Top Hacker Develops Artificial Intelligence at 14

Page 48



I found that everyone, like him, was also in extreme shock, with their mouths opened wide.

Several bigwigs from the technical team spent another 10 minutes making a short plan, researching the weak points of the blue system, and finally came to a conclusion:

They're stuck in an endless loop!

The technical barriers of the blue system are too strong!

Even if they guessed a feasible method, the system would directly identify the source of danger as soon as they encountered each other, and carry out isolated interception.

The system rejects any external risk factors to access the browsing authority. Even if they disguise viruses as normal access behaviors, they have no way to enter the internal firewall.

If they cannot enter the firewall, the red party will not be able to enter the system to view the desired information at all.

This brings the problem back to the starting point - if you want to control it, you must first defeat it head-on.

Li Yao wandered around the podium like a leisurely stroll, and the big blue screen behind him still displayed the green and safe sign, indicating that no information had been leaked out.

From the sweating experts on the opposite side, it can be seen that they are a little flustered at the moment.

Li Yao couldn't help laughing out loud.

Are they overwhelmed with just one particular honeypot system?

In essence, honeypot is a technology to deceive the attacker.

Li Yao lures the attackers to attack them by arranging some hosts, network services or information as bait.

Thus, he can capture and analyze the attack behavior of the red party, understand the tools and methods used by the attacker, and then speculate on the direction and starting point of the attack, and block isolation.

Moreover, Li Yao can also clearly understand the security threats he will face next, and enhance the security protection capabilities of the actual system through technical and management means.

Therefore, no matter how many people the red team dispatches and how many different offensive methods it uses, the blue team has to go through this level for him!

And the subsystems are all in the same processing mode.

It's just that the only thing to be solved is the problem of high concurrency.

Under the strong protection of the Dark Viper system, the simulated weapons and equipment signals are like a delicate canary, which can only be seen closely, but not played with.

This group of experts returned to their positions and became more and more silent.

The Dark Viper system had brought them too much shock, and they had to use it to break through a few defensive lines first.

Charles in the corner next to him was puzzled, "Why didn't the technical experts take any action? The screen on the red side hasn't refreshed yet."

"Ahem, maybe they really encountered a hard stubble." Ackerman's expression changed from shock to admiration.

As expected of Mr. Li, this man who is hailed by the media as an oriental magician... can really perform miracles like magic.

Although Li Yao is the defensive blue side, he is always analyzing the attack paths and technical systems of all the attacking sides.

Soon, he made countermeasures for each attack source based on the data flow information of the Dark Viper system.

The corners of Li Yao's mouth raised slightly, ready to give this gift.

He tapped the keyboard, modified the network environment, and deliberately exposed several system loopholes.

Sure enough, the moment Li Yao released the trap, it was instantly monitored by the background program of the Red Team's technical team.

The team leader immediately stood up and said in a deep voice, "Huh, you're too young, if you blindly defend in an all-round way, you will eventually show your flaws!"

The person in charge is experienced and concluded that the blue system can no longer support high concurrent events.

When the thread reaches the limit, the program code will have a BUG.

"Yes, you are right. We did find a loophole!" A professor said firmly.

Everyone regained their strength and began to attack frantically at the loopholes.

Dozens of red light dots flickered on the big blue screen, simulating the path of virus invasion, and they were approaching the bottom warning line.

Inside the cordon is the control of the weapon system.

The distance between the two sides gradually narrowed, the blue safety zone also narrowed, and the danger was close at hand.

Other senior executives of BBE were also present, their eyes flickering.

In just ten minutes, they had already been surprised by this Oriental man several times, but at this moment it seemed that they were at the end of the road.

"From this point of view, Mr. Li's Dark Viper defense system looks good, but the safety factor has yet to be considered."

The president of BBE Systems whispered to the others.

Everyone nodded, "It can be promoted vigorously for civilian use, but if it is sold to military forces, it will be fatal if the high concurrency problem cannot be solved!"

"That's right, the military won't purchase it..."

The president confidently looked at the red team's technical team and raised his head.

These technical developers are the elite backbone and backbone of their company!

These white-haired old men are BBE's strongest men's group, and their fighting power is crazy!

Chapter 77 Li Yao: You all come to attack me, I will hit fifty of them!

The technical team is all top computer experts invited by the human resources department from all over the world, especially the Silicon Valley area.

Whether it is hacking technology or development technology, they are at the forefront of the world. They have also been the main generals of giant companies such as Microsoft and Oracle in the past, and many of them have also participated in the development of military projects.

……

The expert leader Coster felt that he was getting closer to the goal, and he accelerated his action under excitement.

Within half an hour, Coster kept tracking, cracking, tracking, and cracking in the Darkviper network.

Through his continuous efforts, he finally saw a glimmer of light - he found a firewall with a unique technical point!

Because different levels of firewalls protect different levels of information!

Koster observed such a special firewall, even if the code translation was ambiguous, his eyes were still full of joy.

This shows that he is not far from the authority key of the weapon system!

Facing the weird firewall, Coster showed a determined smile, and then he began to call all the staff to take action.

These old British men have explained well what it means to unite as one!

We must handle this oriental boy!

Otherwise, they wouldn't be able to compete in the arena... oh no, they would be in the international computer field.

