Reborn Super Hacker
Chapter 201 God breaks through
Text [Matrix] Chapter [-] God Breaks Through (Part [-])-
"How did he get around it?" Clinton saw "God is an idiot" whose ranking was immediately upgraded to No. 5, because in the previous records, there was no data showing that he had passed the previous hurdles. Instead, he directly entered the ninth level. . -
"Chairman, this guy is very powerful, and he is a Chinese hacker! No, he is a powerful super hacker!" Angela stood beside Clinton, looking at the real-time data displayed on the screen with a stern expression. -
"That's right, it's really shocking that such a character suddenly appeared!" Clinton exclaimed. -
Now the number one on the leaderboard is still the x organization, which has reached the 17th level, the second is the European Black Alliance, 14th level, the third is the nday organization, 12th level, and the fourth is Hackerpig. In the 10th level, "God is Stupid" and the Texa organization are tied for fifth place, and the data of the two parties have not changed for a long time. . -
"Brother Wen, shall we continue now?" Xiaorong said into the microphone after making that photo into a wallpaper. -
"Hey, you don't need to say, Brother Wen is already in the server!" Qingfeng interjected with a smile. . -
Huaxia Network Information Department. -
"All the members of the Honker League have to withdraw from this battle. Although we failed, we still worked hard!!" Li Hua said into the microphone, although there are only a few people still in the chat room. . -
The Huaxia Honker Alliance officially withdrew from this level battle, and their ranking is now fixed at the level of the fifth level! -
Now more and more hackers are still nervously cracking the level, but it seems that the real battle has not yet reached its peak. -
"Brother Fei, I'm back!" Xu Fei came to the server's room with a few bags of breakfast at this time, and saw that Huang Fei was still busy nervously. -
Huang Fei reflected and put down his work, "Xu Fei, why did you come back so soon?" Huang Fei asked Xu Fei with a smile. -
"Oh, oh...my mother is going to undergo surgery today!" Xu Fei said. -
Huang Fei was stunned for a moment, "Then why did you come back, hurry back and be with your mother!!" After speaking, Huang Fei stood up from his seat and tried to push Xu Fei back. -
Seeing Huang Fei so nervous about his mother, Xu Fei felt a little sour, "Brother Fei, Brother Fei, don't push me, I promised you to buy breakfast for you and I came back, I will go back later." After finishing, he put the breakfast he was carrying on Huang Fei's computer desk. -
"Brother Fei, I'm leaving now, you can eat slowly!" After Xu Fei finished speaking, he quickly walked towards the door. Huang Fei looked at the back and returned to the room with a smile. In fact, Xu Fei was by his side not bad. -
After a while, Huang Fei finished all the breakfast. He was thinking about what to do next. The preparations for the server transfer of "Growth" are ready, and the transfer will start in the early hours of this morning. .Huang Fei thought about it, and finally he thought of the battle designed by Dr. Lei Sen. -
Huang Fei had hacked into Apple's monitoring server before, and successfully found the URL of Level 9. Since Huang Fei said he wanted to participate, he must have started from the beginning, but his record is now frozen at Level 9. Level 9, according to regulations, he has to start from the server of level [-]. . -
The x organization has successfully cracked the key of the 17th level at this time, and is officially moving towards the 18th level. According to Apple, at the 20th level, you will encounter the latest mobile phone system developed by Apple. The key is composed of 162 bits, which is currently the longest masking code in the world. If you use some cracking tools to crack it normally, some people have calculated that it will take 88 years to crack it. But at that time, people I don't know if it's still there! -
Huang Fei has now re-entered the server of level 9, and the next thing he has to do is to slowly crack the next level 89.This requires patience. Of course, with his skills, he can directly crack the 100th level. -
"Fuck, how did you pass this level? It's been half an hour. Brother Wen, have you made any progress?" Qingfeng finally couldn't hold back anymore, and cursed. -
Yu Wen is also very busy at this time, because this level seems to be a symbol, and it has been going around all the time. The few people in front have already passed, why are they trapped in this level? Seeing the many hackers behind As he was about to catch up, Yu Wen couldn't help becoming anxious and began to feel restless. He even wondered if the techniques he had learned over the years were all for display! ! -
"Qingfeng, let's not bother brother Wen, he is probably bothered now!" Xiaorong interrupted. -
On the other side, Huang Fei is now entering the 10th level. The 9th level just now was easily cracked by him. It turns out that the URL is in the system file. How can such a trick be difficult for this future computer genius, so This pass is smooth and smooth. -
