Chapter 135

Chapter 135 the tear of bombing the Pentagon!

There will be an economic crisis in the United States.

This incident spread all over the world in a short time. Some people don't think it was done by a hacker organization called evil decimal. They think that a country is preparing to launch an information war with the United States.

Now, most of the official websites of enterprises previously hacked in the United States have been restored and are operating normally. These hacked enterprises are well-known enterprises in the United States and even in the world. They jointly reported it and asked the U.S. government to quickly and thoroughly investigate the matter.

Some hacker organizations in the United States, led by the Royal brand organization MX, look for the dynamics of evil decimal in the network. However, at noon, all the free bases in China, Britain, Japan, Germany and other regions released announcements. Their chain bases were willing to help the United States and trace the behind the scenes, the evil decimal.

So far, it is unknown what kind of organization the evil decimal system is and what kind of organization it is. A few hackers know that the members of the evil decimal system include Wai nest, Arctic king and Jack. They are not sure about this news, so some experts are also looking for the information of the evil decimal system.

In China, the free base, Firefox group vs Hualian ended like this. Some rookies even didn't know the result. The free base didn't respond, and Hualian didn't say anything.

At present, there is a tripartite confrontation among the domestic hacker community, hell, HK alliance and ant Dynasty, plus a mysterious organization, Firefox group. Since noon, domestic hackers also know that free base is the so-called global alliance.

The Internet knows no borders, but hackers have roots.

The so-called root is the nationality of hackers. Yes, hackers are a group of hot-blooded existence, and their hearts are patriotic.

In this regard, some rookies hate this free base in China. Rookies have condemned China's free bases in major forums. There is no other reason to simply believe that China's free bases should not be linked with Japan.

Although the skills of rookies are not high, they all have a patriotic heart.

Rookies denounced China's freedom base in major forums and asked China hell, HK alliance and ant Dynasty to bomb this so-called potential "traitor"!

For this matter, HK alliance, hell and ant dynasty did not make any response.

Winter, Christmas.

At 2:00 p.m., unit 3, Dongming community, Shanghai.

After more than half an hour of discussion. Yang Tian told the detailed task to the Firefox group. Finally, Yang Tian proposed to let the Firefox group obey their own arrangements. However, the person in charge of the Firefox group, Firefox, said that they would obey the orders of Xie Shi only on the premise of safety.

When Firefox asked how to call, Yang Tian said two words.

"Voice!"

the moment. Let shadow and Arctic King prepare a voice chat room.

At 2:30, the voice chat room was completed. It was completely connected to the voice chat room by applying the voice mode of TT call tool.

Yang Tian used TT tools to order Beiji and others, "now prepare for the attack. Be careful and arrange the real things properly! This time it's extremely dangerous! If anyone wants to quit, leave now!"

The attack on the Pentagon is extremely dangerous. The Pentagon, the symbol of the United States, can be imagined for defense. In addition, there are n many command systems and the command systems of the US Navy, road and air forces.

It is no exaggeration to say that if you are not careful, evil ten will be removed from the hacker community.

"Attack!" The words of the Arctic king are somewhat generous.

"It's time!" Said the shadow, his voice trembling.

"Hee! Little girl, life is a person of evil ten. Death is a ghost of evil ten!" The voice of milk tea is still so attractive and the tone is still so light.

"I said that since joining the evil ten, all my belong to the evil ten!" Egg tower is fluent in English. I can't tell which country is in Europe and America.

Chat room.

[Firefox online!]

[Tianya online!]

[Wanqing online!]

During the discussion, Yang Tian learned that the three were the heads of the Firefox group, so he contacted the three by one line. Let the other three members of the Firefox group control.

[nest online!]

ok。 All in place. Just now, Yang Tian opened the voice change software. He doesn't need to change the sound quality in the organization because mutual trust is needed in the organization. However, this time is different. Although he cooperates with Firefox, he is not his own person after all.

"Attack! All members of the Firefox regiment are in place!" A neutral sound came from the stereo, which couldn't tell whether it was male or female.

Yang Tian knew that the other party had also changed the sound quality. He squinted and saw that Firefox was talking.

"Wait a minute!" Yang Tian's voice was a little rough, like a strong man shouting.

At present, Yang Tian pulled out all the tools, analysis tools, speed scanner, attack input device, connector and other seven combat tools, arranged in turn, and said, "wind roll, sent from the access point, and sent it to the Arctic king and others at the same time."

“ok!” The wind roll said, passing on the last access point outside the Pentagon to others.

Yang Tian received it and told Firefox and others at the same time, "this is the access point. After you enter, it is the innermost layer outside the Pentagon. After you access, you are in a static state and wait for my command!"

