Chapter 584 Uncle Jess, I seem to have heard something strange.(1/2)
(Please vote for the super large chapter)
"The bottom layer of data exchange on the Internet is actually the transmission of data packets. Various information is encapsulated in these data packets and then transmitted to various computer terminals for processing.
"Our current attack method can be understood as sending some data packets covering the control program to the enemy's computer. Once these data packets successfully enter the opponent's computer, we can find ways to gain control of the opponent's computer.
"The firewall is a protective means that cuts between the internal network and the external network. It can effectively filter out which data packets come from allowed users and which data packets come from disallowed users, thus blocking those 'malicious users'."
'The user's data packet enters the computer.
“The function of anti-virus software is that after malicious data packets enter the computer, the anti-virus software can identify those malicious data and programs and remove them from the computer.
"Of course, this is just a brief process. The actual situation is much more complicated than this. Well...Uncle Jess, did I go too deep?"
Vianna paused and seemed to be thinking,
"Ah, I thought of it, Uncle Jess, you can understand it this way, we are currently engaged in a siege battle similar to the one in the novel.
"Your friend with the symbol E in the underlying data and I are the attackers, and the hacker opposite is the defender. The firewall is the city wall, and the anti-virus software is the defensive force in the city.
"This city is not just one big city, they also have many satellite cities, which are small computer terminals on the periphery.
"There are normal exchanges of personnel and materials between big cities and satellite cities, and this is ordinary transmitted data.
"These urban agglomerations composed of satellite cities and large cities, which are secondary intranets, also have a larger firewall outside.
"When you first broke into the network of the laboratory outside, Uncle Jess, you first bypassed the firewall outside and entered the urban agglomeration of these satellite cities, allowing E to first occupy a satellite city with weak defenses.
.
"Then she took advantage of the exchanges between this satellite city and other satellite cities to quickly occupy other satellite cities.
"After occupying these satellite cities, we can mobilize the computing power of these satellite cities, that is, city resources, and bypass the peripheral firewalls through the network to put more of our data packets, that is, soldiers coming in.
"At the same time, we can also have our soldiers disguise themselves as normal soldiers in this satellite city and try to sneak into the big city, which is the core server, and the wall of that big city, which is the function of the firewall, is to filter out
Find out who is a normal soldier and who is our disguised 'spy'.
"The overall computing power of the network of the peripheral laboratory we attacked before was not high. If our 'spies' got into the core server, even if the hacker himself has strong computing power, the computer created by E's powerful computing power would
We are all vulnerable to the data tide.
"The 'anti-virus' troops in the city will be easily defeated by us, and then the city will be occupied by us.
"The hacker probably knew about this situation, so he spent most of his computing power on maintaining the firewall and improving the firewall's screening capabilities.
"At the same time, he is also detaching a part of his 'troops' to uproot the satellite cities under our control.
"Because theoretically, as long as all the terminals we control on the internal network are cleared by him, we will no longer be able to send 'troops' in from the outside to attack the core server."
The girl's voice paused for a moment, "Uncle Jess, can you understand this metaphor?"
"I understand, but I don't seem to fully understand."
He Ao raised the bone axe, once again split an oncoming attacker injected with genetic medicine into two halves, and moved forward quickly.
Wei An knows the knowledge that Wei Anna said, and He Ao, who inherited Wei An's memory, also knows it, but Jace shouldn't know it.
"So you are actually playing some kind of strategic game. If we push down the opponent's main city, it will be considered a victory, and if the opponent clears all our occupied territories, it will be considered a victory?"
"Well, you can understand it this way."
Vianna was still typing on the keyboard.
Due to work reasons, this girl seems to rarely communicate with other people, and once she starts talking, she can't stop talking.
"So what happened to the 'trap' you mentioned before?"
He Ao then asked.
"This is simple,"
When Vianna was asked about her plan, she was a little happy and quickly replied,
"Isn't the hacker on the other side going to allocate computing power to take out the stronghold we established? But his total computing power is limited. The more computing power he allocates, the less computing power he has to defend the core server.
"In view of this feature, I first arranged three terminals as the first layer of 'traps'. These three traps are progressively layered in order to disguise a large-throughput 'key network terminal'.
"In fact, most federal smart devices now support simultaneous connection to internal and external networks.
"Many computer terminals in the laboratory above also support this function. They can connect to the internal network and the external network provided by the communication service provider. They can use the external network to temporarily maintain work when there is a problem with the internal network.
"And in this case, smart devices generally use a corporate account, and they can collectively access the external network directly through this corporate account.
"However, all the equipment in this laboratory has the function of connecting to the external network turned off. We entered the internal network and after controlling the terminal, we also enabled the external network access function to deliver more remote computing power.
