Kapitel 137

But the other side wasn't much better off.

Chen Xu's strength lies in the ferocity of his attacks. He's like a drawn sword, relentlessly charging forward, slicing every data stream he touches in two!

"Wow, that's powerful!" This kind of data flow clash isn't very intuitive. It's reflected through software. So the other party can't see who's operating, but they can see the other's data flow is like a vast ocean, with the most powerful flow at the very tip, instantly annihilating any data flow that hits it… In reality, this means the incoming data flow to that port is immediately blocked!

Chen Xu seemed to wield a Green Dragon Crescent Blade, traversing the ocean of data streams. His subordinates fought fearlessly, and he himself was unstoppable! In the blink of an eye, Chen Xu had dealt with most of the invading data, and at the same time, he had already set his sights on his target!

Generally speaking, to ensure their own security, hackers will lurk behind botnets. They will constantly change their appearance, that is, disguise data stream packets, or simply hide in the side and secretly spy.

However, data streams do have their own forms of expression, just like a person, no matter how much they disguise themselves, their scent will not change. The tracking software Chen Xu is currently running is like a shrewd hunting dog, sniffing out its prey's scent, ready to tear apart its disguise.

This tracking software couldn't be used initially because it required a significant amount of resources for analysis. The analysis software captured the data stream and began analyzing it, first analyzing hundreds of data streams consecutively to memorize key code... It's important to understand that botnet attacks are completely devoid of any fancy tricks; they are very mechanical and rigid. Botnets performing similar tasks use exactly the same attack methods... In the real world, no two leaves are the same, but in the virtual world, duplicates are everywhere.

The analysis software only needs to analyze a few segments of the data stream, and then filter all the incoming data stream segments. Those that are exactly the same are identified as botnets, while those that are different... may be the target entity!

Finding the main entity among countless data streams and countless clones is not an easy task. So Chen Xu was frantically hacking away at the weak minions while having his henchmen search for the enemy commander's whereabouts.

"This guy is too fierce! Does he not need to defend at all?!"

Chen Xu's fierce attacks caused the betting team to scream wildly in front of their computers. Chen Xu was like Zhao Zilong, who charged in and out of Changban Slope seven times. No one could stop his advance! Basically, he would cut down one person after another, and two people after two!

So wild!

It's been a long time since I've encountered a player with this style.

Because the most important thing for a hacker is to protect themselves, which is the first tenet of a hacker. There are indeed some brave hackers like this, but they usually don't have a good ending.

Because finding him is just too easy!

Such a fierce data stream, eliminating one target at a time, clearly reveals his location!

But he seemed fearless!

That's outrageous!

However, Chen Xu believed that Zhan Jing, who was stationed in the central military camp behind him, would not give him any worries.

Chen Xu had a very strong feeling that he trusted Zhan Jing just as much as he trusted Xiao Min!

Chen Xu's bravery surprised both teams, but some were still unconvinced. Both Braised Spinach and Cold Spinach rushed forward, because taking down a chicken wasn't a real skill... It's like in the Romance of the Three Kingdoms, even the lowest-ranking general... who was a civil official in history, like Cao Zhi, who was recorded as a complete novice with no strength to even kill a chicken, could still kill a group of soldiers by himself... That's not a skill. The real strongman is not facing a computer, but a human!

So they charged forward, only to feel two fierce data streams colliding with them, one attacking port 5001 and the other port 3043. Their teamwork was seamless, and Chen Xu immediately realized that this time their opponents were no longer those inflexible botnets, but experts!

Chen Xu immediately perked up. "Ha, you're fierce? Then let's see who the real fierce general is!"

Chen Xu's typing speed skyrocketed, furiously typing commands on the keyboard. At that moment, the firewall issued an alert: a data stream had been compromised! But Chen Xu remained calm, knowing that in this kind of hacker battle, it was normal for someone else's data stream to get in. And even if the attacker gained access to his computer, so what? They'd have to modify his system to win. But Chen Xu wouldn't give them that chance!

Because at this moment, Chen Xu also launched his attack.

The Yangtze River's Three-Tiered Waves!

One wave after another rises higher and higher!

Chen Xu didn't care whether others would take his computer or not, because he didn't have the time to care! What he needed to do now was to kick the other person out and kill them before his computer fell into his hands!

