respawn hack
Chapter 25
Charge him.
Knowing about 32824-DEC-LAN Bridge is equivalent to knowing his target—the main monitoring room.Then the port analysis is almost complete.
Enter MS-DOSPROMPT, open C:WINDOWS>editservices, press Enter, and all ports of the monitoring system host appear.Read it once and write it all down.
Open the most important port, send TELNET, get DigitalUNIX, find out the leaked information, Baili Xuanji easily obtained the UNIX password file.Obtain the password of the highest authority account by cracking the password.
Of course, Baili Xuanji did not let Gen's password go.
What do the other ports mean though?Especially the locked port can escape the analysis of MS-DOSPROMPT. Does this mean that this is the most important thing in that computer?
Baili Xuanji, who had completely taken over the main controller, used the highest authority account he had obtained to completely lock the door of his room, so as to ensure that no one would open the door when he got it halfway.I don't know who the owner of this place is, but it's a luxury to be able to use an electronic door on a small room for people.But fortunately, this is an electronic gate, otherwise Baili Xuanji would really have nothing to do.
It is too easy to be discovered by not being able to use the highest authority account.However, since the address of the computer is already known and connected to the LAN bridge, it is a more appropriate method to use intrusion to enter it.
For such a port with a lock, the method of intercepting the password is obviously not applicable.Although this method is not restricted by the network segment, but a slight problem like this will alarm the files on the other end, so Baili Xuanji can only give up it unfortunately.
But now, without any bugs or network artificial intelligence, Baili Xuanji could only choose the most primitive way - to find system loopholes.No matter how advanced a piece of software is, it is impossible for it not to have backdoors. No matter how many patches are applied, there will always be undiscovered backdoors.
You can't hack, it doesn't mean there are no loopholes, it's just that you are not good enough and haven't found any loopholes.Baili Xuanji deeply believed in this.
Without scanning tools, you can manually search; without defense measures, you can go through every step of the process carefully.Relying on years of experience, Baili Xuanji skillfully entered the area controlled by the locked port.
"Hello, my child." When Chuchu entered that area, a figure was displayed on the computer, the desktop of the computer was completely occupied, and the mouse completely lost its function.
At this point, Baili Xuanji finally understood that he had probably fallen into a trap from the very beginning.
Unordered array?Baili Xuanji casually typed the English names of these four characters.He believes that the other party can see what he has entered.
No, the disorderly array cannot be bypassed, but he clearly bypassed it just now.Baili Xuanji suddenly felt that something was wrong, no matter how complicated the disorderly array was, it was impossible to escape the flaw in this setting.
It's a pity, that person didn't give Baili Xuanji a chance to change his mind.
"Yes, boy. You were the first person I found that could come in, and the first person to say the words 'disordered array.'" The man had a mysterious fascination with disordered arrays , which made Baili Xuanji who was listening to him a little confused: "Okay, okay, my son, the disordered array is something created by my father, since you can know it, then we are also very close. "
How to leave?Feeling a headache from this man's aria-like nonsense, Baili Xuanji asked the question very simply.To be a man is to be straightforward, and it is really difficult for him to behave like this.
"What a hasty kid! Be cute, how about we make a deal." The man seemed very interested in Bailixuan, and his aria-like tone carried a kind of crazy joy: "The first deal is that we come to play It’s a game, if you win the child, you can leave, if you lose the child, you have to stay with me in this place.”
what game?When Baili Xuanji threw these words, she actually guessed some of them in her heart, at least they were pretty close.
"Isn't the child asking the question? What kind of games can we play? The so-called online games and stand-alone games that come out now are a waste of time and useless. They can only be used to amuse those little things. Since I want to let Come and accompany me, child, and I will naturally convince you, child."
