Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> Special God of War

So what, do I qualify?

Previous page        Return to Catalog        Next page

    You can search "Special God of War" in Baidu to find the latest chapter!

    Opening Shirley¡¯s laptop, the wireless network card only detected one wireless network.

    The router that sends out the signal should be an old model from last year.  Because the signal encryption method is the wep format that has been eliminated.

    The reason why this encryption format was eliminated is because as long as the third-party device collects a sufficient number of handshake packets when the router and the terminal device communicate, the password can be obtained very easily through the algorithm.

    And the hard drive of Shirley¡¯s laptop is simply a large collection of small programs.

    The process of packet capture and calculation does not require manual instructions at all.  Open the search program, select the broadcast name of the wireless network, and directly press "f5" to start fully automatic cracking.

    In less than twenty seconds, the password for the wireless network appeared in the bottom command line.

    Mr. Long saw Liu Yi operating the computer calmly with one hand, which was completely different from the hacker master who made the keyboard crackle in the film and television works.

    Out of curiosity, he tentatively gave Liu Yi a questioning finger.

    After Liu Yi smiled and patted the empty space next to him, he happily moved to Liu Yi's side.

    With a pair of curious eyes open, he stared eagerly at the laptop screen.

    When his eyes fell on the screen, Liu Yi was entering the password to access the network.

    I watched with my own eyes as Liu Yi typed the complex password he had set into the password input box one by one.

    Mr. Long¡¯s eyes flashed with wonder, and he couldn¡¯t help but whisper: ¡°Si Guoyi Li Sang, how did you do it, can you teach me?¡±

    "Okay." Liu Yi responded with a smile and started the LAN scanning program.

    Seeing Mr. Long looking at the continuously beating lines of serial codes in the small window with curiosity, he whispered: "Actually, as long as you master the principles, everything is very simple.

    I will give you some small programs I compiled later, so you can do it easily.  "

    ¡°Oh~oh~Aringado, this is simply amazing.¡± When Mr. Long responded excitedly, the scan results had already appeared on the laptop monitor.

    In addition to the laptop Liu Yi is using, there is also a router and two terminal devices.

    Looking at the device names, they should be two desktop computers.

    Liu Yi installed a plug-in in the search program and immediately started port scanning on two desktop computers.

    Mr. Long and his subordinates¡¯ computer skills are indeed very weak, not to mention computer novices.

    Not to mention disabling the guest account, even the password is not set, everything is in the initial state after the system is installed.

    Liu Yi easily used the guest account to log in to one of the devices with very old hardware through a protocol vulnerability.

    I found that the system was newly installed and the hard drive was empty.

    By comparing the hard disk capacity and the space occupied by system files, the results are exactly the same, there are no hidden partitions or hidden folders.

    So, another device was connected.

    In the second device, Liu Yi easily found a folder with hidden attributes under the root directory of the system disk.

    After opening it, it was found that there was a file compression package in winzip format.

    Liu Yi glanced at the version number of winzip and secretly breathed a sigh of relief.

    Except for early versions that have public vulnerabilities, the best way to crack encrypted compressed file packages is to hang a dictionary.

    Although it is theoretically possible to crack it, due to the difficulty of the password and the speed of the computer hardware, this process can take hours or even days.

    This is too detrimental to Liu Yi¡¯s current image as a master.

    Fortunately, what is installed in the target computer is a promotional version specially used in the bonus CD of electronic publications.

    There is an algorithm flaw in this version, that is, no matter what password you set for the compressed package, it can be opened with five English letters in the "11123" format.

    So Liu Yi opened the dictionary editor, first checked twenty-six English letters, and then limited the password length and combination characteristics.

    After importing the compressed package and pressing the start button, the code running program will start from "aaabc" and test the passwords one by one at a speed that cannot be captured by the naked eye.

    Mr. Long looked at Liu Yi¡¯s opportunity and asked tentatively: ¡°Can I get the password in this way?¡±

    "Yes." Liu Yi nodded, pointed at the window of the coding program and said: "The next process depends on the speed of the computer.

    If conditions permit, multiple computers can be used to work in sections.  Thatbsp;¡ª¡ª¡ª¡ª

    Liu Yi relied on the intelligence obtained by the Baodao Intelligence Department and spent a lot of manpower and material resources on the investigation.

    Shirley computer, a high-efficiency fool-like small program.

    And his own ability to fool, he successfully conquered the computer Mr. Bailong.

    As the two people held hands together, they officially joined the gang and became a member of the robbery gang.

    After Mr. Long solemnly announced the news to a group of his subordinates, the nine members of the gang, old and new, cheered instantly.

    Then, the movable partitions in the middle of the private rooms on the left and right sides were opened, and after several dining tables were placed horizontally and merged together, the dinner party to welcome Liu Yi and Hua Hu officially began.

    As barbecued meats, grilled fish, seafood, and sushi are served one after another, you can drink sake.

    Mr. Long¡¯s seriousness as the team leader gradually faded away and he showed a very friendly side.

    Sitting cross-legged in the big room, he pulled open his scrupulously tucked neckline and spoke with great interest to a group of younger brothers about Liu Yi's magical skills in computers.

    Yin¡¯s subordinates were acting like a bunch of lunatics, constantly exclaiming ¡°oh¡± and ¡°oh¡±.

    During this period, one after another picked up the wine glasses and kept toasting to Liu Yi.

    ?????????????????????????????????????????????????????????????????????? out?????????????????????????????????????????????????????????? out???? found that the subordinates were a little neglected and Huahu found an opportunity to talk about what he knew about the experience of "Hulan".

    And in an extremely exaggerated tone, he said that "Hulan" relied on his extraordinary skills to join the Scout Troops of the Northwest Military Region.

    And during his stay in Treasure Island, one person sent all ten gangsters to the hospital.

    As Mr. Long narrated, Liu Yi, who seemed to be drunk and hazy, was keenly aware that a group of minions also exclaimed in surprise.

    But there are a few of them with obvious disdain in their eyes and eagerness to try (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report