Real Scholar System
Chapter 252
"Then what are the rules of the challenge?"
Some students are already eager to try.
Can't beat Lian Lian and Li Minglei, and can't beat that little fat man and the idiot?
"Have you ever played chicken?" Zhang Heng laughed,
"I've played it, so let's compete in a game of eating chicken?"
"Of course not. Of course our ORer has to adopt the method of the computer department."
"any solution?"
"Hackers eat chicken wars."
Every computer learner has a hacker dream in his heart, and these students are no exception. Hearing the words "hacker war", their ears are all stiffened.
"But, teacher, we have never learned how to hack."
"Hacking skills? Just a superficial understanding."
"That's because you haven't learned it. I hacked the school's website three years ago."
Zhang Hengtai smiled slightly, "What you have learned in the past ten days is some basic knowledge of the network. I will assign an IP address and identity key to each person."
"You should try your best not to let others know your IP address. Even if you know it, you must protect your identity key. Once someone finds out your identity key and clears it with a program, you will be killed in battle."
"This is the law of the dark forest of hackers. When you discover it, you destroy it. It is very important to discover others while hiding yourself. How to hide your own IP and find out the IP of others."
Next, Zhang Hengtai sent everyone a USB flash drive, which contained everyone's IP address and identity key, indicating that everyone should plug it into the computer.
"In 10 minutes, all hosts will be connected to the LAN. Now, you can build your own firewall."
For those who have some hacker background, this kind of assessment is exactly what they want, but for most students, their learning is just learning, and they only learned the knowledge in informatics textbooks before, and they have never been exposed to such practical offensive and defensive applications. , I can only build my own firewall as much as possible through my own study during this period of time.
Hacking and defense?
Qu Jiajia was very excited.
Hack Wars?
Exactly what I want!
I hacked the school website when I was in junior high school, and later secretly hacked several well-known local websites, and even joined the well-known domestic hacker organization, China Honker Alliance, the top three hacker organizations in the world.
With my own level, I can definitely beat most of my classmates to the ground, especially that idiot, hmph, I don’t know what kind of shit luck I got, or which big boss I went to, a konjac who has been in touch with IO for less than half a year, Also worthy of being selected for the national team?
First make a BAT batch file IP scanner, first scan out everyone's IP address, this is very simple, just type a few DOS commands,
crackling,
Get it!
Then determine the identity of the IP address, scan the system vulnerabilities, obtain administrator privileges, view the identity key,
Click, this will kill one.
Qu Jiajia was already imagining that she killed everyone, successfully counterattacked, and became an official member of the national team. The smile on her face could hardly be hidden.
His fingers kept tapping on the keyboard,
He quickly rehearsed his offense and defense a few more times to make sure he was safe.
Haha.
Qu Jiajia looked around proudly, and saw that someone was actually opening the system's built-in firewall, and she couldn't help laughing. Does that thing work?
What a rookie among rookies!
Among these people, Lian Lian was an opponent.But in fact, his reputation is too high, but in the hacker field alone, he may not be his opponent.
Li Minglei also has a deep hacker foundation, but he is not as defiant as Qu Jiajia. He knows that there are mountains beyond mountains, and people beyond people. In the last provincial competition, Fang Moyan won the championship. He was also secretly dissatisfied in his heart. Go to the provincial competition website to find Fang Moyan's personal qualifications.
As a result, nothing was found.
Looking back now, Fang Moyan must have been a hidden master.
He belongs to the defensive type, the first thing he does is to patch the loopholes in the system, and on the basis of the system firewall, he added a simple maze-style firewall and an alarm device, so that if someone else breaks in, he can be alerted immediately .
These operations are not fancy, but very effective, in line with Li Minglei's characteristics.
Not to mention Lian Lian.
As a gifted child who has been playing brute force since elementary school, he is familiar with hackers' offensive and defensive methods. The reason why the system optimization wizard I made before has more than ten million downloads in a short period of time is directly related to his secret use of viral transmission. relation.
Just like early rogue software, it is installed on the user's computer without knowing it.
Very domineering.
Fang Moyan heard about the hacker war, but he was actually unfamiliar with it, because he had only been exposed to informatics since the end of July, a total of only six months.
Fortunately, he has studied extensively and has tried network technology, but he has not studied it in depth. He is a gentleman, he has no desire to spy, and he is not used to showing off his skills.