The author has something to say: It's done, it's done, Yaoshou still has a feeling that he still has more to say, but it's a pity that if I post it today, the next chapter will be short of words~~
All the computer-related things that appear in the article are all true. If anyone is interested and has good computer skills, you can try it. It is absolutely practical~~
28. The legendary kidnapping...
what game?Although it is almost inseparable, Baili Xuanji can't guarantee whether the game he thought of has been put into use now. If he accidentally said it, that game doesn't exist at all. He really doesn't know what to do. Go round and go back.
"Of course it's Code Wars. Such a famous game, doesn't the little hacker know about it?" The exaggerated tone seemed to be accompanied by actions, which made people feel that it was a mistake not to know the game.
But in fact, the spread of this game is not wide, it is only spread in the circle of programmers and hackers, although it is indeed quite famous in these circles.
As you can tell from the name, this game is based on programming code.Generally speaking, it is similar to the tank battle that is currently circulating on the Internet. Although the screen and settings are extremely simple, this code war is much larger than the tank battle, and the internal program is also much more complicated.A little different from the tank battle setting, this game is a battle, and the number of people fighting can be set according to the number of people on both sides.
It can be 1v1 or 2v2, and the highest number of people can support 8 people against 8 people.After the start of the game, there will be a turret in front of everyone. This turret can shoot shells at the opponent to attack and destroy the opponent.During the battle, a series of codes will appear in front of the turrets of both sides. These codes are part of some open source software, but these codes are incomplete, and there are missing parts in the middle. Only after you make up these parts , your cannon will fire the shells.
But it’s not just a fill-in-the-blank game. When programming, you don’t just need to type the code. When programming, if you’re not careful, typing one more letter or character will cause the program to fail to run. You have to find the errors one by one. Not to mention just the characters before and after the code floating across the screen to judge what is missing in the middle. Only when all are filled in correctly, the program can be guaranteed to run, and the cannon will work normally. .
It can be said that although the gameplay of Code War seems to be quite simple, it is definitely abnormal to play this game proficiently.And code war is used by many programming companies when recruiting programmers, because the time for code war to appear in a piece of code is about 2o seconds. Within 2o seconds, you have to quickly judge how many characters are missing and what kind of characters to enter. You can make this program run successfully, and finally you have to type these characters. As long as you can play the code war, the programming ability will definitely not be too bad!
Nightmare version?Baili Xuanji naturally thought of the one he was most familiar with, although what he was familiar with was actually a deformation of this one.
"Kids can play this one, it's really not to be underestimated. Well, kids, just play on this page, I have it here."
Hearing what the man said, Baili Xuanji frowned.The nightmare version does not mean its difficulty, but a version adapted from the famous Alcatraz. Alcatraz named it Nightmare, so everyone calls this version the nightmare version.Alcatraz is a well-known team for cracking and changing software. This team has good technical strength. It specializes in cracking various software and games, etc. This team will crack everything that appears on the market, and it is free release.
Just like the operating system of the famous Apple's iphone series mobile phones and its charging software, etc., Alcatraz completed its cracking, which made Apple's teeth itch with hatred. You know, Apple mobile phones are not expensive. But its software download costs make it possible for some people to almost buy a new smartphone.
The nightmarish and original code war has been almost completely revised, the time when the code appeared has not changed, but its verification mechanism is more accurate, and it involves more things, not just about writing software code, even It also includes mathematical algorithms used in programming and more.
And there is another version that is quite perverted. Computer attacks are added to the nightmare version, and the cannons are no longer fixed. Just like in the Raiden game, the cannons can be moved. Attack the opponent, but also dodge the
Knowing about 32824-DEC-LAN Bridge is equivalent to knowing his target—the main monitoring room.Then the port analysis is almost complete.
Enter MS-DOSPROMPT, open C:WINDOWS>editservices, press Enter, and all ports of the monitoring system host appear.Read it once and write it all down.
Open the most important port, send TELNET, get DigitalUNIX, find out the leaked information, Baili Xuanji easily obtained the UNIX password file.Obtain the password of the highest authority account by cracking the password.
