Capítulo 136

"口牙" is a slang term meaning "ya" or "yah." Chen Xu rolled his eyes and asked, "How did he know we were foxtail grass?"

There was still no reply. Another line of text appeared on the whiteboard: "Hmm, you must be wondering how we know your identities, right? It's simple. Because at this time, another server of ours was also hacked. They claimed they didn't know what name to choose, so I thought I'd call them over and have a chat."

Chen Xu and the others broke out in a cold sweat. This world is indeed very harmonious! Of the three teams in the same group, two were targeting the same team, and this seemingly unlucky team was actually having the best time because they had already dug a trap and were waiting for someone to jump in!

Chen Xu quickly saw five IPs connect to the computer, and a line of red text appeared on the notepad: "Haha, we didn't know what to name ourselves, brothers and sisters of Foxtail Grass, hello!"

Is this a hacker war?!

This person is clearly just here to chat casually!

Zhan Jing helplessly put the keyboard back and told Chen Xu, "Why don't you talk to them first?"

Chen Xu switched the font to blue, typed a line of "..." to represent speechlessness, and then said, "Looks like we've all thought of the same thing."

The team with the black text replied, "Haha, it's not just us, all nine groups are starting to fight now. My friend just told me that he was bored and tried to hack into Big Sister Baby's computer, and then Big Sister Baby threw a logic bomb at him, destroying the system. He's reinstalling it now. Hehe."

The player with the red text, "Don't Know What to Name," said, "It's okay, it's okay. The competition is mainly for friendly competition, so play however you like. We're not aiming for first place anyway." "We're not aiming for first place either!" the betting team quickly chimed in. "Big Sister Baby and Boss Lion are too strong. So we're just here for fun. What about you guys?"

Chen Xu replied, "We didn't expect that, it was just for fun." A hacker competition turned into a chat competition. Sigh, this kind of life!

However, this hacking competition, which was basically an internal event for the Red Hacker Alliance, was completely devoid of any tension. Honestly, everyone here is an open community, so there's no need to create any conflict. Moreover, it was a battle between experts. The outcome was clearly defined, unlike a football match where a weaker team might win by taking advantage of a stronger team's poor performance or through a counter-attacking strategy. In such cases, the victory wouldn't be taken so seriously.

Hacker skill is a binary choice: either 1 is 1, or 0 is 0. The difference in skill level is either too great or the skill level is evenly matched.

The significance of the hacker battles lies not in the outcome of one or two matches.

At this point, the betting team asked, "ICE, FOX, aren't you two newcomers who have been racking up points quickly on the Red Hacker battlefield lately? I've watched your matches, and your skills have improved rapidly, especially ICE. Your fundamentals are very good, and your defense just now was also spot-on. You have potential!"

Upon realizing he had been recognized, Chen Xu was frustrated. Why didn't he change his identity?

So he said, "Damn it, you all know we're newbies, why aren't you going easy on us? A big brother should act like a big brother, okay?"

"Style my ass!" "Don't know what name to choose" said: "I'm begging you, even if you were to fight me right now, I might not be able to beat you, and you're saying you'd let me win! We're newbies too!"

"Hahaha," the betting team chimed in, "Yeah, yeah, we're all newbies!"

"How lewd!" Chen Xu turned to look at Ying Nian, who was precocious and fat: "Who are these two groups of guys pretending to be young? With such a lewd style, they should be easy to recognize, right?"

Young and overweight, he shrank back and uttered a single sentence: "Apart from a few leaders, the Red Hacker Alliance is basically full of lewd people. How am I supposed to guess..."

"..." Chen Xu was speechless.

At this point, the betting team said, "Now that we're all together, why don't we play a three-way free-for-all? You know, according to the rules, each team has to play two matches, which is too boring. How about a single match to decide the winner?"

The suggestion was immediately met with strong agreement from "Who Doesn't Know What to Name." Chen Xu looked at Zhan Jing, who was prematurely overweight, and thought, "Why not? What's the big deal?" Zhan Jing thought for a moment, nodded, and said softly, "That'll save us trouble."