Therefore, Chen Xu chose to counterattack from the port the enemy had invaded!

One against two!

This requires extremely fast hand speed!

Because the opponents are clever, their attack methods are different, forcing the opponents to defend against them separately. Furthermore, when counterattacking, different methods must be used to counter the different attack methods.

No single set of commands is universally applicable to all attack methods.

But the styles are different!

Chen Xu quickly typed in the command, because once the enemy entered his computer at this moment, his IP address would no longer be able to be hidden, unless he was still using a botnet. But even if he was using a botnet, the enemy wouldn't have any chance to clean up their tracks and retreat!

In other words, the current situation is one of being caught in a bind; when two tigers fight, one will surely be injured. Someone will inevitably have to withdraw from this competition!

"Zhan Jing, help me!" The alarm sounded again. Chen Xu could see that the other party was already checking his registry. At this moment, he shouted, and Zhan Jing, who was already prepared, quickly connected to Chen Xu's computer to help him defend himself!

With Zhan Jing defending him, Chen Xu could charge forward and attack without reservation. At this moment, he had completely given his back to Zhan Jing for protection.

Chen Xu charged ahead and quickly analyzed and cracked the opponent's IP address... Damn, it's from Australia, one of the botnets!

But don't worry, Chen Xu immediately checked the connection records on that botnet, and following the trail, he finally found the last address... Dalian, China!

"Kid, I'll get you!" Chen Xu charged in with unstoppable momentum. Only then did the attacker realize that his computer had been hacked, and he yelled, "I've been infected!"

But just then, a dialog box popped up on his screen: "Your firewall has failed."

Then, the screen suddenly went black!

One is solved!

Chapter 239 Chen Xu's Shield (Part 1)

After eliminating one opponent, Chen Xu didn't think about anything else and immediately retreated to attack another enemy.

Because this wasn't a battlefield for hackers, there was no need to hold back on any methods. Therefore, when Chen Xu withdrew from the enemy's botnets, he didn't have time to erase the information he had left on them. Instead, he adopted the most extreme and simplest method:

They've crossed the river and then discarded the bridge!

"Boom boom boom!"

Chen Xu retreated while simultaneously dropping logic bombs. A logic bomb is a computer program that triggers damage when specific logical conditions are met. Once triggered, it can cause data loss, prevent booting from the hard drive or floppy disk, or even paralyze the entire system, creating the illusion of physical damage.

When a logic bomb is detonated, the symptoms are very similar to those of a virus, and different logic bombs will have different results when they explode.

Chen Xu forcibly deleted and damaged files on the other party's system drive, causing the system to crash. After the crash, it was discovered that the system could not be started at all because Chen Xu had deleted several critical system files!

However, Chen Xu didn't go too far; he only deleted the NTDETECT.COM system boot file on the C drive and the userinit.exe file in the C drive's WINDOWS/SYSTEM32 folder. The former is the system boot file, which collects and records information such as system firmware, date and time, bus configurator, graphics card configurator type, input devices, and communication devices. If this file is lost, the Windows system will fail to boot, requiring the use of an external hard drive to enter the system, or in other words, a system reinstallation.

The userinit.exe file is a crucial process in the Windows system, managing different startup sequences. If this file is corrupted, your computer will remain stuck on the login page, unable to access the system regardless of your login attempts.

The infamous "Machine Dog" virus infects the critical process userinit.exe. If you try to delete this virus process using ordinary methods, then unfortunately... your computer will need to be reinstalled. Alternatively, try using other methods to boot into the system.

Therefore, Chen Xu's method was relatively mild, as he only infected the target's C drive with a logic bomb, deleting a few critical processes and automatically clearing the computer's usage history. In reality, it didn't damage the target's computer's content. The main advantage of this method, given that it was a friendly exchange, was that it could eliminate the botnet without damaging its data. Under normal circumstances, the target wouldn't have the time to deal with such minor issues, allowing the botnet to be removed from the battlefield.

In the blink of an eye, Chen Xu swiftly retreated, then with a flourish, he hacked to death the other man who had attacked him… Chen Xu didn't know who he had killed, or even which team they belonged to. Were they both from the same team? Or were they from different teams?

Chen Xu couldn't care less about any of this, nor did he want to. In any case, facing challenges from two teams of hackers at the same time meant that Chen Xu would have ten opponents!

