HK1294 Exposure and Stealing Breaking the Waves Fighting Pirates!(1/2)
.
July 28, afternoon. Jing Yayuan.
Even if the internal network is isolated from the Internet, it still cannot stop Shi Lei's invasion. It must be said that Shi Lei accepted the Xuanhuang Thieves Group before, which was definitely a very wise decision.
After easily obtaining the HDI technical information from Amimon Company, Shi Lei was not going to use the VR game helmet secretly, but logged into the official website of BBC TV station.
Shi Lei hacked the official website of BBC TV station by controlling the EB server, and then published an announcement on the homepage of the official website.
The title of the announcement is "hdi.for.free!", which means 'free hdi technology'.
In the announcement, Shi Lei used English to reprimand Amimon Company in Israel, accusing Amimon Company of being a technology monopoly company that has obtained a large amount of monopoly benefits through HDI technology.
Therefore, as an anonymous hacker, I have the responsibility to stop Amimon Company’s ugly behavior and publish Amimon Company’s HDI technical information to the world.
In addition to the official website of BBC TV, Shi Lei also published the same announcement information on major social networking sites and news portals around the world, announcing HDI technology to the world.
Because Shi Lei used an anonymous identity and Shi Lei's skills were very good, even experts at the same level did not know who leaked the core confidential information of Amimon Company.
After the hdi technology was leaked, Amimon responded quickly. They first asked the World Intellectual Property Organization for help, hoping that the technical information about hdi would completely disappear from the Internet.
However, their wishes will certainly not come true.
HDI technical information is widely circulated on the Internet, and it cannot be stopped by the World Intellectual Property Organization. Besides, a large number of netizens have downloaded HDI technical information. So what if it is blocked on the Internet?
Amimon Company launched an investigation into the leakage of hdi technology, but Amimon Company knew very well that the server where they stored technical data was not connected to the Internet at all. For this reason, Amimon Company's senior management was more interested in the possibility of internal crime.
After all, how can outsiders steal data from internal servers that are not connected to the Internet?
After launching an investigation, Amimon Company quickly discovered that the surveillance records had been purged. This clue seemed to further point to the internal perpetrators. If it were not for the internal perpetrators, it would be difficult for outsiders to clean up the records of the surveillance system.
The reason is that the monitoring system and the server that stores data are internal networks that are independent of each other and are also isolated from the Internet. How can outsiders control two internal networks that are not connected to the Internet?
Amimon Company mainly suspected the possibility of internal crime, which saved Shi Lei a lot of trouble.
However, making HDI technology public to the world is only Shi Lei's first step. Due to patent restrictions and legal reasons, even if HDI technology is leaked, it is impossible for entertainment companies to directly use HDI technology.
In order to use HDI technology openly, Shi Lei chose to start with two companies from the Southern Dynasty. The two companies from the Southern Dynasty were LG and Samsung.
LG and Samsung both own a technology. That is the wireless technology known as the most promising, 60ghz 'millimeter wave' technology. This technology, known as relesshd technology in later generations, has just released a ten-meter range
Internal linking specifications.
In the future, the camp for this technology will be very strong. In addition to the two companies from the Southern Dynasties, there are also four companies from the Wasang Kingdom, namely nec, Sony, Panasonic and Toshiba.
The companies in this camp are all behemoths. The technology they jointly promote is indeed a very promising solution in the field of wireless display technology.
Shi Lei plans to steal the relesshd technology and mix it with the hdi technology to form a brand new technical solution to avoid patent restrictions.
LG and Samsung, these two giant companies, did not disconnect the internal network from the external Internet like Amimon.
These two large group companies have R&D centers all over the world, and data between the R&D centers needs to be exchanged. Except for absolutely confidential technologies, which are stored in an environment isolated from the Internet, the rest of the data is placed on the internal network.
They are very confident in their network security!
Both LG and Samsung have the world's top hackers behind them. Even if the world's top hackers attack their internal networks, they are unlikely to succeed.
It's always easier to defend than to attack!
Unless, like Shi Lei, he has an unannounced vulnerability!
