Chapter 286: Chapter 204: Does a Web Novel Writer Dare to Confront This Colossal Beast?
North Bear, HK Studio.
Angelina's face immediately broke into a delightful smile.
When she received Lin Chuan's two words "Take him down," her inner "combat gene" was instantly ignited.
Her adoration of Lin Chuan as an idol was not solely because of Lin Chuan's top-notch skills.
Pure technical worship would fade over time and not last long. Read exclusive chapters at m_v-l'e|m,p-y r
She had a deeper appreciation for Lin Chuan's extreme personal heroism.
She knew full well that Lin Chuan dared to face off against the entire North American hacker organization AW alone.
As a professional and top hacker, Angelina, like a war-loving and brave soldier longing to defeat the enemy and plant her flag in their barracks, aspired to excel.
Now, Lin Chuan was going to take on the Morgan Group head-on, and this extreme individual heroism made a warm flame in her heart grow stronger, burning brightly.
This was the ultimate glory for hackers!
Thus, Angelina asked formally yet somewhat adolescently, "Can I join you in battle?"
The next second, she received Lin Chuan's affirmative reply.
—Of course, you can.
Angelina clenched her little fists with joy and continued to send Lin Chuan messages, "Idol, do you need me to do anything?"
"Just deduct 6 points." Lin Chuan chuckled.
"Huh?"
Angelina was momentarily taken aback.
"Haha, just kidding. Here's the plan, you'll be in charge of helping me recover the server data of the overseas edition of Sailing Novel and block their attacks, while I go straight for their lair!" Lin Chuan laughed loudly as he delegated the task.
The overseas edition of Sailing Novel was connected to "Black Ice" performance and also concerned professional unlocking.
This one couldn't be taken lightly.
Skills such as 'fighting', 'hacker', 'firearms mastery', 'fraud', 'antique forgery', and 'crime scene processing' might come in handy any day!
Like now, faced with the colossal figure of the underworld—the Morgan Group—without some skills, one would be merely trampled upon.
Lin Chuan was no pushover!
When he had no cheats, he endured the harsh reality, now that he had cheats, he wouldn't let anyone step on him; otherwise, what's the point of having cheats?
Fight!
Immediately, Lin Chuan initiated his counterattack!
His hands rested on the keyboard, fingers tapping swiftly, the computer screen flipping through windows rapidly, displaying a sequence of complex codes.
This was the super firewall of the 720 Company.
He retrieved the attack codes of the Morgan Group from it, using them to trace back to the attackers' real IP.
This was an essential step.
Many ordinary hackers might launch multiple attacks on an IP just to realize they were hitting the adversary's relay servers, which not only didn't have any effect and wasted time, but also alerted the enemy unnecessarily.
A relay server is a controlled server in a multi-server domain, subordinate to the main server.
In other words, it's not the actual core server terminal.
The real control over the server lies in the main server.
Lin Chuan needed to verify once more whether the IP address obtained not long ago belonged to a relay server or the main server.
As a hacker, he had a habit when initiating attacks.
—Strike accurately!
That might be the lingering effect of being an assassin.
It also meant he would meticulously prepare for the strike, and it was the same now.
Once he struck, he would not give the opponent a chance to breathe!
The Morgan Group hackers used multiple hops to attack 'International Forum-Underworld', which wasn't a difficult feat for Lin Chuan to trace back.
Very soon, in just seven or eight minutes, Lin Chuan tracked down their actual main server IP address.
"Let's see if your main server has any firewall vulnerabilities," Lin Chuan's lips curled up, revealing a faint smile.
However, his smile had a touch of chilliness to it.
There are many ways to breach a server.
Such as 'brute force password cracking', 'phishing', 'man-in-the-middle attacks', 'Trojan viruses', 'social engineering', etc.
Lin Chuan used 'man-in-the-middle attacks' and 'system vulnerability exploitation'.
To put it simply, it involved intercepting the attacker's transmitted data, forging network certificates to sniff the target server's network connection, and stealing information from the target server to identify systemic weaknesses.
Subsequently, he could then use these system vulnerabilities to write corresponding attack codes, execute remote commands, escalate privileges, and alter data.
Before long.
Lin Chuan, using a 'man-in-the-middle attack', obtained the target server's information and analyzed the system vulnerability.
At that moment, Lin Chuan's fingers danced swiftly on the keyboard, like a beautiful piano piece playing at his fingertips, resonating through the virtual online world.
On his screen, strings of codes targeting the server's vulnerabilities emerged rapidly, forming a series of attack programs!
After ten minutes, the code was ready!
Retaliation!
...
INTERPOL, Asian Affairs Bureau.
It was late at night, but a detective in his mid-twenties, with a neatly cut face, was still at his post, investigating the case on his desk.
This detective was named Qin Yun, with a cropped haircut and a clean-cut visage.
He was originally part of INTERPOL's domestic southern liaison agency, responsible for liaison work within the INTERPOL framework, coordinating foreign criminal cases in the southern region, collecting criminal intelligence, and organizing international police exchange cooperation tasks.
Recently.
He and several colleagues had been transferred to the Asian Affairs Bureau to investigate an international drug trafficking case involving 'addictive drugs' in Southeast Asia.