Seeing that Chen Xu had agreed, the members of the betting team immediately got excited and typed on the screen: "Hey, there are too many rules in the regular competition, it's so boring. Let's play something exciting. We can use any botnet we want, and release all the viruses and Trojans we want. Let's use this piece of junk botnet as our battlefield, how about it? Or if you think we're getting a good deal, we can switch to another one. Anyway, I only installed two suicide programs on this botnet."

"It's fine, I don't think we need to replace it. This botnet is pretty good." The user, who doesn't know what to name, said, "Vulnerabilities, haha, countless vulnerabilities! How did you do that? How come it didn't patch a single XP vulnerability? Let me check... damn, the earliest vulnerability was officially announced by Microsoft in November 2001?! Could this botnet be running the legendary initial version of XP?!"

Upon hearing this, Chen Xu was quite embarrassed. As everyone knows, Microsoft's operating systems require frequent patching. Once Microsoft discovers a system vulnerability, it will provide a patch for download on its official website. Later, there were even major upgrades, such as upgrading XP to XP SP2, SP3, and so on.

But the fact that this botnet didn't have a single security patch installed is a miracle. Even pirated CDs are generally up-to-date; to get an operating system completely free of vulnerabilities is truly exceptional.

The betting team chuckled: "This is the earliest Russian cracked version, I've treasured it for years and haven't been able to bear deleting it! How about it, you little weed, dare to have a three-way free-for-all?!"

"What is there to be afraid of?!"

Chapter 237 The Great War of the Three Kingdoms (Part 2)

"Our three hacker groups will decide whoever breaches this server and holds it for ten minutes wins. The winner automatically advances. Losing one game or several games is the same as losing anyway. The two losing groups will automatically withdraw from the competition. Okay, pinky promise, whoever lies is a dog!"

The last two sentences really shocked everyone.

Are people still swearing like that these days?!

Isn't it so cute?!

But jokes aside, since the decision has been made, we have to fight.

Chen Xu looked at Zhan Jing and the others, suddenly realizing that he hadn't consulted them when he agreed. Feeling a little flustered, he quickly said, "Um, everyone, get ready. Does anyone object to starting a Three Kingdoms battle right now?"

"I have to agree even if I don't want to be a puppy." Young and fat stretched lazily: "Besides, I prefer to get things done all at once, it saves trouble."

"Although playing one more game will give me more experience, playing against two teams at the same time is also a rare experience, so I don't mind."

"I don't care."

Wu Yuan and Zhong Ziyu both expressed their opinions, while Chen Xu looked at Zhan Jing with a somewhat timid gaze. Zhan Jing found it amusing: "Don't look at me like that. As the captain, you shouldn't be thinking about whether your order was right or wrong. Because it's too late to think about that now. What we need to discuss now is how to win this game. Just follow your decision completely."

To be honest, Chen Xu was a little intimidated by Zhan Jing, because this girl was just like Zhong Ziyu said. She didn't usually express her opinions, but when she did, it was hard to ignore them.

But since she brought it up, Chen Xu perked up: "Let's devise a strategy for later. How should we attack? Should we directly capture this botnet first and then defend it? Or should we let them capture it first and then attack?"

“I think we should wait,” said Young Fat. “If we attack first, we will definitely be attacked simultaneously by two hacker groups. I think it’s better to defeat them one by one.”

This view was strongly endorsed by Zhong Ziyu, who said, "The nail that sticks out gets hammered down." It's better to play it safe in these situations.

Chen Xu looked at Wu Yuan: "What do you think, boss?"

Wu Yuan's technique is the worst here... Ignoring Gao Xiaojie... Moreover, Wu Yuan is not someone who likes to express his opinions, but after thinking about it, he said: "I think if we want to win, it's best to occupy the territory first, so that we will at least have the advantage."

Chen Xu looked at Zhan Jing. Zhan Jing then looked at Gao Xiaojie: "Tell me your thoughts?"

"Huh? Me too?" Gao Xiaojie waved her hand and said, "Never mind, I'm a newbie, I'm afraid it might mislead you if I say it."