The next thing he will face is the hackerpig organization in the 10th level server. Although he doesn't know the background of this organization, judging from the cracking methods they use in the server, their tools are very primitive. Huang Feishun Grabbed the little tail of a hackerpig member and knew his ip. When the displayed area was Iraq, Huang Fei was slightly stunned. He wondered why there is such a powerful hacker organization in such a backward country. It made him a little interested. -
Some people often say, knowing a person's ip how to hack his computer next? ? ?What Huang Fei will do next is the basic skills of hackers in that era, which is to hack into the computer of that hackerpig member through the oldest method. -
Huang Fei opened a folder called trash on the e-disk. Generally, Huang Fei will classify some software he wrote, and the software in this trash folder is naturally nothing in Huang Fei's eyes. Now Huang Fei If he finally wants to use these software, the first thing he is looking for is a port scanner. This software is a trendy work of this era and one of the necessary tools for hackers. Its principle is that you enter a person's ip address, it It will automatically help you find all the ports that are open in that host computer. The ports of a computer are like the door of a house. As long as you find a suitable port that can be hacked, the door is just like a decoration. Huang Fei looked at this in his eyes. "Obsolete" port scanner, I saw it was scanning ip! -
After 10 seconds, the scanner showed that all the recognized ports (0-1023) of that computer were normal, and there were no open services available. Huang Fei smiled. It seemed that he wanted to deal with a top hacker belonging to this world. This method is not feasible, and Huang Fei will change to another way of intrusion next. . -
Still open the "junk" folder. After careful screening again, Huang Fei finally found a software called "Internet Hunter". Data packets, ordinary people use this software for network detection and maintenance, who would have thought that there is such a function, Huang Fei quickly entered that person's ip address, the next thing to do is to wait slowly Wait for the fish to take the bait! -
After 1 minute, Huang Fei started to run another software. This software is called "Garble Code Converter". All the data was converted into text. When he saw a few lines of English letters, Huang Fei's mouth showed a smile. This was a signal of success. A cross-generational product, its function is to forcibly decompose a program into signal waves, and then bypass the IP protocol and send it to the other party's computer. -
"Initializing..." "Starting to analyze the program code..." "The program is disassembled and is being sent to the target computer..." "The sending is complete, do you want to execute this program remotely?" Looking at the messages on the screen sent by the "little angel sending the contract" News, Huang Fei has a very freehand feeling. It seems that he has not played like this for a long time. He used to know that he can directly use his "artifact" to connect to the IP. Now he has to do so much. Although he is not used to it, in general not bad. -
Huang Fei clicked the mouse, and he chose "Yes!".When a Trojan horse is successfully executed by the user, the party that is invaded next will face the remote control of the opponent. . -
Huang Fei randomly found a remote control software, and finally he chose the most common remote tool in the Chinese hacker community, "Gray Pigeon", and successfully connected. With a certain amount of effort, Huang Fei thought. . -
When the other party's screen appeared in front of his eyes, Huang Fei was stunned for a moment. The computer they used was Windows 2000. You must know that this system is already an aging system. Huang Fei randomly browsed his hard disk files. , except for some common hacking tools, the rest is only photos. . -
Huang Fei opened the photos, which showed people on the street during the war in Iraq, and many hungry people asking for help on the street. -
When he saw a photo of a dilapidated house with hackerpig written on it, Huang Fei was a little shocked. It turned out that their situation was so difficult. Huang Fei carefully browsed their daily expenditure table on the desktop. Most of their money It's all given to the poor people, but they are sitting and busy on the computer every day, just for that little money.Huang Fei couldn't help admiring them, although their technology is not the best, but their behavior is indeed worth learning from the entire hacker world, so Huang Fei made a decision in his heart, that is, this decision, for Huang Fei It will save a lot of trouble to rule the Middle East in the future! ! -
ps: Many people ask for a group, and now Xiaozhi announces a reader group, group number: 115082178, readers who support Xiaozhi are welcome to join!