Who cares which team they're from, just kill them first!

Chen Xu's method was simple and effective. By damaging the opponent's computer, he essentially created a logical loop that rendered the computer temporarily unusable. Although it would take some effort to repair, the two individuals were forced to withdraw from the battle.

At this moment, Zhong Ziyu reported: "Someone has intruded on port 4443, but it's definitely not a botnet. I've started defenses and request backup!"

So Chen Xu immediately charged forward again!

With bold strokes and sweeping cuts!

These two words perfectly describe Chen Xu's fearless and forward-looking style; as the saying goes, in a narrow encounter, the brave prevail. What should you do when a small port is overflowing with data?

An assassin is someone who meticulously searches for the enemy's weaknesses and then delivers a fatal blow.

He charged ahead, killing countless men; one man could hold the pass against ten thousand!

This type is a great general!

Chen Xu displayed the demeanor of a great general at this moment!

Whether you're a commander or a lackey, anyone who stands in my way will die!

A wild style of attack. The wild Chen Xu!

Only by fighting him in person can one truly experience this wild, passionate feeling. However, from the opponent's perspective, this feeling isn't so pleasant.

The opponent currently facing Chen Xu is "Love Song" from the group "Don't Know What to Call". Love Song is not the ID he currently uses, but he is a well-known and senior member of the Red Hacker Alliance. In terms of strength, Love Song is at most slightly inferior to Young Fat, but he is still considered very good.

But he never expected that he would be beaten so badly that he had no chance to fight back!

What made him even more speechless was that the other party was just a newbie who had just joined the Red Hacker Alliance and was constantly improving!

Unlike his group of pseudonyms, he knew that the other side's ICE and FOX were newcomers, newcomers who had just climbed the ranks in the hacker arena.

If they were simply latecomers to the hacker alliance and already highly skilled hackers, that would be one thing. In the hacking profession, breaking through skill barriers and advancing to the next level is often extremely difficult. But while FOX is an exception, ICE is a genuinely newcomer to the hacking world!

His progress is being watched by many high-level Red Hackers, and many people already knew ICE's identity.

Xuancao Jiangli's classmate, Gao Xiaojie's classmate, has a connection with the legendary internet god SMMH that most people desire but cannot obtain.

He was originally a computer novice, but only recently started formally learning hacking techniques. However, his fundamentals are solid and stable; for someone who has only been formally learning programming for six months, this progress is nothing short of phenomenal! But it wasn't until that book on Chinese language came out that everyone realized… perhaps this guy had been studying Chinese language all along!

ICE is progressing incredibly fast!

Let alone comparing him now with the him of the past, even looking at his last battle on the Red Hacker battlefield not long ago, it's clear that he's completely different now.

Did SMMH give him something again? Or did he take some kind of super tonic?!

But none of them seem right!

As a seasoned hacker, Qingge is able to discern the exact methods used by the other party.

Chen Xu's attacks were fierce and chilling. That's because his actions were fast enough; the commands he entered were quick and effective!

Valid command input. This is something that hackers pay special attention to once they reach a certain level... This speed. It creates a huge gap in skill and status among hackers!

Hackers commonly use commands such as NET, AT, and TELNET. Each has its own purpose, and knowing how to use the most appropriate command at the most appropriate time requires not only rapid computational ability but also hand speed and coordination between the brain and hand!

This is a bottleneck!

A skilled hacker like Blue Baby can input over 60 valid commands per minute, which is incredibly impressive! Keep in mind, this equates to typing a command almost every second, almost without conscious thought!

According to the estimates of the love song, Chen Xu's current hand speed is at least 35!

Turning thirty is a hurdle.

This is a widely accepted fact in the hacker community: only those with a typing speed of 30 or higher can be called hackers.

Some people say, "I can just set these commands as keyboard shortcuts and press them one by one, isn't that so simple?!"

It's not that simple!

Hacker attacks are constantly evolving, and the input of commands is almost entirely a subconscious reflex with no time for thought. Furthermore, it's important to know: how many common commands do hackers use?

At least several hundred!

Hundreds of commands can be used via keyboard shortcuts?

Those who have the time and effort would be better off simply memorizing all the instructions.

Vorheriges Kapitel Nächstes Kapitel
⚙️
Lesestil

Schriftgröße

18

Seitenbreite

800
1000
1280

Lesethema