An access point is a small alternative back door. In fact, it is not a back door, because it can only access the periphery of the target, and the access point cannot be placed in the kernel.

Shua! Yang Tian and others are all connected.

At this moment, they access the innermost layer outside the target server through the access point, which is close to the target port.

"All members of the Firefox group have accessed!" Firefox reports on the stereo.

In the virtual battlefield, members of evil ten such as Yang Tian destroy the origin point respectively. After other people such as Arctic king, shadow and wind roll access, they destroy the data flow immediately to cover their origin point.

The purpose of using data flow to cover their origin point is not to let the Firefox group know how many people are here.

Only Yang Tian didn't use data flow coverage, and his origin point ranked first. Because the two sides are relatively close, Yang Tian can see the situation of Firefox group from the analysis tools.

Good guy, Yang Tian doesn't know how many members of the Firefox group are. In the virtual battlefield, some of the proposed data streams of the Firefox regiment cover the source point, but some are the same as themselves and are not hidden.

There are three origin points in the front of the Firefox group. Yang Tian speculates that it may be the three principals of Firefox, Tianya and Wanqing.

"Wind roll, milk tea and egg tower, you three immediately analyze the port of the target to find out the weak port!"

Yang Tian said, and then connected the wheat to the chat room. "Firefox, you immediately analyze the target port and find out the weak port!"

"No problem!" Firefox responded.

Now, evil 10 and Firefox are on the periphery of the Pentagon network platform, that is, at the port. If you want to rush into the target kernel, there is only one way to enter from the port.

However. There are two ways to enter the port: one is to invade, the other is to bomb directly and tear up the port.

Intrusion can be silent. The secret intrudes into the other party's kernel and the other party can't find it.

If bombed, the other party will find out immediately.

One minute, two minutes. Ten minutes later.

The words of the wind roll came, "the target 7630 port is relatively weak. After analyzing all ports of the other party, the density n is large, and there is no way to start. Only 7630 port is relatively weak!"

Light a cigarette and the battle is about to begin.

"Firefox, report the situation!"

Hold the cigarette in the corner of your mouth. Yang Tian asked.

"The target has no weak port, only 7630..." the analysis result of Firefox group is the same as that of its own side.

Yang Tian interrupted and immediately ordered Firefox, "lock 7630 immediately, so that your organization's strongest invasion expert can lock the invasion!"

Firefox answered.

Yang Tian said to Mai Shen, "wind roll, egg tower and milk tea! Lock 7630, and you three will invade at first!"

The voice falls, and the evil ten and Firefox regiment move to the target port 7630.

In the virtual battlefield. The Firefox group first implemented.

Suddenly. One intrusion data stream rushed out of the data set of the Firefox group, and then another. Two, instant, just a moment, there are n intrusion data streams in the data set of Firefox group.

The n-channel intrusion data stream suddenly stops at port 7630. At this time, the n-channel data stream converges. A few seconds later, the n-channel data stream converges, Shua! Rushed to port 7630.

to hit! The n-channel intrusion data forms a horizontal and thick data stream and hits port 7630. At the same time, the data stream begins to disperse and invade port 7630. The n-channel data stream is densely wrapped around port 7630.

"Good guy, group intrusion mode!" Yang Tian whispered. It was the first time he saw the so-called group invasion mode.

The Firefox regiment has been implemented, and the wind roll, milk tea and egg tower of evil ten rushed immediately.

In the virtual battlefield, an oval spike ball rushes to 7630 at a very fast speed. The spike ball is completely composed of intrusion data streams. N + multiple intrusion data streams form a group, which looks really shocking.

Pop! The thorn ball penetrates into the 7630 and then disperses, looking for the loophole of 7630 like sea water.

After that, the snakes of milk tea danced disorderly, and the straight-line invasion of egg tower rushed to 7630 one by one

Wait, it takes a process! Invasion, but also have to wait.

At this moment, the wind in the middle, staring at the console.

What a wind roll, what a heart with three uses.

In this way, time passed in waiting. Yang Tiandi cigarette after cigarette, staring at the analysis tools for fear of other situations.

At 3:42 PM, the voice of Firefox came.

"We have invaded n times, and we can't invade at all!"

Suddenly, the words of milk tea and egg tower also came one after another. They also failed. Only the wind roll!

At the moment, Yang stared at the notebook more quickly with his hands in the middle.

The clattering keyboard is beating faster and faster, PA! Disappear, the sound of keyboard beating disappears.

"I successfully invaded!"

Windroll, windroll successfully invaded!

Yang Tian's eyes narrowed when he heard the speech, and then loosened. He was about to ask. The words of the wind roll came again.