Moreover, guarding Master Zhang Bao, a world-class hacker, can't afford to show off his skills.
However, he will not be afraid at all, because elephants are invisible, and based on his understanding of computers and networks, this is just a small episode.
Some others are patching loopholes, some are making offensive and defensive gadgets,
But Fang Moyan unhurriedly opened his identity key, made a copy, changed a few key data, and then repackaged it.
As for the most original identity key, he designed a simple MD5 encryption tool, encapsulated it twice, and then disguised the file as a recycle bin,
Even if someone is very powerful, finds his own IP, then invades the system, sees through the fake identity key, and finds the real key from hundreds of thousands of files by luck, he will not be able to kill himself.Because although the MD5 encryption tool he made is not very secure due to time constraints, it may be cracked by exhaustive methods, but it will take at least 24 hours.
It's impossible for this assessment to take so long, right?
Therefore, even if you have an aura of bad luck and want to kill yourself, it will take 24 hours.
But Fang Moyan is not alone. During this period, he will also use his powerful basic ability to attack others.
Offense is the best defense.
It only took him 5 minutes to do these disguises,
Another 128-bit IP address masquerader was made to give false responses to some false IP sending packets.
A few months ago, when he passed the evaluation of Tiangong Evaluation Network, he made a special killing tool for panda burning incense. He studied the source code of this well-known virus for a period of time, and then based on the latest system loopholes, he made a A variant of the worm Trojan horse.
Mix the water thoroughly.
He already had a draft for these operations, and he didn't even need the BUFF of the super flow state, so he set it up soon.
For the rest of the time, he made another DDOS attack tool,
IP address masquerader, Panda version worm Trojan horse, DDOS distributed attack tool, combined with fake identity key,
Basically invincible.
Some students are already eager to try.
Can't beat Lian Lian and Li Minglei, and can't beat that little fat man and the idiot?
"Have you ever played chicken?" Zhang Heng laughed,
"I've played it, so let's compete in a game of eating chicken?"
"Of course not. Of course our ORer has to adopt the method of the computer department."
"any solution?"
"Hackers eat chicken wars."
Every computer learner has a hacker dream in his heart, and these students are no exception. Hearing the words "hacker war", their ears are all stiffened.
"But, teacher, we have never learned how to hack."
"Hacking skills? Just a superficial understanding."
"That's because you haven't learned it. I hacked the school's website three years ago."
Zhang Hengtai smiled slightly, "What you have learned in the past ten days is some basic knowledge of the network. I will assign an IP address and identity key to each person."
"You should try your best not to let others know your IP address. Even if you know it, you must protect your identity key. Once someone finds out your identity key and clears it with a program, you will be killed in battle."
"This is the law of the dark forest of hackers. When you discover it, you destroy it. It is very important to discover others while hiding yourself. How to hide your own IP and find out the IP of others."
Next, Zhang Hengtai sent everyone a USB flash drive, which contained everyone's IP address and identity key, indicating that everyone should plug it into the computer.
"In 10 minutes, all hosts will be connected to the LAN. Now, you can build your own firewall."
For those who have some hacker background, this kind of assessment is exactly what they want, but for most students, their learning is just learning, and they only learned the knowledge in informatics textbooks before, and they have never been exposed to such practical offensive and defensive applications. , I can only build my own firewall as much as possible through my own study during this period of time.
Hacking and defense?
Qu Jiajia was very excited.
Hack Wars?
Exactly what I want!
I hacked the school website when I was in junior high school, and later secretly hacked several well-known local websites, and even joined the well-known domestic hacker organization, China Honker Alliance, the top three hacker organizations in the world.
With my own level, I can definitely beat most of my classmates to the ground, especially that idiot, hmph, I don’t know what kind of shit luck I got, or which big boss I went to, a konjac who has been in touch with IO for less than half a year, Also worthy of being selected for the national team?
First make a BAT batch file IP scanner, first scan out everyone's IP address, this is very simple, just type a few DOS commands,
crackling,
Get it!
Then determine the identity of the IP address, scan the system vulnerabilities, obtain administrator privileges, view the identity key,
Click, this will kill one.
Qu Jiajia was already imagining that she killed everyone, successfully counterattacked, and became an official member of the national team. The smile on her face could hardly be hidden.