Even if they can defeat the world-renowned chairman of Shining Star Group, they don't feel that they are bullying the small.

Rather, it is an honor.

Even though they have limited mobility, they are still articulate, making key suggestions one by one to overcome technical difficulties.

Soon the multi-layer firewall of Dark Viper was disintegrated,

The red offensive area spread more and more, forming a network to break through the defense points of the Dark Viper defense system one by one, hitting Huanglong like a bamboo.

The technical team is operating the virus program handily, constantly disintegrating the internal system of the system, and has even deciphered a small part of the permission information.

They quickly saved this part of the permission information, and then continued to conquer the next firewall.

The eyes of this group of technical experts showed a look of joy. If it continues, the blue team's defense will collapse across the board.

Just when everyone thought the offensive and defensive battle was about to come to an end, Coster suddenly looked up and saw Li Yao smiling at him.

This kind of smile is not a bitter self-deprecating smile, but one with disdain and arrogance.

Suddenly, Coster felt a sense of unease in his heart.

Immediately, he lowered his head and was a little absent-minded when observing the computer data.

He couldn't help but wonder in his heart: I was afraid of a young boy just now?

"No! Our virus program has been infected by a Trojan horse!"

As soon as the red monitor finished speaking, the large red offensive points on the big screen disappeared like fireworks and were replaced by shining blue defensive points.

No, not right!

That's not all!

These abnormally discolored defense points are not only not stationed inside the system, but instead are conducting path anti-tracking, tracing back to the source and heading straight to the red team's base camp.

Dense blue light spots poured into the operating terminals of the red team's technicians like a honeycomb, and the layers of red team's firewalls were like paper paste, completely unable to stop this network torrent.

The offensive was fierce and ferocious, and the group of old experts were completely denied a chance to react.

The situation turned around so quickly that everyone was caught off guard, and the server was attacked in the blink of an eye.

Hong Fang's underpants were about to be ripped off by Li Yao.

Everyone was in a trance, only seeing Li Yao chewing gum alone, ignoring BBE's so-called senior expert team, as if they had expected all this.

Li Yao thought in his heart: "These guys really think they can break through their own firewall, they must have drunk too much before coming here."

If he hadn't leaked the network loophole on purpose, how could they have found a loophole to break into the Dark Viper.

Even if the permission information they can obtain is a Trojan horse virus faked by Li Yao.

His Trojan horse virus program design is advanced, and it can quietly attach to the normal virus program of red users.

When the other party was still excited to get the virus feedback data, they didn't know that their virus program code had been tampered with by Li Yao's Trojan horse.

Once the red party user triggers the feedback operation of the virus program, the attached infection instruction code will be activated at the same time!

After activation, the Trojan horse can silently assimilate the Red Fang virus and turn it into Li Yao's use.

Even the data transmitted back to the red party server is fake data, which helps the Trojan locate the source of its attack.

When all attack point viruses are analyzed and infected, all Trojan horse viruses are dormant and ready to go, waiting for a wave of rebounds!

Because of its advanced complexity, none of these "empirical" old-school technologists have discovered it!

At the same time, a piercing siren suddenly sounded from the red team's data monitoring screen.

A technical expert turned his head to look at the location of the alarm, and immediately changed his expression: "Hurry up and close the personal port, otherwise the central terminal will be assimilated by the infection chain, and all threads will collapse!"

As soon as these words were spoken, the other technical experts in the laboratory froze their hands and sighed.

It's too late, everything is too late!

All the offensive systems of the red team were terminated in one pot, and even the power supply system was cut off.

Lost, completely failed!

After hearing the news, the president of BBE Systems was taken aback for a moment, and then frowned.

He couldn't believe it, the BBE's strongest elderly men's group was defeated like this? !

The full-time staff around him kindly reminded: "The blue side won, and Mr. Li is already waiting for you below."

It was only then that all the high-level people came to their senses, and they couldn't let go of it for a long time.

Ackerman walked towards Li Yao tremblingly, his face flushed and he said excitedly, "Mr. Li, you are my god, today's information war has feasted my eyes even for an outsider!"

Li Yao patted him on the shoulder and said calmly, "Don't get excited, it's all basic operations."

Passing by, another group of BBE executives came straight to him.

The leader is the president of BBE, and then there are technical team members.

"Mr. Li, you really opened our eyes today." The president was full of emotions, and he still couldn't finish his words.

"The board of directors has fully approved your Dark Viper defense system, and has sent relevant images to our military partners. Soon the name of "Dark Viper" will spread throughout the chamber."

Li Yao nodded, "Your efficiency is really good, I will save a copy of the system data for your report later."

Seeing the hesitant looks in the eyes of many BBE executives, Li Yao chuckled.

"I know your thoughts," Li Yao promised, "I will not resell the Dark Viper to other companies until the end of our military production line project."

Everyone breathed a sigh of relief, and the president patted his chest and said, "I believe what you said, and our BBE System Company will not let you down, and we will definitely give you a very satisfactory selling price."

Chapter 78

Coster sat there blankly, he didn't expect the blue side to counterattack so quickly!

In less than a minute, they successfully invaded their information network!

Didn't the blue party have been suppressed and beaten by them all the time? How could they be infected and fight back in the blink of an eye?


Tip: You can use left, right, A and D keyboard keys to browse between chapters.