"It's alright, go ahead and say it!"

“Alright then,” Gao Xiaojie said, “I also think we should take this chicken first.”

"Oh? Why?"

"Taking the botnet doesn't necessarily mean we have to just defend. We can launch an attack first. But if we have a base, I think Jingjing is capable of at least holding this place. Jingjing will focus on defense, and Chen Xu, you will focus on offense. I think we can handle both teams at the same time. Besides, this botnet is full of vulnerabilities. Our ultimate goal is to take over this computer, so we must patch the vulnerabilities... That will take time."

"Our ultimate goal..." Chen Xu muttered for a moment before saying, "Okay, I agree with your opinion. Zhan Jing? What's your opinion?"

Chen Xu regretted asking the question as soon as he did, because Zhan Jing had said that since he had already made up his mind, there was no need to ask any more questions, and their next task was simply to follow her instructions.

But Zhan Jing seemed to see the embarrassment on his face and said calmly, "I also think Xiao Jie is right. Although we might be attacked from both sides at the same time if we take over the botnet first, it is also a kind of training. Moreover, in real hacker battles, unless the strength is similar, the number of people does not play a significant role. One against two, everyone should take it easy. Just treat it as a one-on-one fight."

Hearing Zhan Jing's encouragement, Chen Xu immediately perked up!

"Alright, once inside, Wu Yuan, you and Zhan Jing will stay inside the botnet, patch it, and install a firewall. I'll launch the attack. Zongzi, you and Feifei will assist me!"

Seeing that Chen Xu had given the order, Zhong Ziyu and Yingnian Zaofei, despite their differing opinions, were still obedient.

At this moment, Chen Xu typed on the keyboard: "We are ready."

The two teams on the other side quickly responded: "We're ready too."

Since there were no referees, the betting team called out: "It's 16:37:02 Beijing time now. Hmm, that was the time just now. 16:40. On time!"

Chen Xu and the other team both typed "OK". Chen Xu said, "Wu Yuan, you and Zhan Jing need to prepare the system patch right now. You should have it on your computers, right?"

"Yes, I have them!" As a hacker, all these vulnerability patches were prepared, and they were all critical patches... You know, for an operating system from so many years ago, Microsoft's update patches totaled at least several hundred MB. Installing them one by one would probably take too long, and Microsoft's systems have a very annoying problem: after installing a patch, you have to restart the system for it to take effect. Of course, hackers have their own ways of dealing with this.

Having patches for critical vulnerabilities is essential for hackers. Otherwise, even with a firewall installed, the entire system is like a honeycomb, riddled with vulnerabilities, allowing hackers to easily enter as if it were their own backyard.

Chen Xu opened a small software program and started a countdown, setting the time to 4:39:50 PM. He needed to be ready ten seconds in advance.

"Start the ten-second countdown, brothers, open all your software, configure all your compromised machines, lock onto the target IP, leave port 8002 open, 3, 2, 1. Attack!"

As soon as the keyboard was pressed, a surge of data immediately flooded the compromised computer. Chen Xu's method involved blocking most network ports with the data flow, leaving port 8002 as a backdoor for entry. This way, anyone trying to access the computer through other ports would experience a delay, thus losing the initiative.

Chen Xu also noticed the system's slowdown when he tried to access it. It was obvious that the other party was using the same method, although they couldn't have chosen the same port as him, so their data flow was also blocking the 8002 port he was trying to access.

In that case, it depends on whose computer runs faster and whose botnet attack is more aggressive!

Three seconds. As soon as the address of the botnet administrator account was refreshed on the system, Chen Xu immediately clicked on the account name with the mouse, pressed the shortcut key F2 to change the administrator name to ICE, right-clicked the account to enter the password, and added four super administrator accounts.

Almost a second later, Zhan Jing and the others also obtained their own administrator accounts. Wu Yuan quickly copied the patch to the other computer and ran it, while Zhan Jing entered the DOS emulation system to encrypt and transfer the system's password file.

As the saying goes, both the spear and the shield are constantly evolving.