"How did he get around it?" Clinton saw "God is an idiot" whose ranking was immediately upgraded to No. 5, because in the previous records, there was no data showing that he had passed the previous hurdles. Instead, he directly entered the ninth level. . -
"Chairman, this guy is very powerful, and he is a Chinese hacker! No, he is a powerful super hacker!" Angela stood beside Clinton, looking at the real-time data displayed on the screen with a stern expression. -
"That's right, it's really shocking that such a character suddenly appeared!" Clinton exclaimed. -
Now the number one on the leaderboard is still the x organization, which has reached the 17th level, the second is the European Black Alliance, 14th level, the third is the nday organization, 12th level, and the fourth is Hackerpig. In the 10th level, "God is Stupid" and the Texa organization are tied for fifth place, and the data of the two parties have not changed for a long time. . -
"Brother Wen, shall we continue now?" Xiaorong said into the microphone after making that photo into a wallpaper. -
"Hey, you don't need to say, Brother Wen is already in the server!" Qingfeng interjected with a smile. . -
Huaxia Network Information Department. -
"All the members of the Honker League have to withdraw from this battle. Although we failed, we still worked hard!!" Li Hua said into the microphone, although there are only a few people still in the chat room. . -
The Huaxia Honker Alliance officially withdrew from this level battle, and their ranking is now fixed at the level of the fifth level! -
Now more and more hackers are still nervously cracking the level, but it seems that the real battle has not yet reached its peak. -
"Brother Fei, I'm back!" Xu Fei came to the server's room with a few bags of breakfast at this time, and saw that Huang Fei was still busy nervously. -
Huang Fei reflected and put down his work, "Xu Fei, why did you come back so soon?" Huang Fei asked Xu Fei with a smile. -
"Oh, oh...my mother is going to undergo surgery today!" Xu Fei said. -
Huang Fei was stunned for a moment, "Then why did you come back, hurry back and be with your mother!!" After speaking, Huang Fei stood up from his seat and tried to push Xu Fei back. -
Seeing Huang Fei so nervous about his mother, Xu Fei felt a little sour, "Brother Fei, Brother Fei, don't push me, I promised you to buy breakfast for you and I came back, I will go back later." After finishing, he put the breakfast he was carrying on Huang Fei's computer desk. -
"Brother Fei, I'm leaving now, you can eat slowly!" After Xu Fei finished speaking, he quickly walked towards the door. Huang Fei looked at the back and returned to the room with a smile. In fact, Xu Fei was by his side not bad. -
After a while, Huang Fei finished all the breakfast. He was thinking about what to do next. The preparations for the server transfer of "Growth" are ready, and the transfer will start in the early hours of this morning. .Huang Fei thought about it, and finally he thought of the battle designed by Dr. Lei Sen. -
Huang Fei had hacked into Apple's monitoring server before, and successfully found the URL of Level 9. Since Huang Fei said he wanted to participate, he must have started from the beginning, but his record is now frozen at Level 9. Level 9, according to regulations, he has to start from the server of level [-]. . -
The x organization has successfully cracked the key of the 17th level at this time, and is officially moving towards the 18th level. According to Apple, at the 20th level, you will encounter the latest mobile phone system developed by Apple. The key is composed of 162 bits, which is currently the longest masking code in the world. If you use some cracking tools to crack it normally, some people have calculated that it will take 88 years to crack it. But at that time, people I don't know if it's still there! -
Huang Fei has now re-entered the server of level 9, and the next thing he has to do is to slowly crack the next level 89.This requires patience. Of course, with his skills, he can directly crack the 100th level. -
"Fuck, how did you pass this level? It's been half an hour. Brother Wen, have you made any progress?" Qingfeng finally couldn't hold back anymore, and cursed. -
Yu Wen is also very busy at this time, because this level seems to be a symbol, and it has been going around all the time. The few people in front have already passed, why are they trapped in this level? Seeing the many hackers behind As he was about to catch up, Yu Wen couldn't help becoming anxious and began to feel restless. He even wondered if the techniques he had learned over the years were all for display! ! -
"Qingfeng, let's not bother brother Wen, he is probably bothered now!" Xiaorong interrupted. -
On the other side, Huang Fei is now entering the 10th level. The 9th level just now was easily cracked by him. It turns out that the URL is in the system file. How can such a trick be difficult for this future computer genius, so This pass is smooth and smooth. -
The next thing he will face is the hackerpig organization in the 10th level server. Although he doesn't know the background of this organization, judging from the cracking methods they use in the server, their tools are very primitive. Huang Feishun Grabbed the little tail of a hackerpig member and knew his ip. When the displayed area was Iraq, Huang Fei was slightly stunned. He wondered why there is such a powerful hacker organization in such a backward country. It made him a little interested. -