Shi Lei first chose LG Company as the invasion target. Compared with Samsung Company, Shi Lei subconsciously believed that LG Company was easier to deal with. In fact, this was indeed the case.
This is not because the world’s top hackers behind LG are weaker than Samsung’s backers; it’s because Samsung’s server computing resources exceed those of LG.
The competition between peak-level hackers and peak-level hackers is usually based on server computing resources. If the server computing resources are sufficient, even world-class hackers can defeat the world's top-level hackers.
Looking for teeth.
For example, if Shi Lei fights against Tao Xian, Tao Xian has the support of Yizuer, plus In Secret Network and the supercomputer Lightning, but Shi Lei only has a laptop, so how can Shi Lei defeat Tao Xian?
Even when Tao Xian was eating potato chips and watching the show, Yi Zuer tortured Shi Lei into a dog!
This is the principle of defeating ten societies with one force!
With the assistance of Yi Zuer, Shi Lei carefully invaded the internal network of LG Company. As a global multinational enterprise, LG Company's internal network is very advanced, even more advanced than the networks of some government departments.
In the LG company's internal network, even Shi Lei, the world's top hacker, felt threatened every step of the way. However, Shi Lei had the assistance of an advanced pseudo-artificial intelligence system, as well as more than 1,300flops of loosely distributed computing resources, and 300flops of
of intensive distributed computing resources.
Such powerful computing resources. Not to mention an LG company, even the FBI, Shi Lei was confident of attacking their internal network.
On the LG company's internal network, Shi Lei ordered Yizuer to query the information with low permissions, while Shi Lei personally checked the information that required high permissions.
Nanchaoguo, LG company headquarters, network security department.
"Jin Zaixian. Check the status of server No. 4. The data fluctuation is a bit abnormal!" A young man gave the order.
Jin Zaixian is a security expert in the network security department of LG Company, and his skills are among the best. "Minister Park, please wait a moment. I will check in detail immediately."
Server No. 4 is a high-level confidential server of LG Company. Although the information stored in it is not top secret, it is still some relatively important information.
Jin Zaixian carefully checked the status of the server. Shi Lei immediately discovered the status of the server. He paused the operation and cleared the temporarily generated data records.
About thirty seconds later, Kim Zai-hyun responded to Minister Park: "Minister Park, no problem was found on server No. 4, and the data flow is all normal!"
Although server No. 4 is connected to the Internet, due to data traffic restrictions, as long as there is a fluctuation in data replication, it will be discovered immediately. At the same time, the server's security defense mechanism can also instantly disconnect the transmitted data. With this set
Defense mechanism, even if it is connected to the Internet, it is relatively safe.
"Pay close attention to the security of the internal network!" Minister Park said seriously, "Amimon Company of Israel, the core hdi technology, has been leaked. I don't want our LG Company to become the next joke!"
The security experts from the network security department all laughed. Jin Zaixian also laughed and said: "Minister Park, is it their internal personnel who committed the crime? After all, the internal network is isolated from the Internet, how can outsiders invade?"
Minister Park also laughed a few times and did not continue to speak.
Shi Lei discovered that the server's command to perform data checking disappeared. He started decrypting data and scanning data again. All high-level confidential data files were encrypted.
Fortunately, most of the files did not have special encryption schemes. Ordinary encryption schemes could not prevent Yi Zuer from decrypting them. Shi Lei and Yi Zuer searched each piece one by one, trying to find the technical information of relesshd.
It is not that Shi Lei has not considered that LG Company stores the data on relesshd technology in a top-secret server that is not connected to the Internet.
However, a top-secret server does not mean absolute security. A top-secret server can indeed effectively isolate the interference from the Internet. Even if it is placed in a safe room, it can also block theft problems in the real world.
Everything has advantages and disadvantages.
There are also disadvantages to a top-secret server that is isolated from the Internet. This disadvantage is the transfer of file data. As a top-secret server that is isolated from the Internet environment, its essential purpose is to isolate the feeling of external viruses and hackers.
However, when transferring stored data, there is a possibility of external attacks. No matter what storage medium is used to store data, transferring data from a top-secret server will definitely come into contact with other storage media.