When Microsoft systems were first released, password files were specially encrypted and protected, making it impossible for users to modify or delete them through ordinary means, even if they found the password file. However, unlocking software and special deletion software later appeared, allowing passwords to be deleted directly within the Windows system… Previously, there was also a method that involved entering the DOS system, which rendered XP's protection settings ineffective.

As hacking techniques became more sophisticated, defensive measures naturally needed to be strengthened. This involved modifying the registry to "transfer" the Windows password configuration file to a different location, and then hiding and disabling the registry keys. This way, if another hacker tried to delete the password file using previous methods, it would be ineffective.

The patch installation takes time. After Chen Xu took over the administrator account, he immediately transferred a small detection software there, ready to counterattack any ports found to be under attack. Meanwhile, Yingnian Zaofei and Zhong Ziyu also began to help. Now, everyone was doing their best to buy time for Wu Yuan and Zhan Jing, time to patch the system.

"Wow, that's brutal! It's just brothers sparring, there's no need to take it so seriously!"

Seeing the betting team shout like that, Chen Xu smiled and said, "You make it sound so easy, but why are you launching such a desperate attack if you're not going to take it seriously?"

That's how competitions are sometimes; once they start, you start to care about things you didn't before. It's like competing for monthly tickets—once you're in the top ranks, you don't want to fall back down… For example, last month, Old Cat held the top spot for newcomers for 29 and a half days, only to be overtaken by Little Potato at the last minute. He was incredibly frustrated! Rumor has it that Cat has been eating potatoes for every meal lately!

"Don't know what name to choose" launched an attack without saying a word.

Chen Xu could see the data flow and system load. The opponent's number of botnets was definitely no less than his own, and being on the front lines, Chen Xu felt like he was in a torrent of data. He could only focus all his energy on mobilizing his botnets to launch a fierce attack.

When Chen Xu was in the midst of it all, he felt like a general in ancient times, commanding his troops and leading the charge. Yingnian Zaofei and Zhong Ziyu were his adjutants; wherever the arrow pointed, they would charge forward without hesitation!

I recall Zhan Jing saying before that a hacker without botnets is not a true hacker.

Chen Xu finally understood her words; he was now the king!

Chapter 238 The Great War of the Three Kingdoms (Part 2)

To put it simply... many people have probably played a classic Three Kingdoms game... Romance of the Three Kingdoms.

The hacker's attack is very similar to the battle mode in the Three Kingdoms Heroes game.

The hacker is the commander, and the botnets are the soldiers following behind. How to control these soldiers to serve you, how to make your soldiers fight against other soldiers, and even directly kill the enemy commander, is a skill in itself.

Therefore, the types of units you send, the "zombie" units, require careful consideration. If the data streams you send are all junk information, then this single attack method can easily be blocked by the enemy.

Simply put, a data stream attack involves sending a connection request command to a computer. This command can take many forms, but all exploit vulnerabilities in current computer software to send a request to the computer, instructing it to connect. After the request is sent, the computer responds, but the compromised computer intentionally doesn't reply, creating a response time for the attacked computer and consuming memory resources.

However, such requests come in many forms; the example above is just one instance. If there were only one method, then it could be completely solved by using blocking techniques… Never underestimate human ingenuity!

So Chen Xu is currently using bots to keep the game close while analyzing data streams to locate the positions of the opponent's key players.

The saying "To catch the thief, first catch the king" applies everywhere.

The location of the enemy's main force is easy to pinpoint. Because with botnets, it's impossible for one person controlling thousands of them to issue commands as freely as a real person. Botnets' attack methods are singular and unchanging, operating entirely like a computer. Human attack methods, on the other hand, are extremely unpredictable and varied. Once you find their main force and attack it, you can ultimately drive them out of the battlefield, or even destroy the host computer they control… This destruction doesn't mean blowing up the computer; even hackers generally don't have the skill to do that. This destruction means using software or similar methods to disrupt the enemy's system, rendering their computer inoperable.

However, it's important to understand that finding the opponent's key player from this vast stream of data is no easy task.

