Super-brain hacker

Chapter 480 The Last Strike

After decompressing the file, Lao Wang couldn't help saying excitedly, "From the name of the file, it should be right. It's the Blue Army's battle plan document!"

When Captain Qian heard Lao Wang's words, he couldn't close his mouth with laughter.

The problem encountered now is that this file has been encrypted. Captain Qian immediately asked Lao Wang to check the specific situation of the file. Fortunately, he found that the other party did not encrypt the file twice, but only unified encryption when the previous exercise headquarters prepared.

They didn't know that within a minute after the worm copied the document, Li Yushan started to encrypt the file. As long as it was slow for such a minute, their results were likely to be greatly reduced.

"Lao Wang, are you sure to crack it? If it can be done, this exercise will be a successful conclusion. Haha, the Blue Army is sure to lose!" Captain Qian's smile never stopped.

In fact, many people think that there is no suspense in this exercise. After all, the strength of the Blue Army is there. Whether it is the overall military quality or equipment, it has shaken off a few streets of the Red Army. However, in the face of their shouts, Lao Yuan, the commander of the Red Army, did not believe in this evil and could not stand the stimulation of the other party. He directly bet with them that whoever lost, officers above the rank of military commander would run naked!

Captain Qian resisted the impulse to report the good news to the headquarters immediately, and looked at Lao Wang with a expectant face.

Lao Wang didn't say much, but said, "I'll try it. It should be no problem!"

"Good!" Captain Qian gave Lao Wang a thumbs up and said. Lao Wang, thanks to you, this exercise is not easy to successfully obtain the combat documents of the other party! If we can win this exercise, Lao Wang Yan is the great hero of our information confrontation brigade and the great hero of our 38th Army!"

Captain Qian said so, which made Lao Wang a little embarrassed. He quickly explained, "Captain Qian, it's not me who played a major role in this operation. It's Lin Hong. I'm just cooperating with his invasion. The real main force is him!"

Although the worm was written by Lao Wang, the key part was completed by Lin Hong. If he hadn't completed the key part of the code, Lao Wang wouldn't have been able to do it at all.

Moreover, the reason why this worm can successfully infect the other party's server is also the vulnerability provided by Lin Hong. The foreshadowing attack in the early stage was completely completed by him. Lao Wang is not a person who fishes for fame, so he naturally refuses to take this credit on himself.

Captain Qian nodded. He also saw Lin Hong's role, but he didn't expect it before. In this matter, Lin Hong actually exerted his main strength. After all, in his opinion, this worm has always been Lao Wang responsible for the information sent back. Also on his computer.

He looked around and didn't see Lin Hong's figure. He didn't say more. He just asked Lao Wang to crack out the contents of the file as soon as possible.

Then, Captain Qian ran briskly to his office and reported the good news to the superior.

It may be taken into account that this is the first time to carry out an information security confrontation exercise. When preparing this encrypted file, they did not use the asymmetric almost impossible way to crack it, but used conventional encryption, that is to say, as long as the technology reaches a certain level, it can be cracked.

Lao Wang is a researcher of viruses. Naturally, there is no need to talk about this level of cracking.

He skillfully opened the tool, began to analyze the file structure, down the breakpoint, and track the algorithm.

Everyone is naturally very happy to see this result. After all, they have worked so hard for so long that for this purpose, and now they have unconsciously completed it ahead of schedule. Except for some unbelief, it is a burst of ecstasy.

It is the first time for everyone to experience this type of exercise. Although there are still many shortcomings in many aspects, they have experienced a lot of things in nearly a week, and they have also encountered a lot of situations that they can't usually encounter at all.

Especially the performances of Lao Wang and Lin Hong, they are simply amazing. Although they didn't do it themselves, being able to feel the process by themselves also makes them feel very excited. After all, being able to work with masters is itself a thing to be proud of.

They didn't know how Lao Wang and Lin Hong "stolen" each other's documents. Lao Wang was cracking the documents. They were not easy to disturb him, so they gathered around Lin Hong and asked about the details of the invasion.

After working together for so long, everyone was comrades-in-arms, but it was difficult to be kind. In the face of their questions, Lin Hong could not ignore them, so he simply explained this principle to them.

