Chapter 818: Invading the host
Judging from the area graph of the state, Florida, located in the southeastern United States, has a very special appearance, as if a part of a man was inserted into the territory of the United States, not high and upward, but drooping in shrinkage.
The University of South Florida, located on the Tampa campus, is the largest educational institution in Florida. On the top floor of one of the buildings is the university's main computer room, inside which several ibm S/370 computers are working.
The computer room is relatively clean. In this era, computers are very sacred things. Although you don’t need to take a shower and change clothes, you also need to wear a white coat and foot covers when entering and leaving the computer room.
This is a cabinet-type large computer, which was just installed in the early 1980s and belongs to the highest-end computer in this university. Thinking back to the United States, the main force used by the Apollo Moon Landing Project was the predecessor of this computer, the s/360 computer.
The air conditioning system is blowing cold air, and there is still some heat in the computer room. The heat emitted from the cabinet is particularly high this summer.
"The project assigned to us by the tutor is really troublesome. It is said that it will take three or five days to count on this kind of computer in our college." A college student who was guarding the computer said that the program was written and applied. After half a month, it was approved. The passion at the beginning had passed. Now, I have to stay in front of such computers for a few days, and it is a bit of a headache to think about it.
"Yes, that's right, it's a world that will take a few days anyway. Why not, let's go out and play basketball!" said another black student.
The two of them had the same look in their eyes, guarding this cold computer room. It was a waste of time. It would be better to hurry up and go out to do activities. When the computer calculates the results, they have to analyze and find loopholes in the program. It is very troublesome.
The glass door of the computer room was closed. In the huge computer room, except for a few mainframes that were still running faithfully, there was no special thing.
A small seven-inch monitor is beating with strings of data.
Suddenly, a line of strange letters appeared on the monitor, and the letters kept flashing, as if they were hinting something.
Soon, the letters were pushed to the top by the data that appeared below and disappeared.
In a common community in Los Angeles, a man said the word "fuck!" in disappointment.
This is a community that can access the network, in Los Angeles. The civilian Arpacom network is gradually being promoted. Through this network, home computers are not only connected to enterprises and universities, but also to government departments. Of course, these computers will have passwords in the gates of the territory.
The man rented a house in this community two days ago. He brought nothing except a suitcase, just like a young man who came to Los Angeles to make a living.
But no one knew that when he entered here, he opened the suitcase and revealed something that could be flipped out with a screen and a keyboard.
That thing is called a laptop computer.
This man is named Kevin Mitnik.
It was so dangerous just now. Kevin didn't expect that he just invaded an ordinary university's main computer because, according to his scanning, the computing speed of that computer was relatively faster, and it seemed that the security was very poor.
So, after two hours, he successfully invaded the computer. However, when he implanted his own code program, the computer seemed to have a repulsive reaction. The confidence he fed back made Kevin know that he might have been a failed invasion.
Fortunately, Kevin immediately typing on the keyboard quickly, opening another port of the other party, and finally successfully implanting his own code.
Now, that computer can be mastered by yourself and used to attack the other party.
In this way, even if someone discovers it, they only know that it was done by the computer and it has nothing to do with them. This kind of computer has a nice name in later generations, called Broiler.
Of course, even Kevin didn't know that the broiler he controlled was a large computer. With the help of that computer, it would be very fast to crack the Pentagon's password... It might be half a month or half an hour. Brutal cracking requires luck, but fortunately, Kevin's luck has always been very good.
Kevin was using his computer to hack into the broiler, and then, letting the machine start working for himself and test the Pentagon's password as soon as possible.
Then, Kevin tried to control several other computers and was ready to start invading the CIA.
As an ideal and ambition hacker, conquering the CIA and the Pentagon computer systems, which are known as the iron wall, is the most difficult challenge since Kevin debuted.
In contrast, the FBI's computer system is very easy to overcome. While waiting, Kevin recalled that after entering the FBI system with ease, he found a very important case, which was to investigate a hacker. However, when he went in, Kevin smiled. He saw that he was taken seriously by the FBI and became the number one hacker.