Some people often say, knowing a person's ip how to hack his computer next? ? ?What Huang Fei will do next is the basic skills of hackers in that era, which is to hack into the computer of that hackerpig member through the oldest method. -
Huang Fei opened a folder called trash on the e-disk. Generally, Huang Fei will classify some software he wrote, and the software in this trash folder is naturally nothing in Huang Fei's eyes. Now Huang Fei If he finally wants to use these software, the first thing he is looking for is a port scanner. This software is a trendy work of this era and one of the necessary tools for hackers. Its principle is that you enter a person's ip address, it It will automatically help you find all the ports that are open in that host computer. The ports of a computer are like the door of a house. As long as you find a suitable port that can be hacked, the door is just like a decoration. Huang Fei looked at this in his eyes. "Obsolete" port scanner, I saw it was scanning ip! -
After 10 seconds, the scanner showed that all the recognized ports (0-1023) of that computer were normal, and there were no open services available. Huang Fei smiled. It seemed that he wanted to deal with a top hacker belonging to this world. This method is not feasible, and Huang Fei will change to another way of intrusion next. . -
Still open the "junk" folder. After careful screening again, Huang Fei finally found a software called "Internet Hunter". Data packets, ordinary people use this software for network detection and maintenance, who would have thought that there is such a function, Huang Fei quickly entered that person's ip address, the next thing to do is to wait slowly Wait for the fish to take the bait! -
After 1 minute, Huang Fei started to run another software. This software is called "Garble Code Converter". All the data was converted into text. When he saw a few lines of English letters, Huang Fei's mouth showed a smile. This was a signal of success. A cross-generational product, its function is to forcibly decompose a program into signal waves, and then bypass the IP protocol and send it to the other party's computer. -
"Initializing..." "Starting to analyze the program code..." "The program is disassembled and is being sent to the target computer..." "The sending is complete, do you want to execute this program remotely?" Looking at the messages on the screen sent by the "little angel sending the contract" News, Huang Fei has a very freehand feeling. It seems that he has not played like this for a long time. He used to know that he can directly use his "artifact" to connect to the IP. Now he has to do so much. Although he is not used to it, in general not bad. -
Huang Fei clicked the mouse, and he chose "Yes!".When a Trojan horse is successfully executed by the user, the party that is invaded next will face the remote control of the opponent. . -
Huang Fei randomly found a remote control software, and finally he chose the most common remote tool in the Chinese hacker community, "Gray Pigeon", and successfully connected. With a certain amount of effort, Huang Fei thought. . -
When the other party's screen appeared in front of his eyes, Huang Fei was stunned for a moment. The computer they used was Windows 2000. You must know that this system is already an aging system. Huang Fei randomly browsed his hard disk files. , except for some common hacking tools, the rest is only photos. . -
Huang Fei opened the photos, which showed people on the street during the war in Iraq, and many hungry people asking for help on the street. -
When he saw a photo of a dilapidated house with hackerpig written on it, Huang Fei was a little shocked. It turned out that their situation was so difficult. Huang Fei carefully browsed their daily expenditure table on the desktop. Most of their money It's all given to the poor people, but they are sitting and busy on the computer every day, just for that little money.Huang Fei couldn't help admiring them, although their technology is not the best, but their behavior is indeed worth learning from the entire hacker world, so Huang Fei made a decision in his heart, that is, this decision, for Huang Fei It will save a lot of trouble to rule the Middle East in the future! ! -
ps: Many people ask for a group, and now Xiaozhi announces a reader group, group number: 115082178, readers who support Xiaozhi are welcome to join!
You'll Also Like
-
Panlong: Use the lower main gods to defeat the master
Chapter 40 12 hours ago -
Divine Seal: Reborn Taotie, adopted by the Devil of Love
Chapter 119 12 hours ago -
Versatile Mage: One Spirit a Day! The Strongest Forbidden Spell
Chapter 117 12 hours ago -
Covering the sky: Huo Lin flying template, breaking the life forbidden zone
Chapter 90 12 hours ago -
People in the chat group became the golden finger of the Emperor of Heaven
Chapter 67 12 hours ago -
Simultaneous travel: The group is about to be wiped out
Chapter 97 12 hours ago -
After rebirth, they all want to monopolize me
Chapter 144 12 hours ago -
The God of Heavens
Chapter 139 12 hours ago -
Douluo: The little girl I raised became Qian Renxue
Chapter 94 12 hours ago -
Humans in Type-Moon, Path of the Heroic Spirit
Chapter 89 12 hours ago