"The situation is wrong!"

"What?" Yang Tianshen asked.

"I have invaded, and the prepared intrusion command and vulnerability code can't pass through the target port 7630 at all! It seems that a prohibition program has been installed!"

Can't pass? Yang Tian was puzzled and closed his eyes.

If the wind volume intrusion is successful, he can draw up the intrusion command and vulnerability code according to the vulnerability of the port, and then transmit it to himself and others. You and others lock port 7630, then execute the intrusion command, and then the vulnerability code, so that you can invade all.

However, the wind volume said that the command and vulnerability code could not pass 7630.

This really makes people feel puzzled. For general servers, as long as one person analyzes port vulnerabilities and draws up corresponding intrusion commands and vulnerability codes, others can use these commands and codes to invade.

"Still can't. 7630 must have installed a prohibition program, and the command and vulnerability code can't pass at all!"

shit! Yang Tian narrowed his eyes more tightly. When he pulled down the wheat, "Arctic king, shadow, prepare to attack!"

Then he gave orders to Firefox. "Firefox, attack now, tear up 7630 with the fastest speed, remember. Be fast!"

Bombing the port, the other party will find out, but this is not the way to drag on. Finally, Yang Tian decided to solve it with violence.

The attack order fell, and the evil ten and Firefox regiment bombed 7630 directly!

Yang Tian's big cycle shock wave, the five consecutive shots of the Arctic king and the mixed yuan of the shadow. Group impact on the other side of the Firefox group.

A round of attack, Shua! Hit 7630!

Bomb again! Pop! 7630 still.

The Firefox group launched a group attack, and the horizontal attack data stream hit port 7630 hard. At present, Yang Tian asked the Arctic king and shadow to embed their respective attacks into their own annular shock wave.

Boom! The group attack of Firefox group is not over yet. The embedded attack of Yang Tian, Arctic king and shadow has impacted.

Shua! Shua! Shua!

After a round of attack, others need time to redraft the data flow. However, Yang Tian has the ability to use the legendary large cycle of continuous cycle.

One by one, the annular shock wave is not imposing or fierce.

The whole process is like a dragon after a dragon. The scene was appalling. Even other members of the Firefox group were deeply shocked and forgot to attack.

The keyboard beats very fast, however. But there was a whisper in the sound, "continuous cycle, continuous cycle!"

Due to the low voice, I don't know which member of Firefox group I am.

At 4:30 pm, Yang Tian looked ferocious and pressed the Enter key. PA! 7630 was bombed. At the same time, n sounds came from the stereo.

"Bad! Found!" Arctic king!

"The target has found us!"

A neutral voice, "surround the nest, the other party finds us!"

"There's a situation!"

"Urgent!

The last two may be the end of the earth and Wanqing of Firefox group. The voice is the same. They are neutral and can't tell whether they are male or female.

Then, while Yang Tian tore the target 7630 apart, the other party finally found it!

War!

Good guy, the other party found himself waiting for someone. It's only a matter of time. Yang Tian's mouth was horizontal, and then hissed, "Arctic king, shadow, milk tea! Quickly enter the core of the target!"

After shouting, immediately connect the microphone to the chat room, "Firefox, let your members quickly access! Follow my attack! Come on!"

Shua! After hissing, Yang Tianji started a circular shock wave, followed by a series of orders and bombed the broken port again!

At the same time, the Arctic king, shadow and other four people successfully connected along the annular shock wave.

From the analysis tools, Yang Tian found that the peripheral N multiple data streams were obviously not on the side of the Firefox group, let alone on his own side. He thought and shouted again, "Firefox, hurry up! There's not much time!"

Yang Tian constantly destroys the annular shock wave to bomb 7630! The 7630 port is also recovering at an incredible speed, which is expected by Yang Tian.

As long as the other party finds something, it will immediately analyze it, so as to analyze 7630, and they will have professionals to repair and restore.

In the big cycle of continuous circulation, the annular shock wave kept bombing. At this time, most members of the Firefox regiment had entered.

In the virtual battlefield, N data streams come from all directions, including attack data stream and intrusion data stream.

good heavens! It seems that the US government has many experts!

At this time, in the virtual battlefield, several original points that have not yet entered have disappeared. Yang Tianzheng wants to understand, and the sound of Firefox comes from the sound.

"Surround the nest and help me break the line of members who haven't entered yet!!"

At present, the intrusion data flow of the U.S. government has not been locked. At this moment, the only way is to disconnect! If you break the line suddenly like this, you may leave a trace to the other party. You can break the line safely only by breaking away from the other party's lock.

Therefore, Firefox asked Yang Tian to intercept the incoming intrusion data stream.