399: Behind the scenes, the free country emerges!

The so-called “flood attack” refers to a huge information flow attack on the same target within the same period of time.

If it is a single computer, there is basically no way to face such an attack.

Because the computer itself automatically receives all external information, once the amount of information exceeds the processing capacity of the computer, the computer itself will crash.

As for the website, it is the same as the computer, but because the website has a server, it has a much greater bearing capacity.

But it also has its own upper limit, once this upper limit is exceeded, the website will also collapse.

Now, young people control all the computers they have captured-inside hackers, these computers are generally called “broilers” or “zombie machines.”

The young man did not hesitate to manipulate the broiler to attack the Newtown Times website, sending instructions continuously, and after a while, the processing speed of the website became slow.

After a while, the slowness of the website became more obvious. Su Ming had already noticed this. He knew that this was a hacker attacking the website!

At the same time, Rocky of the Free State Network Security Center also discovered this. The huge data flow on the network was all monitored by the supercomputer here.

So he immediately found McPeggy, who frowned and stared at the computer screen tightly, without speaking.

Rocky was a little nervous at the moment. He only heard him say: “Professor, we should act now? The Newtown Times is not easy to mess with.”

“If we allow hackers to attack their website, I’m afraid they will report on it after the fact. You also know how ugly what this group of journalists said…

Mike still frowned when he heard this, and after a while, he ordered.

“Notify the technical team and start the action! Let them be divided into two groups, one group is responsible for intercepting the data stream, the other group is responsible for tracking the hacker’s ip address, this hacker’s attack method is a bit like a shadow, how did this guy come out again?”



As the head of the Free State Network Security Center, Mike is familiar with the attack methods of some well-known hackers.

The “shadow” he just mentioned was the hacker code name of the young man. Because this person prefers to write Trojan horse programs, most people call him “shadow”.

Mike gave the order, and Rocky immediately issued the order through the Internet. For a while, the computer experts lurking across the country began to take action.

There are also hackers, but they have been recruited by the state, and now they have joined the Free State Cyber ​​Security Center.Although some people will do some illegal activities, as long as they are within a certain range, the government is Acquiesced.

When these people came to the attack site through the Internet, they found that the situation here was not very serious. After a while, someone posted a message through the contact tool: “Most of this guy’s attacks have been resolved, and they are steadily failing. , It’s really weird.”


Another person replied: “Yes, did the Newtown Times hire any master? Depending on the situation, it won’t take long for the attacker to fail.

The third person sent a message and said: “Let’s take action. Since this guy can’t hold it anymore, let’s beat down the dog! Remember, the most important thing is to track his ip address.”

The master of the Free State Cyber ​​Security Center started to act, but the shadow sitting in the office on the 32nd floor of the Empire State Building complained constantly. He miscalculated, completely miscalculated!

Although the situation was very good when the attack first started, even the Newtown Times website was about to be taken down by him.

But at this moment, Shadow suddenly found that many of his chickens had become sluggish, within two minutes.

Many broilers began to collapse, and as the attack continued, more and more broilers were collapsing.

Shadow wanted to retreat in a rush, but what made him feel desperate was that the only broilers in his hand unexpectedly lost control!

Shadow was dumbfounded, all this came too fast, it was almost too late for him to make the right response, when everything was over, he already understood,

As a hacker, he has lost the last guarantee. It will not take long before his true identity will be exposed to the opponent’s eyes.

The facts are exactly the same as the shadow expected. His ip address has been tracked by Su Ming. How did Su Ming do this?

As early as when the shadow launched the attack, Su Ming was aware of it. After thinking about it, Su Ming made a decision-to write a program to counter the attack!

Su Ming does not have any broilers himself. Faced with such a huge data stream, with the computer he owns, it is basically a cannon fodder. However, Su Ming soon thought of a way: pass the other party’s attack to the other party through a deception program. Go up by yourself!

This method seemed to Su Ming to be very feasible, so he started it immediately, and he completed the procedure in only ten minutes.

At this time, under the attack of the shadow, the Newtown Times website was on the brink of collapse at 600. Su Ming did not dare to neglect. He embedded the written program into the web page of the website at the fastest speed, and then waited. The other party will perish on its own.

Flood attack-that is, data stream attack, it forms an attack by sending a huge information stream to the target, and the shadow controls the broiler to continuously issue access requests to the website.

After the website receives the information, there is a process of processing the information. If the number of such access requests is too large, it will affect the processing speed of the website server, which will cause the website to delay or even crash!

To visit a certain website, you must first enter the interface of this website, and then click on a certain web interface to view the content you are interested in.

The “access application” here refers to the data flow caused by clicking on the webpage. This data flow needs to be converted by the website server, and then the information is transmitted back to the website, so that the webpage you clicked on will appear.

Su Ming wrote a counter-program based on this principle. The shadow-controlled broiler kept clicking on any existing web interface on the website.

A broiler has hundreds of clicks. If a computer acts in this way, it will not have any effect. What if it is a thousand, 10,000, or even 100,000?

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like