"Generally speaking, the attacker's computing power is not enough, well... not as exaggerated as E, so in order to concentrate the computing power, they usually only project the computing power to the external network through one or two terminals. This kind of
Terminals are 'critical network terminals'.
"In this kind of battle, it usually takes time to rebuild a 'key network terminal' after it is destroyed. In this case, our computing power may be insufficient, causing the opponent to reverse the situation of the battle.
“But in fact, because of the powerful computing power of ‘E’, all our network terminals are ‘key network terminals’, but the hacker on the other side doesn’t know that, so he has been trying to find our ‘key network terminals’.
"With this feature, I used a series of traps to disguise a fake 'key network terminal'.
"Those three serial traps have only one function, and that is to attract hackers' attention to other network terminals and 'protect' the 'fake key network terminals' we disguised.
"The hacker was very smart. He identified three of my traps and then determined the location of the 'key network terminal' I pretended to be. So he mobilized a lot of computing power and prepared to directly destroy the 'key network terminal'."
Speaking of this, Vianna laughed and her tone became lighter, "Then he entered my trap. Because the computing power to protect the core server was reduced, E easily broke through his defense and controlled the core server.
device.
"I also found his data channel connecting the above-ground laboratory and the underground laboratory. Unfortunately, he ran too fast and closed the port the moment the server was breached. Otherwise, we could just drive in without having to fight here.
Firewall."
The little girl sighed, "This guy is still strengthening the firewall."
To sum up, Vianna created a fake target to attract the hacker's attention, and then used several small traps to mislead the hacker, making the hacker think that the fake target was real.
Then the hacker mobilized his strength and prepared to injure Vianna and Eve in one fell swoop. Unexpectedly, he fell into Vianna's plan and Eve had her home stolen instead.
"It's okay, there will be a solution."
He Ao tipped the axe, and bright red blood flowed down the ax blade. In front of him, there were the last two researchers, and the blood covered the gate that horizontally separated the elevator shaft under He Ao's feet.
These researchers were waiting here when He Ao landed on the gate, and each had a D-level genetic potion in hand.
They should have been sent up before the gate was closed, and their purpose should be to 'impede' He Ao from continuing down when he found this place. Only the last two of them are dead now.
"Devil, you are the devil..."
At this moment, the two researchers were trembling and retreating, and did not rush over like the previous researchers.
He Ao switched the headset to Eve's single-line communication, "Eve, how long will it take to break through the firewall?"
"It's estimated to take another fifteen minutes and thirty seconds."
Eve's voice was unusually calm.
"Fifteen minutes is too many,"
He Ao paused for a moment. The other party must be transferring data frantically now. "Is there any way to bypass the firewall?"
"Retrieving information,"
Eve's voice paused, "According to the data of the core server of the peripheral laboratory, there is a 90% probability that there is only one core router in the hidden laboratory connected to the external network, and other devices have no networking capabilities."
In other words, He Ao's method of finding a random computer and implanting the control program compiled by Eve to bypass the firewall will not work.
Those terminals cannot connect to the external network, and without Eve's external computing power support, they only control one or a few terminals. There is a high probability that they will be easily cleared by the hacker.
However, in this case, after violently breaking through the firewall, there is a high probability that you can directly control the core server of the hidden laboratory. Unfortunately, fifteen minutes is still too long to break through the firewall.
"Where is the data port of China Unicom's internal and external laboratories that Vianna mentioned? Is there any way to restart that port?"
He Ao asked again.
If the data channel between the internal and external laboratories is reopened, Eve can deliver computing power through the network of the external laboratory and directly input it into the internal network of the hidden laboratory, thereby bypassing the internal network firewall of the hidden laboratory and continuously delivering computing power.
force.
This can repeat what we just did in the external laboratory and greatly shorten the time to control the core server.
"Reading building construction drawings... Possible line layout is being simulated...Simulation successful... Possible locations of internal and external network smart switches have been marked..."
Along with Eve's voice, He Ao's bracelet vibrated.
A 3D image appeared on the projection of his wristband, and the image marked the location where he was standing, which was above the elevator shaft gate.
Not far from this gate, at an almost horizontal position, there is a closed emergency passage that connects the ground and the underground. According to Eve's mark, there is a 73% chance that the intelligent switch in the internal and external laboratories is right in the middle of this emergency passage.
Behind a secret door.
He Ao touched the projection with his finger and took a look at the surrounding structures.
The gate of this emergency passage should be made of an alloy similar to the gate under his feet now. It is not easy to break through in a short time.
If he takes the normal route, He Ao needs to return to the ground and find the closed gate of the emergency passage from the other side. Only after breaking through this gate can he enter the emergency passage.
Of course, he can also use his spiritual consciousness to speed up the breakthrough.
but······
To be continued...