If there is a malicious computer virus in other storage media, it will be a huge tragedy for the top-secret server.
Therefore, generally unimportant information will not be placed in top-secret servers. According to Shi Lei's inference, LG will not put the relesshd technology in top-secret servers.
Not only because LG doesn’t pay much attention to relesshd technology, but also because there are many companies that master this technology, LG doesn’t need to care too much.
At around eight o'clock in the evening, Shi Lei finally found the relsshd technology, and with the cooperation of Yi Zuer, opened the encryption lock of the file. However, how to transfer the file out became a big problem!
Shi Lei has discovered LG's security mechanism on LG's internal server, which is a data flow restriction scheme. Once an abnormality occurs in the data flow, the server will immediately stop the corresponding process.
For example, LG Company's No. 4 server, under normal circumstances, the data flow only fluctuates between 5kb and 8kb per second, but at a certain moment, the data flow suddenly rises to 20kb, and there is no relevant authorization. Then the No. 4 server will immediately end the corresponding
Data flow process.
The size of the relesshd technology file exceeds 300MB. Shi Lei is quite sure that as long as he dares to remotely copy and download the relesshd technical information, the security personnel of Server 4 will definitely detect the abnormality immediately.
In order to successfully obtain the technical information of relesshd, Shi Lei must think of a safe and appropriate method.
‘Damn it. This traffic restriction defense mechanism is so annoying!’ Shi Lei cursed secretly. LG’s traffic restriction defense mechanism is very advanced. It directly writes the traffic restriction defense mechanism into the underlying defense of the system, which is a core component of the system.
If Shi Lei attempts to end this process, the entire server 4 system will reject it. Forced termination will shut down the main system of server 4.
There was such a big movement. Except for the security personnel of LG Company, all of them were playing in the office for a group unobstructed conference. I'm afraid there was no second situation that could have prevented them from discovering the movement on Server 4, right?
‘Damn it! Do I have to enter the treasure mountain and come back empty-handed?’ Shi Lei was a little helpless. Hackers are called gods in the Internet world, but gods also have restricted areas. The internal network of a very large international company is one of the restricted areas.
Especially in restricted areas, when there are also gods, it is very difficult to obtain the necessary information without the gods noticing.
‘Yes! I almost forgot about other methods!’ A smile suddenly appeared on Shi Lei’s face. He had been thinking about how to use hacker methods to obtain LG Company’s relesshd technical information, but Shi Lei forgot that ordinary methods could also achieve the same purpose.
Stones from other mountains can attack jade!
"Yizur, start the image recognition engine, prepare for high-speed recognition, and identify all the technical data of relesshd through the camera once!" Shi Lei's idea was to use the image recognition engine to complete the theft of data.
Shi Lei invaded LG Company's No. 4 server and obtained the required information. However, due to some technical problems, Shi Lei was unable to return the information.
Especially using the copied command can easily trigger the alarm of LG Company. Therefore, Shi Lei had to find another way to complete it.
The graphic recognition engine is a behavioral dynamic recognition engine, a word recognition engine, a human facial feature recognition engine, and a static image recognition engine, which are integrated image recognition technologies.
This technology has not yet been perfected, but there is no big problem in identifying the technical data of relesshd.
Since it is remotely connected to LG Company's Server 4, the relesshd technical information displayed on Server 1 requires remote transmission of images from LG Company's Server 4. In order to prevent traffic restrictions from being triggered, Shi Lei set up remote display
The image quality of the content and the display speed of switching data.
Under the premise of ensuring that the relesshd technical information can be accurately identified, it does not matter even if the image quality transmitted remotely is poor. Because the Unreal Graphics Processing Engine can automatically repair the image and is not afraid of poor image quality at all.
As time passed by, Shi Lei looked at the percentage progress bar on the screen with sweat on his forehead. He had not been so nervous for a long time.
At 10:40 pm, Shi Lei finally let out a long breath!
The relesshd technical information was finally ‘downloaded’ from the LG company’s internal server.
To be continued...