Font Size:
Theme:

Chapter 24:First Encounter with Angel

In view of the fact that the current Tianyin system is temporarily limited to the sea city, and the behavior feature capture program still needs time to complete, so Li Chunfeng temporarily named the system as the "eye of the sea".

Li Chunfeng just hurriedly networked, and now began to further remove the duplicate camera, optimize the monitoring perspective, record the monitoring blind spot area, and then mobilize the satellite to complete.

While optimizing, a server from NASA suddenly received an intrusion alert.

Originally, with the spread of kine-force 2.0 in the Internet, there will be a large number of such information as intrusion alarms at every moment, and Li Chunfeng usually ignores it.

It’s just that I’ve just hacked into the satellite system at NASA, so it’s more sensitive.

After all, the invasion of kamilies 2.0 has not been discovered so far, is there any black technology in NASA that can find kamikight 2.0?

With questions, Li Chunfeng quickly started a perceptual concern thread and locked the server.

Then it was found that the server, it seems that an intrusion and counter-invasion offensive and defensive war is under way.

Li Chunfeng found that there are three different characteristics of information package in the server, two of which are constantly enhancing the defense of the server firewall, while constantly filling the system vulnerabilities.

The other is constantly scanning the attack system, which seems to be finding more vulnerabilities in the system.

It seems that the attacker is one person, the defensive side is two people.

Since it is not the discovery of kneumen 2.0, then you can calmly watch a hacker intrusion battle.

This is never the experience, of course, Li Chunfeng will not let go of this kind of moving a bench to sit on the side, only to see the wonderful opportunity of not talking.

However, in case the two sides suddenly strike and run, of course, it is also curious, Li Chunfeng another thread, began to track the real IP of these three hackers at the same time.

The attacking side was named A by Li Chunfeng, and the defender was named B and C.

The defender occupies a clear advantage, and B and C are always calling the firewall or other tools to accurately block the A's offensive line.

In addition, Li Chunfeng found that C actually used another computer, and he had sprinkled on the springboard broiler behind A's side.

I’m obviously going to copy A’s nest.

A doesn’t seem to notice, or doesn’t care at all that someone goes through the broiler to find him.

At this point, A seems to have found multiple vulnerabilities in the system through intensive offense and powerful scanning.

Almost as soon as C took control of the broiler A, A had broken into the core of the system from one of the vulnerabilities.

B and C did not find out and still block the attack of A in the firewall.

"Oh, it's an old way to go, but it's a good way to use."

Li Chunfeng hit his mouth, it was a bit of a feeling.

At this point, the tracking thread has returned the information, and the IP addresses of B and C are displayed, which is consistent with the location of the server.

Apparently, B and C are NASA cybersecurity personnel, and the information is further fed back.

B, real name Robert Hans, head of the space agency's information security department.C, his real name is George Sewell, senior senior staff in the Information Security Office of NASA.

Li Chunfeng then stored the information classification of the two people, of course, the characteristics of the two people's online code.

Then, A's real IP address and its relevant information were also reported back.

A, the real name Isabella Taylor, 24 years old, the most critical thing is that there seems to be a hacker code name, actually called "Angel", he gave her abbreviated A also match.

The camera saw itself.

Face shape like a full moon, a pair of light blue, long eyes slightly bulging, and the eyelids form a plane, at this moment because of the success of the invasion and rushing, eyes seem excited.

This has short golden hair, has the face of a typical European and American beauty, but also worthy of the name "Angel".

At this time, the "Angel" has completed the flash, as if to download something, Li Chunfeng quickly copied the information package she was ready to download.

After this information flow feedback came back, Li Chunfeng found that this was part of the satellite positioning system code program.

This makes Li Chunfeng quite doubtful, this "Angel" pain so hard to break through the NASA server, for these code?But Li Chunfeng really did not see what strange this code was.

Then from the camera, I saw this golden short-haired beauty excitedly shouting "Yes!"He raised his right hand and waved it.

It looks like the code package has been downloaded.

Suddenly, Li Chunfeng's psychological misconduct was committed, and his thoughts moved.

The “Angel” laptop screen shows a line of text.

“Angel, congratulations on your success!”“Angel, congratulations on your success!”For the sake of writing, the dialogue below is in Chinese)

“Ah!”Angel was so scared that everyone stood up and stepped back a few steps away, and his eyes were full of horror.

After waiting for a few minutes, Angel found that the computer did not move further, so she walked back, she reached out and pressed her chest, which seemed to make her feel more at ease.

The slightly calm Angel sat down, quickly opened a writing board, and quickly knocked out a sentence on it, “Who are you?”

“I’m a god, don’t you?”

Li Chunfeng did not write on the writing board she opened, and still showed it directly on the screen.

Angel suppresses the huge shock in his heart, for his own level of hacking, Angel is very confident, it can be said that in the North American hacker world, he can enter the top ten.

I have dreamed of displaying text directly on the screen of their own black broiler, but they have never been realized, and they can only call the tablet program to write messages.

But this kinesty, even directly write screen, and, how did he invade his own computer?

Know that in his own computer, the defense software is scanning all the time for all kinds of foreign information, how can he hide and hide?

“How did you find me?How did you hack into my computer?”

“God is everywhere, the wind is everywhere!”

Angel's hands suddenly moved, the hand speed is amazing, called out the command line window, the instructions fly.

Apparently, Angel tried to find Li Chunfeng, who had intruded in.

Li Chunfeng happily watched her busy in front of the computer, and at the same time observed her operation to see if she had a place to learn.

Li Chunfeng found that Angel's scanning program on the system is still good, after her scanning, basically the vast majority of vulnerabilities will be found, the intrusion of the data is also unscathed.

However, Li Chunfeng still found that the speed of this scanning program is really not ideal.

By the time Angel finished scanning, it was an hour.

At this time, Li Chunfeng found that the NASA George Sewell had been forced to step through Angel's broiler springboard, and it is estimated that two more broilers would find Angel here.

After the Angel scanned the computer in front of the screen, it quickly filled the newly found vulnerability and then relieved.

Now she believes that the kale should be kicked out of the computer by herself.

However, she tentatively wrote on the writing board: "Godwind, are you still there?"

“Have you finished scanning?”Too slow!Your 4899 broilers have left their tails, and the NASA guys have come to the door, hurry up and we'll have a future."Li Chunfeng wrote back.

Then I saw Angel open his mouth, his eyes full of incredulity, and murmured in his mouth: “This...impossible!”I’ve closed all my holes, so why are you here?”

Li Chunfeng quits the thread, anyway, all the information of Angel is in his own hands, and if he wants her, it is easy to locate her.

Angel looked at Li Chunfeng's message, waited for a while, and even asked a few times, without getting any feedback, and finally believed that this mysterious kneumen had left his computer.

Then she quickly operated on the computer for a while, then exclaimed, “Oh my God!The NASA guy really followed, and I'll take him around."

Angel's men were operating, and his heart had been impressed with the kamigical, who was not only safe under his own scan, but also found that someone was tracking himself.

Hackers who have been doing for so long have always been black to others, and this will also be black.

In response to that sentence, "It's always necessary to come out and get back."

Comments

No comments yet. Be the first to comment on this chapter!