Chapter 121 Start
Chapter 121
Lin Mu logged into a domestic network hard drive and downloaded a tool in it. This tool is used to scan out all online machines in the local area network. Since Lin Mu is now using a wired network, and it is located in the villa where Wang Huafeng lives, it can be concluded that Wang Huafeng should not connect more network cables, but rather share a route.
If the room where Lin Mu lives is really equipped with a pinhole camera, the captured videos will definitely be transmitted to a certain computer for viewing. This is the villa where Wang Huafeng lives, and even if there is any video, it is impossible to watch for others. Who has the qualification to watch what happened in this big villa? Only Wang Huafeng, the head of the Wang family, has this qualification.
So what Lin Mu has to do now is to check whether there are such videos in Wang Huafeng's computer. If not, then it doesn't matter if everything is connected to the Great Wall semi-intelligent system in his home by remote control. Anyway, no one has seen it.
If so, Lin Mu must find a way to get rid of surveillance, otherwise he would not be able to use the Great Wall semi-intelligent system to invade the US District 51 under surveillance. This sets a complex password, and even the extension was changed to mkv video format compressed file package, which was quickly downloaded to the local area. Then Lin Mu changed the extension to rar and decompressed the scanning tool to the desktop.
This is the technique used by Lin Mu. He did this in some of the more important things stored in the network hard drive. After all, this tool was written by him in the past to facilitate intrusion. Although the function is very simple, it is incomparable to the universal intruder of Little Panda, but its advantage is that it can run in the Wind environment. Once it is separated from the Great Wall semi-intelligent system, Lin Mu can also use it to intrude.
After decompression, Lin Mu turned it on. After dozens of seconds, Lin Mu began to scan the computers online on the LAN after setting the settings. After a while, a total of six online computer icons, including the computers Lin Mu is currently using, appeared in the software interface, and the system versions used by these six computers are also displayed in the software one by one.
Unexpectedly, including Lin Mu's current system, all six hosts use attack codes for www.piaotian.comd8 system vulnerabilities. With these three vulnerabilities, Lin Mu's tool software can definitely kill all computers in the world with the Wind8 operating system installed. This is a great benefit for Lin Mu to own the Great Wall semi-intelligent system.
After more than forty minutes, Lin Mu breathed a sigh of relief. After his detailed search, no videos generated by surveillance were found in these computers. Including the one that was obviously Wang Huafeng, there was no such video. In other words, there was no surveillance device in this big villa. Lin Mu could use this computer to connect to the Great Wall semi-intelligent system at home.
In fact, Lin Mu was a little worried. There are indeed surveillance equipment in this villa, but they are all installed outside the villa. Moreover, the Wang family's subordinates are monitoring these places. If there is no special situation, the results of these surveillance will only be kept in the computer in the monitoring room outside the villa forever. Wang Huafeng does not allow any surveillance equipment to exist in this villa.
Since his behavior was not under surveillance, Lin Mu felt relieved. He took the time to call his home on the other side of the earth with the software and informed his parents about his situation. He was nagged by his parents for nearly twenty minutes, and it was not until he was about to end the call that Lin Mu asked his parents if he had kept him. When he learned that his actions were running uninterrupted twenty-four hours a day, Lin Mu hung up the call from the software with satisfaction.
Today's Internet phones have developed very maturely. Not only is the voice clearer than ordinary phones, but the fees are also much cheaper. Therefore, Lin Mu once recharged some money in a Chinese Internet phone software, so that if the mobile phone encounters an accident while going out, he can still rely on the computer to make calls. This previous move happened to come in handy. Who knows whether the phone in this room has a monitor? If so, did not Lin Mu hear everything he said clearly? Lin Mu had just arrived here for a day, and the mobile phone he carried with him was temporarily useless, so he used this more convenient and safe way to call his parents.
After looking at the time, it was already nine o'clock in the evening. I still remember that I had seen in a book that I had seen in a book that was one of the most sensitive moments of the day. Lin Mu was not sure whether what the book said was true or not. He only knew that he really felt that his thinking ability was much better than during the day, and it was also a good time to start invasion.
I touched a metal shell USB flash drive from the desk and inserted it into my laptop. Then Lin Mu entered the disk letter of the USB flash drive. This was the USB flash drive handed over to Lin Mu when Wang Huafeng left the underground laboratory today. It contained various information and vulnerabilities obtained by dozens of hackers when they invaded the US District 51 system. Of course, these data and vulnerabilities do not refer to the system data and vulnerabilities in Area 51, but the system data and vulnerabilities of US government computers that can be indirectly connected to Area 51.
After all, except for a small number of military systems directly connected to civilian networks in the world, most military systems will not be directly connected to civilian Internet. If you want to invade those hidden military systems, you must use some "special" springboards to achieve indirect invasion. For example, if a computer in the US government has sufficient permissions to connect to a computer in the military network, then hackers can invade this government and use it as a springboard to invade the military system.
Once the invasion is successful, the military computer, as a member of the huge military system, will definitely have the authority to connect to other military systems. Even if the other military systems are not connected to the network at this moment, as long as the invaded military computer is in the same LAN domain as the other military system, hackers will have a great opportunity to break through those important military systems in one fell swoop.
The information stored in this U disk is the crystallization of the group of hackers under Wang Huafeng over the past few days. It contains several U.S. government system information, including IP addresses, cracked account names and passwords, and a small number of obtained system vulnerabilities and dedicated injection tools. Although these things are not very useful for Lin Mu, who owns the little panda, Lin Mu still thinks it is better to read it. These information will be of some help to Lin Mu's invasion.
After spending more than ten minutes, Lin Mu read all these information one by one. In general, the group of hackers under Wang Huafeng are very powerful. The computer systems of seven municipal governments in the United States are quietly broken. Unfortunately, there are computers in these seven invaded systems that can be connected to the US-level network, but none of them can be connected to the most mysterious Area 51.
There was also a group of hackers under Wang Huafeng who almost invaded the computer system of the Pentagon in the United States, but unfortunately, the hackers' IPs were forcibly cut off less than ten minutes after the invasion was successful. Try again, the Pentagon in the United States had already taken some precautions and failed to successfully invade again. At this moment, Lin Mu already knew where he should start.
The Pentagon is the headquarters of the US Department of Defense, the highest military command in the United States. Since it is the headquarters, it means that the Pentagon's computer system can definitely be connected to any military system in the United States. As long as it is successfully invaded, it will be no problem to find the system network in Area 51.
However, it is probably difficult to invade such a computer system like a wall. According to what the commander of the US Cyber Army, Alexander, once said, the Pentagon network is spying up to six million times a day, with an average of 250,000 times per hour. This is the data from three years ago. If it is now, this number may be even more terrifying. However, in the face of so many hackers spying and attacks from all over the world, the Pentagon still stands. From this, it can be inferred that the Pentagon's computer system is not only extremely secure, but also the masters who are in charge are also extremely skilled.
However, all of this is much simpler for Lin Mu, who has the Great Wall semi-intelligent system. Because he has the nemesis of any network computer today, no matter the extremely powerful intrusion ability of the Little Panda. Relying on the numerous system vulnerability feature library contained in the Great Wall semi-intelligent system alone is enough for Lin Mu to break through any networked computer in the world alone. However, in terms of concealment, Lin Mu will definitely not be able to compare with the Little Panda if he does it himself.
The latter not only invades quietly, but any action in a remote computer is so natural. Even cleaning up the invasion traces can be achieved without realizing it. Unless the other party uses the same system as Lin Mu, there is only the invasion.
Chapter completed!