Chen Xu withstood the onslaught of a massive data stream. The opponent's data flow was so powerful that he dared not let his guard down. Fortunately, his compromised computers were helping to alleviate the pressure. Otherwise, if all the data streams were directed at his computer, without a hardware firewall, the computer would simply crash.

⚙️
Estilo de lectura

Tamaño de fuente

18

Ancho de página

800
1000
1280

Leer la piel

Lista de capítulos ×
Capítulo 1 Capítulo 2 Capítulo 3 Capítulo 4 Capítulo 5 Capítulo 6 Capítulo 7 Capítulo 8 Capítulo 9 Capítulo 10 Capítulo 11 Capítulo 12 Capítulo 13 Capítulo 14 Capítulo 15 Capítulo 16 Capítulo 17 Capítulo 18 Capítulo 19 Capítulo 20 Capítulo 21 Capítulo 22 Capítulo 23 Capítulo 24 Capítulo 25 Capítulo 26 Capítulo 27 Capítulo 28 Capítulo 29 Capítulo 30 Capítulo 31 Capítulo 32 Capítulo 33 Capítulo 34 Capítulo 35 Capítulo 36 Capítulo 37 Capítulo 38 Capítulo 39 Capítulo 40 Capítulo 41 Capítulo 42 Capítulo 43 Capítulo 44 Capítulo 45 Capítulo 46 Capítulo 47 Capítulo 48 Capítulo 49 Capítulo 50 Capítulo 51 Capítulo 52 Capítulo 53 Capítulo 54 Capítulo 55 Capítulo 56 Capítulo 57 Capítulo 58 Capítulo 59 Capítulo 60 Capítulo 61 Capítulo 62 Capítulo 63 Capítulo 64 Capítulo 65 Capítulo 66 Capítulo 67 Capítulo 68 Capítulo 69 Capítulo 70 Capítulo 71 Capítulo 72 Capítulo 73 Capítulo 74 Capítulo 75 Capítulo 76 Capítulo 77 Capítulo 78 Capítulo 79 Capítulo 80 Capítulo 81 Capítulo 82 Capítulo 83 Capítulo 84 Capítulo 85 Capítulo 86 Capítulo 87 Capítulo 88 Capítulo 89 Capítulo 90 Capítulo 91 Capítulo 92 Capítulo 93 Capítulo 94 Capítulo 95 Capítulo 96 Capítulo 97 Capítulo 98 Capítulo 99 Capítulo 100 Capítulo 101 Capítulo 102 Capítulo 103 Capítulo 104 Capítulo 105 Capítulo 106 Capítulo 107 Capítulo 108 Capítulo 109 Capítulo 110 Capítulo 111 Capítulo 112 Capítulo 113 Capítulo 114 Capítulo 115 Capítulo 116 Capítulo 117 Capítulo 118 Capítulo 119 Capítulo 120 Capítulo 121 Capítulo 122 Capítulo 123 Capítulo 124 Capítulo 125 Capítulo 126 Capítulo 127 Capítulo 128 Capítulo 129 Capítulo 130 Capítulo 131 Capítulo 132 Capítulo 133 Capítulo 134 Capítulo 135 Capítulo 136 Capítulo 137 Capítulo 138 Capítulo 139 Capítulo 140 Capítulo 141 Capítulo 142 Capítulo 143 Capítulo 144 Capítulo 145 Capítulo 146 Capítulo 147 Capítulo 148 Capítulo 149 Capítulo 150 Capítulo 151 Capítulo 152 Capítulo 153 Capítulo 154 Capítulo 155 Capítulo 156 Capítulo 157 Capítulo 158 Capítulo 159 Capítulo 160 Capítulo 161 Capítulo 162 Capítulo 163 Capítulo 164 Capítulo 165 Capítulo 166 Capítulo 167 Capítulo 168 Capítulo 169 Capítulo 170 Capítulo 171 Capítulo 172 Capítulo 173 Capítulo 174 Capítulo 175 Capítulo 176 Capítulo 177 Capítulo 