Since he got there, Kevin was naturally not polite. He completely deleted all the information he had from it, and then turned all the identities of his agents who investigated him into fugitives.
If I go in this time, if President Reagan’s information is changed to a rapist, I wonder what will happen? Kevin said in his mind.
"Dong, dundong." Suddenly, a knock on the door sounded.
Kevin suddenly became nervous, and he quickly unplugged the telephone cord on his modem, closed the computer, put it in his briefcase, and placed it on the table.
Kevin calmly opened the door and saw a young man in a half-sleeved red uniform and a gray hat with a Walkman headphones hanging in his ears.
Seeing Kevin open the door, he said, "Hello, the two burgers and fried chicken you just ordered."
It turned out to be a KFC delivery person, but he didn't order the takeaway himself? Kevin replied very depressedly: "You've gone wrong."
“Isn’t this 503?”
"This is 403." Kevin finished the sentence with great displeasure and closed the door.
The face that was smiling just now was stunned. He took off his headphones, looked carefully at the door number, and walked upstairs.
After walking, he reached the sixth floor. Then, he pulled the line next to his headphones and said, "The target is confirmed, it is indeed Kevin."
"Organize all of us and protect him from safety." Bill replied in a car two kilometers away.
Kevin was very bold and came here alone, but Bill absolutely refused. He had to protect Kevin's safety, but he could not disturb this genius, so he used most of Iraq's power in the United States to carry out this mission.
Kevin's invasion must succeed and must not fail.
Kevin closed the door and turned on his computer again.
"Our computer seems to have some problems just now." At this time, the two people who had already finished playing the ball returned to the computer room and saw the data calculated on the computer. They only performed a little smaller than when they left. Could it be that the main computer crashed?
"Maybe there is something wrong with our programming, so let's wait a little longer, maybe it's better to wait until tomorrow." Another person said. If it's a program problem, then it's definitely the process of endless bug fixing. It's better to make do with it first. Both of them reached a consensus.
"It's time for us to have supper." said the black brother, who was very happy just now and was hungry.
The two of them left the computer room again.
Kevin turned on the computer and connected it again.
After connecting to the controlled computer again, Kevin suddenly became excited. He was so lucky that the Pentagon password had already been tried out with the help of the large computer. After three hours, he had tried it out.
Of course, this has something to do with Kevin's careful plan in advance. Although it is also a brute-force cracking, Kevin did not let it test all the combinations of letters and numbers at will. In this way, a password of a sufficient length will cause all computers to be added to everything and crash.
Kevin has prepared a tentative rule in advance to compile these important information into a codebook for the names of various continents of the United States, the names of the main leaders of previous governments, the names of all senior officials of the current government and their families, and even national swearing, etc.
Since you have successfully entered, the next thing is naturally to enter it first and browse it. There are things you are interested in. As for the information in the Middle East, you can copy some of them depending on the situation.
Although he tested the peripheral password, after entering the other party's system, Kevin still needed to use various means to finally break into the other party's closely protected large database and find information from it.
Kevin's fingers were jumping on the keyboard. Since he had cracked the most difficult peripheral password and entered the internal, this mainstream database model today cannot help but trouble himself.
Kevin was very excited at this time.
New Jersey.
"We need to go into the Pentagon computer to show that our combination is capable enough to match Kevin's," said a 16-year-old boy.
"Yes, Kevin had already entered the North American air protection command system when he was fifteen years old. We should do better than him!" another teenager also said.
Hacker, this is an exciting career, New Jersey seven teenagers, Van Pyre, Red Bachata, Private Division, N-J-Hack, Shake, Vault and Beowowf (all of which are bilingual names), begin their legendary experience, and they are going to enter the Pentagon computer!
In later generations, it took them several months to successfully enter.
{Piaotianwen Thank you for your support, your support is our greatest motivation}
Chapter completed!