Chapter 229 Octopus's Big Hand (Thanks to Baiyin's Godfather Frozen)
[Lille: Bryce, I’m coming in. 】
[Bryce: Did you come in? Your access. Fuck you. 】
[Lille: This is a legal donation from citizens. 】
[Bryce: Damn it, are you responsible for what happened in the Kabuki District? I asked you to investigate secretly, and you just made the headlines? ! 】
[Lear: The greater the movement in the real world, the more cover can be provided for network activities. The more secretive the cyberspace investigation is, the less movement there will be. 】
[Lille: So the greater the movement, the smaller the movement. 】
[Bryce: Brainless! 】
[Bryce: Forget it, let’s report the progress. 】
[Lille: The Tiger Claw Gang has made a big impact. We rescued a stall owner. He supplied illegal Mewtwo equipment to the Tiger Claw Gang. He is familiar with the black market in the market area. I will send you a document about the situation. 】
[Bryce: This is not bad. It is an unexpected surprise. Hacking activities are quite rampant in that place. It may be able to help us target some hackers. 】
[Lille: What about the commission? 】
[Bryce: There are a lot of hackers active in the Kabuki District. I have to go back and ask my colleagues to check the situation. Don’t worry, you will be indispensable in the end. 】
[Liel: OK, the second thing is that we also caught a guy from the Tiger Claw Gang. He confessed about the human trafficking situation of the Tiger Claw Gang, but he kept silent about the person behind the scenes. 】
[Lil: It was done by a guy named Jae Hyun, but he doesn’t know more about it. 】
[Bryce: Damn, these bastards are really beasts. What are you going to do? 】
[Lille: Of course, continue to investigate. 】
[Bryce: It's nice to see these beasts killed, but don't forget that our goal is to investigate the anomalies in Genting. 】
[Lille: I'm sure this matter will be related to Genting. This industry chain also involves the top brass of the NCPD. Someone came to ask for someone just now. 】
[Bryce: I still don’t see the connection with Genting. Did you hand your people over to them? 】
[Lille: No, but isn’t there someone covering Genting? Maybe together. 】
[Bryce: It’s possible. 】
[Bryce: Look, I'd love to see someone doing something heroic, but I'd rather you focus on our goals, which are more important. 】
[Liel: Listen, now I have something I need your help with: I want to hack into the NCPD, steal experimental equipment, sneak into the vegetative man's head, and check things. 】
[Bryce:? 】
[Bryce: Did you not listen to me? 】
[Lille: There is no time to explain. Once they finish processing the clues, we will have no excuse to rush to Genting. 】
[Lille: Just say whether you want to help or not. 】
[Bryce: You can do it yourself. I have NCPD’s data barrier and ICE architecture plans here. 】
[Liel: Yes, trust me, I will definitely complete the task for you. 】
[File received. 】
[Bryce: Remember your mission. 】
In cyberspace, Lear happened to receive news from River: They had arrived at the NCPD.
The network coordinates were transformed, and a towering digital wall appeared in front of Lille.
Now he wants to break through NCPD's data barrier.
River and Anna walked into the NCPD. There were very few people in the headquarters, and most of them were on duty outside.
Especially since another major incident occurred in the Kabuki District, a lot of police personnel had to be allocated.
The two entered the police station as if nothing had happened, and then walked all the way through the corridor towards the evidence department.
[River: Lil, we are in a situation. Which interface do you need? 】
[Liel: Wait a minute, let me take a look at the engineering instructions. 】
[River:? 】
[River: Did I say that we need to scan for open available access points first? This was the case when we cooperated with the Network Security Section before. 】
[Liel: It’s true. I’ve received your prosthetic eye. Let’s start scanning. 】
River swallowed and began to doubt Leal's professionalism.
He glanced at all the electronic equipment in the bureau.
【>Scanning. Open ports found: 80, 22, 443, 3306, 3389】
[Lille: Can it be connected to the CCTV system? I need to take a look at the network wiring arrangement. 】
[Anna: I’ll do it. 】
【>Port selection: 32105, 22, 2939, 2】
【>Instruction received. 】
Ports are like coordinates in a maze. Using these ports as coordinates, Lille's position in cyberspace changes repeatedly.
The path of change happened to cross the barrier built by ICE and all the way to the inside of the barrier.
Barriers are changing in front of Lille's eyes, and they may even pop up like traps——
This scene may seem soft, but in fact, if a hacker touches these walls when trying to bypass data barriers, he will be caught up by ICE, and the entire fortress will be turned into a weapon, flooding into the hacker's brain, disrupting computing equipment, Endlessly improve computing speed.
