was whether his imagined invasion method could be implemented.

  In fact, Yang Yawei's current writing about the intrusion method in Mechanical Mouse is very simple and can be described in four words: simple and brutal. The most common intrusion is to exploit system vulnerabilities, leave a backdoor on the opponent's computer, and then quietly enter to obtain the highest system administrator privileges, achieving the purpose of intrusion.

  Yang Yawei now needs to utilize the mechanical mouse's powerful scanning capabilities to directly obtain information about the opponent's system, then simulate the opponent's system calculations within his own computer to find vulnerabilities in the opponent's system and directly invade their computer. This requires an enormous amount of computation; if not for the biological modification device, which is clearly not from Earth, this setup would be impossible.

  However, Yang Yewe now wants to use other methods, but it's no use. Mainly because Yang Yewe's theoretical ability is not yet up to par, and he can't write that kind of advanced program for the time being. But now with the help of mechanical mice and biological modification instruments, this simple and crude invasion method is actually the most efficient.

  However, Yang Yawei is now worried about the other party's firewall and security strategy, whether Mechanical Mouse can bypass it. The invasion speed of Mechanical Mouse was faster than Yang Yawei had imagined, in just ten minutes or so, all the codes were fine, after the last code jumped out, the page in front of Yang Yawei changed, he directly entered the background system of Xingmeng Jewelry Store's server.

  Yang Yawei himself had an administrator account, and as soon as he saw the familiar page, he knew he had obtained the highest administrative privileges. If Yang Yawei is willing now, he can kick out all people in the entire system and package or destroy all data on the server.

  Upon seeing the invasion succeed, Yang Yiwei immediately excitedly snapped his fingers, quickly operating a few rounds, really getting into the hacker's habit. After playing for a while, Yang Yiwei suddenly remembered that the mechanical mouse and biological modification instrument came with their own firewall defense systems. In other words, if someone tried to take back the system administrator privileges now, the biological modification instrument would automatically counterattack, without needing Yang Yiwei to intervene.

  Quickly opening the firewall page, Yang Yawei took a look at all the personnel currently connected to the server, and after taking a look at their status, Yang Yawei knew that his intrusion had absolutely not caught the attention of the Xingmeng security personnel. Now, Yang Yawei can choose to view the status of any administrator connected to the server.

  After randomly selecting a few administrators, Yang Yiwei found that their operations were all normal, which means that these people did not detect the intrusion at all. It seems that Mechanical Mouse is absolutely strong in handling signals. After checking around, Yang Yiwei discovered several unexpected things: first, there were several administrator accounts mounted on the server that were not in Xing Meng's headquarters.

  It's impossible for everyone who has a high-level administrator account on the Star Dream server to be working in the company, but these accounts are different. Mechanical Mouse has strong signal capture capabilities, and although each person's signal seems identical, they're not. At least the computer you use and your usual IP address have a certain frequency, even if it can't be pinpointed accurately, there is still some degree of similarity.

  The mechanical mouse has automatically identified and categorized the two high-level administrator accounts, according to the records above. These two high-level administrator accounts should be the two hackers who invaded last time and were driven away. Yang Yawei immediately became excited, if he didn't remember wrong, these two hackers should be with that killer together. Since these two hackers are still here, there must be a hidden super hacker, don't know if that super hacker is around or not.

  However, since they have been hiding in the system all along, it is clear that they want to destroy Xing Meng's security system, set up a Trojan horse for misleading or other purposes. Otherwise, they would not be able to enter Xing Meng and steal those diamonds on the same day. Yang Yiwei immediately switched to the pages of these two accounts, but soon discovered abnormalities. First, although these two accounts were in a hidden login state, and no one had found them, they were not in an active state.

  Yang Yawei immediately used the mechanical mouse to find the operation records of these two accounts. Soon, Yang Yawei felt a strange place. The server of Xing Meng is considered to be very luxurious, and it's not hard to imagine that such a large jewelry store has a strong security system. However, like Xing Meng, who bought so many high-end servers in such a luxurious way, actually didn't need them at all. At least 70% of the server resources were idle.

  These two accounts have isolated a portion of server resources, and outside this portion of server resources, a small shielding measure has been taken. In other words, a part of the resources were stolen from the server and became an independent area. What is going on here? It's worth noting that this is one of the easiest ways to get caught. Stealing server resources isn't unprecedented, many hackers invade some companies' servers precisely to steal server resources. However, long-term theft like this is still easy for security personnel maintaining the server to discover.

  After all, these security personnel are familiar with the resources of the servers every day, and Yang Yawei has been working on Xingmeng for some time. Although he is not very familiar with the security personnel on the 7th floor, he still has a very intuitive understanding of Hu Bing's technology. At least it is almost impossible to deceive Hu Bing with such means, unless there are other means.

  But anyway, isn't the main purpose of these people to steal these diamonds? What's the point of stealing server resources? And it's still this kind of long-term occupation of stealing resources? Shouldn't they have put a Trojan horse first, interfering with the entire Star Dream security program, invading the security system?

  Yang Yawei began to wonder if there was something else behind this group of people's actions, some other unspoken purpose. Otherwise, why would they do such a thankless task?

  Rushing for votes!!!! There's another chapter coming soon! I'm dead tired from moving! It took me two whole days to wash all my clothes! I'm going crazy!

Recommended Popular Novels