Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 1794 Hacker Confrontation

Previous page        Return to Catalog        Next page

    ??In an old apartment building in Severodvinsk, a group of people are gathering together.  There was a long table in the middle, with computer monitors all over the table. A group of people gathered together and stared at the computer screen, and the sound of typing on the keyboard was loud.

    Many people smoke, causing the whole room to be smoky.  This place is like a third-rate Internet cafe with shabby and outdated facilities.  But this facility can only refer to the furniture and layout, not the computers they use.  In fact, if you are really an expert, you can tell at a glance that the price of one piece of computer equipment they use is enough to buy this building.

    "Report the situation." A white man in a suit whispered.

    "The situation is normal, we can get there within half an hour at the fastest Huh? No! There is the latest situation." Another young man wearing a gray sweatshirt and hat said in surprise, "It seems that someone has discovered us!"

    "This is impossible, we have bypassed the firewall. Besides, if they really find us, they will immediately disconnect the network for security reasons. All our previous work will be in vain." The man in the suit shook his head and said, "North German  The security personnel in Skok will not even think of this."

    "Damn it, we detected a system administrator who is constantly blocking us." Another hacker who controlled the computer was also surprised.

    "Who is this guy? I'm here too. Is he dealing with several of us at the same time? No, he seems to be attacking himself, using reasonable service requests to occupy too many service resources, so that we can't get a response from the service."  The man in the sweatshirt said in surprise.

    "It is a pseudo-DDoS attack! He has the priority of administrator privileges. It should use more puppet machines to launch the attack, so that the traffic in the Severodvinsk system will be excessively concentrated, causing the system to slow down its response to us.  And this person is a master, and he controls the scale very well. Even though the system is extremely congested, it can always pass the self-set threshold to avoid issuing an alarm." Another hacker said in surprise.

    Ddos attack, also called denial of service attack, is quite simple and crude. By piling up a large amount of junk data, the user's normal access is "blocked".

    The man in the suit stood up, checked the computer, frowned and said, "This means that he is using himself to occupy a large amount of system resources to restrict us. Interesting, who is this person?"

    "I've never heard of them having such a person." A hacker shook his head.  "This guy is acting like a scoundrel now. He has occupied most of the table, leaving only a corner for us. We are full of skills, but we can't compete with him. Because not only does this table belong to him, but he also brought it to us.  There was a large group of brothers, all lying on the table and not moving."

    "That's not the point. The point is why he didn't sound the alarm. If he really wanted to do that, it would only take a few minutes to shut down the system and completely disconnect the network. We can't get anything. But this  But people just don¡¯t do this, and they have to demonstrate to us in this way." The man in the suit frowned.  "Don't you think it's strange?"

    "It's indeed a bit strange. Does he know who you are?" The young hacker in a sweatshirt looked at the man in the suit and said.  ¡°Think about it, in October 2016, we used DDoS to attack Dyn, the main DNS service provider in the United States, and most of the United States was disconnected from the Internet.

    In that attack, we used more than 10 million IP sources and used a large number of IoT devices to carry out the attack.  Therefore, it is called the most serious DDoS attack in history.  It even attracted the attention of the U.S. Department of Homeland Security.  Is that why he provokes us in this similar way?  He knows who we are!  "

    "This is impossible!" The man in the suit shook his head in surprise.  "No one knows about this."

    "But he must know that he is provoking!" A hacker looked at the screen in surprise. The codes floating on the screen were organized into a character pattern. It was a hand, and it was raised high towards the screen.  A middle finger, then a scornful smiley face made entirely of characters.  and a few words - Phoenix Checkmate.

    "Damn it, he knows me." The man in the suit's expression suddenly changed.  The English meaning of Phoenix is ??Phoenix.

    "Boss, the situation has become weird. Should we stop immediately?" the young hacker in a sweatshirt whispered.

    "No! From the fact that he knows who I am, he is definitely not the network security personnel in Severodvinsk." The man in the suit's eyes moved, "He is another intruder besides us!"

    "You mean he is also a hacker?!" People around him were a little surprised.

    "That's right, judging from the way he arranged and launched DDoS attacks, he is not only a hacker, but also a master hacker." The man in the suit sneered, "Brothers, he is telling usFight, and do it in the way we are good at.  But it also means that he doesn't dare to make things big, which is why he keeps ddos ??attacks within acceptable limits.  "

    "So, he has scruples. As long as he has scruples, we can seize this point and fight with him!" A hacker whispered, "Our ninth group has never been afraid of challenges."

    "You're right, we just want to defeat him and then take the key code in a grand manner." The hackers shouted loudly, and many people started to curse.

    "Start and attack him with all your strength. I don't believe he can stop so many of us by himself. Moreover, he is worried about gain and loss, fearing that he will be discovered. Let's see how long he can hold on!" The man in the suit said with a smile.

    In the basement, Cobain was already sweating. He asked his network support team loudly, "How is the progress?"

    "Their IP addresses have been transferred dozens of times around the world, from Copenhagen to the United Kingdom, to the United States and even to Southeast Asian countries. But we are still tracing!" The voice of the temporary head of the technical team was hoarse due to nervousness.  .

    "Okay, try to hurry up. I have attracted him. It seems that he is going to fight me to death. But I don't know how long I can stop him. Because our current situation is very delicate. Although we are helping Bei  The Russians in Dvinsk must not be discovered by them, otherwise the mission will be completely over. The people of Group 9 will also flee immediately." Cobain whispered.

    ¡°I understand.¡± The head of the technical team responded in a low voice, and soon the only sound left in the headphones was the tapping sound of the keyboard.

    Lin Rui and others are currently in place. They are distributed in five areas of Severodvinsk and are ready to surround and kill the members of the ninth group after the positioning is completed.

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report