Of course, Baili Xuanji did not let Gen's password go.
What do the other ports mean though?Especially the locked port can escape the analysis of MS-DOSPROMPT. Does this mean that this is the most important thing in that computer?
Baili Xuanji, who had completely taken over the main controller, used the highest authority account he had obtained to completely lock the door of his room, so as to ensure that no one would open the door when he got it halfway.I don't know who the owner of this place is, but it's a luxury to be able to use an electronic door on a small room for people.But fortunately, this is an electronic gate, otherwise Baili Xuanji would really have nothing to do.
It is too easy to be discovered by not being able to use the highest authority account.However, since the address of the computer is already known and connected to the LAN bridge, it is a more appropriate method to use intrusion to enter it.
For such a port with a lock, the method of intercepting the password is obviously not applicable.Although this method is not restricted by the network segment, but a slight problem like this will alarm the files on the other end, so Baili Xuanji can only give up it unfortunately.
But now, without any bugs or network artificial intelligence, Baili Xuanji could only choose the most primitive way - to find system loopholes.No matter how advanced a piece of software is, it is impossible for it not to have backdoors. No matter how many patches are applied, there will always be undiscovered backdoors.
You can't hack, it doesn't mean there are no loopholes, it's just that you are not good enough and haven't found any loopholes.Baili Xuanji deeply believed in this.
Without scanning tools, you can manually search; without defense measures, you can go through every step of the process carefully.Relying on years of experience, Baili Xuanji skillfully entered the area controlled by the locked port.
"Hello, my child." When Chuchu entered that area, a figure was displayed on the computer, the desktop of the computer was completely occupied, and the mouse completely lost its function.
At this point, Baili Xuanji finally understood that he had probably fallen into a trap from the very beginning.
Unordered array?Baili Xuanji casually typed the English names of these four characters.He believes that the other party can see what he has entered.
No, the disorderly array cannot be bypassed, but he clearly bypassed it just now.Baili Xuanji suddenly felt that something was wrong, no matter how complicated the disorderly array was, it was impossible to escape the flaw in this setting.
It's a pity, that person didn't give Baili Xuanji a chance to change his mind.
"Yes, boy. You were the first person I found that could come in, and the first person to say the words 'disordered array.'" The man had a mysterious fascination with disordered arrays , which made Baili Xuanji who was listening to him a little confused: "Okay, okay, my son, the disordered array is something created by my father, since you can know it, then we are also very close. "
How to leave?Feeling a headache from this man's aria-like nonsense, Baili Xuanji asked the question very simply.To be a man is to be straightforward, and it is really difficult for him to behave like this.
"What a hasty kid! Be cute, how about we make a deal." The man seemed very interested in Bailixuan, and his aria-like tone carried a kind of crazy joy: "The first deal is that we come to play It’s a game, if you win the child, you can leave, if you lose the child, you have to stay with me in this place.”
what game?When Baili Xuanji threw these words, she actually guessed some of them in her heart, at least they were pretty close.
"Isn't the child asking the question? What kind of games can we play? The so-called online games and stand-alone games that come out now are a waste of time and useless. They can only be used to amuse those little things. Since I want to let Come and accompany me, child, and I will naturally convince you, child."
The author has something to say: It's done, it's done, Yaoshou still has a feeling that he still has more to say, but it's a pity that if I post it today, the next chapter will be short of words~~
All the computer-related things that appear in the article are all true. If anyone is interested and has good computer skills, you can try it. It is absolutely practical~~
28. The legendary kidnapping...
what game?Although it is almost inseparable, Baili Xuanji can't guarantee whether the game he thought of has been put into use now. If he accidentally said it, that game doesn't exist at all. He really doesn't know what to do. Go round and go back.
"Of course it's Code Wars. Such a famous game, doesn't the little hacker know about it?" The exaggerated tone seemed to be accompanied by actions, which made people feel that it was a mistake not to know the game.