178 Capítulo 179 Capítulo 180 Capítulo 181 Capítulo 182 Capítulo 183 Capítulo 184 Capítulo 185 Capítulo 186 Capítulo 187 Capítulo 188 Capítulo 189 Capítulo 190 Capítulo 191 Capítulo 192 Capítulo 193 Capítulo 194 Capítulo 195 Capítulo 196 Capítulo 197 Capítulo 198 Capítulo 199 Capítulo 200 Capítulo 201 Capítulo 202 Capítulo 203 Capítulo 204 Capítulo 205 Capítulo 206 Capítulo 207 Capítulo 208 Capítulo 209 Capítulo 210 Capítulo 211 Capítulo 212 Capítulo 213 Capítulo 214 Capítulo 215 Capítulo 216 Capítulo 217 Capítulo 218 Capítulo 219 Capítulo 220 Capítulo 221 Capítulo 222 Capítulo 223 Capítulo 224 Capítulo 225 Capítulo 226 Capítulo 227 Capítulo 228 Capítulo 229 Capítulo 230 Capítulo 231 Capítulo 232 Capítulo 233 Capítulo 234 Capítulo 235 Capítulo 236 Capítulo 237 Capítulo 238 Capítulo 239 Capítulo 240 Capítulo 241 Capítulo 242 Capítulo 243 Capítulo 244 Capítulo 245 Capítulo 246 Capítulo 247 Capítulo 248 Capítulo 249 Capítulo 250 Capítulo 251 Capítulo 252 Capítulo 253 Capítulo 254 Capítulo 255 Capítulo 256 Capítulo 257 Capítulo 258 Capítulo 259 Capítulo 260 Capítulo 261 Capítulo 262 Capítulo 263 Capítulo 264 Capítulo 265 Capítulo 266 Capítulo 267 Capítulo 268 Capítulo 269 Capítulo 270 Capítulo 271 Capítulo 272 Capítulo 273 Capítulo 274 Capítulo 275 Capítulo 276 Capítulo 277 Capítulo 278 Capítulo 279 Capítulo 280 Capítulo 281 Capítulo 282 Capítulo 283 Capítulo 284 Capítulo 285 Capítulo 286 Capítulo 287 Capítulo 288 Capítulo 289 Capítulo 290 Capítulo 291 Capítulo 292 Capítulo 293 Capítulo 294 Capítulo 295 Capítulo 296 Capítulo 297 Capítulo 298 Capítulo 299 Capítulo 300 Capítulo 301 Capítulo 302 Capítulo 303 Capítulo 304 Capítulo 305 Capítulo 306 Capítulo 307 Capítulo 308 Capítulo 309 Capítulo 310 Capítulo 311 Capítulo 312 Capítulo 313 Capítulo 314 Capítulo 315 Capítulo 316 Capítulo 317 Capítulo 318 Capítulo 319 Capítulo 320 Capítulo 321 Capítulo 322 Capítulo 323 Capítulo 324 Capítulo 325 Capítulo 326 Capítulo 327 Capítulo 328 Capítulo 329 Capítulo 330 Capítulo 331 Capítulo 332 Capítulo 333 Capítulo 334 Capítulo 335 Capítulo 336 Capítulo 337 Capítulo 338 Capítulo 339 Capítulo 340 Capítulo 341 Capítulo 342 Capítulo 343 Capítulo 344 Capítulo 345 Capítulo 346 Capítulo 347 Capítulo 348 Capítulo 349 Capítulo 350 Capítulo 351 Capítulo 352 Capítulo 353 Capítulo 354 Capítulo 355 Capítulo 356 Capítulo 357 Capítulo 358 Capítulo 359 Capítulo 360 Capítulo 361 Capítulo 362 Capítulo 363 Capítulo 364 Capítulo 365 Capítulo 366 Capítulo 367 Capítulo 368 Capítulo 369 Capítulo 370 Capítulo 371 Capítulo 372 Capítulo 373 Capítulo 374 Capítulo 375 Capítulo 376 Capítulo 377 Capítulo 378 Capítulo 379 Capítulo 380 Capítulo 381 Capítulo 382