I don't think that when Lin Hong finished explaining, everyone was completely stunned by their whimsy.

Write your own worms, system vulnerabilities, APACHE overflow vulnerabilities, hiding, covering, secret transmission...

They seemed to have heard a thrilling spy story.

They never thought that they could use this method to invade each other's systems and steal intelligence. Before that, they didn't think about it. Many people just stayed at the level of using software or public vulnerabilities about the concept of network intrusion.

The case mentioned by Lin Hong opened their eyes and was extremely shocked. At the same time, it also changed their consistent view of network intrusion.

This is the invasion, and this is the battle between masters!

Everyone was amazed at their whimsy, and they were even more amazed that the invasion was successfully completed.

After they returned to their seats, they couldn't calm down for a long time.

This experience has had a great impact on their later path of computer science.

Especially Liu Hui, he suddenly realized how childish and ridiculous his previous behavior was. At this time, he completely understood that Lin Hong ignored his challenge before. It was not that he had a good temper, or that he was not good at arguing, but that the other party did not regard him as a dish at all.

Lin Hong's technology has long been beyond his level. It seems that a hero with peerless martial arts skills in the martial arts can only ignore the way in the face of the provocation of children.

"It turns out that hacking technology can also be so thrilling and wonderful..."

Liu Hui seems to have matured a lot in an instant.

......

......

In the next period of time, the atmosphere in the computer room is obviously much more relaxed than before, and you can often see a relaxed smile on everyone's face.

Since they have got the other party's combat documents, as long as they ensure that their side is not taken away by the other party, they have basically won this exercise.

They have now turned to defense in full swing.

Captain Qian also became easy, and from time to time he saw him running to Lao Wang to see how his cracking progressed.

Lao Wang was a little anxious at this time.

The encryption algorithm this time was a little beyond Lao Wang's expectation. He originally thought it was similar to cracking a simple software, but he didn't expect the army to put it in the encryption area, but there was a real master.

Although the algorithm is simple, the encryption method is quite complicated. It can be said that the other party purely uses encryption techniques to increase the difficulty of decryption.

Fortunately, Lao Wang has also found some clues now, and it's only a matter of time to crack it.

When Lao Wang encountered problems, Lin Hong did not take the initiative to help. After all, Lao Wang did not ask him for help.

It was the same before. If Lao Wang did not ask him for help, he would never take the initiative to come forward and say that he could solve the problem.

Technicians have a certain arrogance. In the face of challenges, they never give up easily.

In addition, it is understandable that Lao Wang wants to ** crack this file. After all, his previous achievements were completed with the assistance of Lin Hong. In comparison, his role is not as good as that of Lin Hong.

File cracking is a matter of time, and the exercise is coming to an end. After all, according to the plan, the total time is ten days, and tomorrow is the deadline.

Captain Qian stayed with Lao Wang for a while. After talking to him for a few words, the smile on his face became even greater. He should have got good news from Lao Wang.

Then, he came to Lin Hong's side and said to him, "Comrade Lin Hong, the exercise is almost over, but I'm thinking, is there any way to give the Blue Army a happy attack again and put a satisfactory end to this exercise?"

Lin Hong thought for a moment and asked, "Deny of service attack?"

Captain Qian punched his palm: "Okay! Just attack with denial of service! It's better to let them all disconnect from the network directly and can't connect to the network. Of course, it's okay to let their server refuse service!"

He secretly had fun in his heart. In this exercise, he invited two top masters, especially this Lin Hong. He also understood that this young man did not do his best at all to deal with this level of exercise, which was very easy.

He just came over and tried to say that the other party really had no means to come out.

When people were happy, they were in high spirits, and Captain Qian hummed and left.

Lin Hong is quite relieved to do things. He can finish it beautifully without what he tells him to do. In fact, he has sighed psychologically many times. Why is Lin Hong not his soldier? If there is such a soldier, it will save a lot of effort!

When Lin Hong saw Captain Qian's happy appearance, he couldn't help shaking his head with a smile, and then began to prepare for his attack.

The reason why he promised Captain Qian to make the last attack and draw a period is actually a certain selfishness.

After all, he has studied the "boundary gateway protocol" for so long, and so far he has some experience. Now he takes this opportunity to test the newly discovered vulnerability.