But in fact, the spread of this game is not wide, it is only spread in the circle of programmers and hackers, although it is indeed quite famous in these circles.
As you can tell from the name, this game is based on programming code.Generally speaking, it is similar to the tank battle that is currently circulating on the Internet. Although the screen and settings are extremely simple, this code war is much larger than the tank battle, and the internal program is also much more complicated.A little different from the tank battle setting, this game is a battle, and the number of people fighting can be set according to the number of people on both sides.
It can be 1v1 or 2v2, and the highest number of people can support 8 people against 8 people.After the start of the game, there will be a turret in front of everyone. This turret can shoot shells at the opponent to attack and destroy the opponent.During the battle, a series of codes will appear in front of the turrets of both sides. These codes are part of some open source software, but these codes are incomplete, and there are missing parts in the middle. Only after you make up these parts , your cannon will fire the shells.
But it’s not just a fill-in-the-blank game. When programming, you don’t just need to type the code. When programming, if you’re not careful, typing one more letter or character will cause the program to fail to run. You have to find the errors one by one. Not to mention just the characters before and after the code floating across the screen to judge what is missing in the middle. Only when all are filled in correctly, the program can be guaranteed to run, and the cannon will work normally. .
It can be said that although the gameplay of Code War seems to be quite simple, it is definitely abnormal to play this game proficiently.And code war is used by many programming companies when recruiting programmers, because the time for code war to appear in a piece of code is about 2o seconds. Within 2o seconds, you have to quickly judge how many characters are missing and what kind of characters to enter. You can make this program run successfully, and finally you have to type these characters. As long as you can play the code war, the programming ability will definitely not be too bad!
Nightmare version?Baili Xuanji naturally thought of the one he was most familiar with, although what he was familiar with was actually a deformation of this one.
"Kids can play this one, it's really not to be underestimated. Well, kids, just play on this page, I have it here."
Hearing what the man said, Baili Xuanji frowned.The nightmare version does not mean its difficulty, but a version adapted from the famous Alcatraz. Alcatraz named it Nightmare, so everyone calls this version the nightmare version.Alcatraz is a well-known team for cracking and changing software. This team has good technical strength. It specializes in cracking various software and games, etc. This team will crack everything that appears on the market, and it is free release.
Just like the operating system of the famous Apple's iphone series mobile phones and its charging software, etc., Alcatraz completed its cracking, which made Apple's teeth itch with hatred. You know, Apple mobile phones are not expensive. But its software download costs make it possible for some people to almost buy a new smartphone.
The nightmarish and original code war has been almost completely revised, the time when the code appeared has not changed, but its verification mechanism is more accurate, and it involves more things, not just about writing software code, even It also includes mathematical algorithms used in programming and more.
And there is another version that is quite perverted. Computer attacks are added to the nightmare version, and the cannons are no longer fixed. Just like in the Raiden game, the cannons can be moved. Attack the opponent, but also dodge the
You'll Also Like
-
Simulating The Cultivation Of Immortals, I Reached The Nascent Soul Stage In Ten Days!
Chapter 255 12 hours ago -
In Konoha, I collected corpses on the battlefield for ten years
Chapter 349 13 hours ago -
I picked up skill fragments in the demon world
Chapter 596 16 hours ago -
Yu-Gi-Oh!: Start with Ultraman Tiga! ?
Chapter 165 17 hours ago -
Top female anchor daily life
Chapter 152 17 hours ago -
Genshin Impact: Use various skills to create a romantic encounter
Chapter 204 17 hours ago -
Ultra: I got the Light of Galaxy Victory
Chapter 238 17 hours ago -
Help! I just woke up and was stabbed by a big kid
Chapter 510 17 hours ago -
Dragon Ball: I have the wrong system and I have entered the wrong world
Chapter 500 17 hours ago -
Siheyuan: Seventeen-year-old He Yuzhu
Chapter 318 17 hours ago