This is caused by the underlying design of the cyberspace access protocol. Hackers can either find equipment with equal computing power for a head-on confrontation, or they can timidly risk the possibility of encountering ICE and quietly bypass these walls.
Of course, if you know the construction logic and add a little trial and error, it is completely feasible to bypass these deadly protective devices.
In cyberspace, Lear passed through the outer layer of the data barrier and reached the second layer.
It was still far away from the Evidence Branch database—at least Leal couldn't scan what he wanted from this layer of data.
NCPD also uses multiple subnet settings, which require further physical hacking.
The data barriers in cyberspace are very different from the buildings in the real world. Lear compared a large amount of data and found the next possible useful port and the area where it exists.
[Lear: Workstation 3. ]
[River: That is the area within the authority of the network security engineer. ]
[Lear: The camera will not record you, just avoid people. ]
[River: I'll do it. ]
River put on his police hat and swaggered across the yellow line with "Network Security Authority Area" written on it.
The camera scanned River's face without making any sound.
River's heart beat fast, but he didn't show any emotion at all.
All the way to the door of workstation 3.
[Lear: There is a hacker inside, and there may be accomplices, so be careful. ]
[River: That's not called an accomplice, but a colleague. ]
River gently pushed open the door, and a hacker was lying in the access warehouse, and another hacker was sitting at the table with his back to the door, eating.
It can be clearly seen that the hacker's hands are shaking: this is an occupational disease caused by long-term network security work, and nerves will have more or less problems.
River sighed in his heart and walked up quietly.
[Lille: Use personal link if conditions permit. ]
[River: Are you sure you can knock him down in an instant? The hackers of NCPD are not half-baked, and the security systems are all imported from the network monitoring. ]
[Lille: I'm sure. ]
River gritted his teeth, pulled out the personal link from his palm, and inserted it into the interface behind the hacker's head.
The hacker reacted immediately-perhaps less than 100 milliseconds, he judged that he was inserted.
But Lille completed the process of bypassing ICE and launching an attack within 50 milliseconds after he reacted.
[>Port linking. Tool introduction successful]
So the hacker fell asleep on the table with a bang.
River inserted the personal link into the back of the hacker's head in the access warehouse.
The two high-level permissions gave Lille a lot of room for operation-now he replaced the hackers lying on the table and lying in the network warehouse.
In addition, there are two hackers in the network domain - NCPD seems to like iterating.
But a good hacker can beat dozens of hackers.
In cyberspace, Lille stepped into the core database of NCPD.
This is a cyber image like a treasure house, and important data is sealed in a small data fortress with the same appearance.
[River: Don't think about those important files. ]
[Lille: Got it. ]
[> Connecting. Login successful, get high-level permissions]
[> Capturing. Data includes: Evidence Department data, NCPD list, NCPD work log]
[> Permission writing]
[> Cleaning. Operation completed, digital tracks completely cleared]
The NCPD core database has set access time limits for everyone to ensure that no one copies information.
Unfortunately, Lille's computing power exceeds that of normal people by a lot, and he has two accounts.
When Sian Westin started, the speed of cyberspace slowed down significantly, so slow that it was a bit unbelievable. One second in cyberspace was extended to five seconds for Lille.
In normal reading, the operator will have the relevant file number and complete the reading quickly.
But Lille wants to crack as many databases as possible and then copy the data.
At this moment, the little octopus suddenly jumped out, looked at Lille excitedly at the dazzling array of databases, and pointed the octopus arm towards the database.
[xe: Can I grab it? ]
Lille thought about it.
This is a risky move.
AI is not necessarily stronger than humans in cyberspace, especially in designated work categories.
But. He really needs to understand his symbiotic AI.
[Lille: Try it. ]
With Lille's consent, the little octopus left his body and attached to the database.
The huge computing power was transferred from Lille's body to the little octopus.
Then Lille saw that the octopus suddenly began to swell, and the tentacles on its body became longer and longer, larger and larger, and the suction cups became more and more delicate--
Beyond Lille's imagination!
Those safes storing data are more like the entire cabinets being uprooted!
The system pop-up box that had not been popped up for a long time appeared in front of Lille:
[Your symbiotic AI has absorbed enough computing power and reached the computing power limit for the first time. ]
[AI tendency construction: data capture]
[Adapt to any type of data for rapid identification and replication, AI will capture data according to the terms you set, and generate raw data streams to fill the core code. ]
[AI with this feature will have advantages in data processing, decoding and deciphering. ]
The cyberspace represented by the entire database thought that this giant octopus was trembling--
The server could not withstand such exaggerated data exchange!
Lille hurriedly shouted:
[Lille: Capture documents related to Mewtwo! Don't capture everything! ]