His fingers kept tapping on the keyboard,
He quickly rehearsed his offense and defense a few more times to make sure he was safe.
Haha.
Qu Jiajia looked around proudly, and saw that someone was actually opening the system's built-in firewall, and she couldn't help laughing. Does that thing work?
What a rookie among rookies!
Among these people, Lian Lian was an opponent.But in fact, his reputation is too high, but in the hacker field alone, he may not be his opponent.
Li Minglei also has a deep hacker foundation, but he is not as defiant as Qu Jiajia. He knows that there are mountains beyond mountains, and people beyond people. In the last provincial competition, Fang Moyan won the championship. He was also secretly dissatisfied in his heart. Go to the provincial competition website to find Fang Moyan's personal qualifications.
As a result, nothing was found.
Looking back now, Fang Moyan must have been a hidden master.
He belongs to the defensive type, the first thing he does is to patch the loopholes in the system, and on the basis of the system firewall, he added a simple maze-style firewall and an alarm device, so that if someone else breaks in, he can be alerted immediately .
These operations are not fancy, but very effective, in line with Li Minglei's characteristics.
Not to mention Lian Lian.
As a gifted child who has been playing brute force since elementary school, he is familiar with hackers' offensive and defensive methods. The reason why the system optimization wizard I made before has more than ten million downloads in a short period of time is directly related to his secret use of viral transmission. relation.
Just like early rogue software, it is installed on the user's computer without knowing it.
Very domineering.
Fang Moyan heard about the hacker war, but he was actually unfamiliar with it, because he had only been exposed to informatics since the end of July, a total of only six months.
Fortunately, he has studied extensively and has tried network technology, but he has not studied it in depth. He is a gentleman, he has no desire to spy, and he is not used to showing off his skills.
Moreover, guarding Master Zhang Bao, a world-class hacker, can't afford to show off his skills.
However, he will not be afraid at all, because elephants are invisible, and based on his understanding of computers and networks, this is just a small episode.
Some others are patching loopholes, some are making offensive and defensive gadgets,
But Fang Moyan unhurriedly opened his identity key, made a copy, changed a few key data, and then repackaged it.
As for the most original identity key, he designed a simple MD5 encryption tool, encapsulated it twice, and then disguised the file as a recycle bin,
Even if someone is very powerful, finds his own IP, then invades the system, sees through the fake identity key, and finds the real key from hundreds of thousands of files by luck, he will not be able to kill himself.Because although the MD5 encryption tool he made is not very secure due to time constraints, it may be cracked by exhaustive methods, but it will take at least 24 hours.
It's impossible for this assessment to take so long, right?
Therefore, even if you have an aura of bad luck and want to kill yourself, it will take 24 hours.
But Fang Moyan is not alone. During this period, he will also use his powerful basic ability to attack others.
Offense is the best defense.
It only took him 5 minutes to do these disguises,
Another 128-bit IP address masquerader was made to give false responses to some false IP sending packets.
A few months ago, when he passed the evaluation of Tiangong Evaluation Network, he made a special killing tool for panda burning incense. He studied the source code of this well-known virus for a period of time, and then based on the latest system loopholes, he made a A variant of the worm Trojan horse.
Mix the water thoroughly.
He already had a draft for these operations, and he didn't even need the BUFF of the super flow state, so he set it up soon.
For the rest of the time, he made another DDOS attack tool,
IP address masquerader, Panda version worm Trojan horse, DDOS distributed attack tool, combined with fake identity key,
Basically invincible.
You'll Also Like
-
Douluo: After modifying my memory, all the goddesses are chasing me.
Chapter 512 4 hours ago -
Gourd of Douluo
Chapter 612 4 hours ago -
Raven's Claw at Hogwarts
Chapter 649 4 hours ago -
One Piece: The Glory of the Murloc
Chapter 590 4 hours ago -
The fifth generation of Konoha Village was booked by me
Chapter 331 4 hours ago -
Konoha: Start by choosing to become Hokage
Chapter 257 4 hours ago -
Pirate's Copy
Chapter 815 4 hours ago -
I wield a sword at Hogwarts
Chapter 862 4 hours ago -
Bao Ma restored hundreds of millions of supplies in the apocalypse
Chapter 110 5 hours ago -
Start with Uchiha to escape and sail
Chapter 434 5 hours ago