Readers are requested to note that the following behaviors are serious violations of laws and crimes, and our country has a complete set of criminal laws corresponding to them.
Places of interest like this usually have an introduction and welcome webpage. This is easy to find via search.
“Welcome to the Bal Monastery without Fruit Kut.”
Below is a bunch of introductions to the Baal Temple and instructions on things to note when visiting.
The domain name of a web page is directly the address of the web server. It's just that things like web pages are too simple and have little to do with the office.
Moreover, the website server is most likely hosted by someone else, so hacking it and replacing it with a middle finger picture is just for publicity.
Meng Fei selected the language as Taotie, and then started looking for "If you have any questions, please contact."
Usually "please contact" is followed by an email address. This address is more valuable than the homepage address.
The @ before the @ in the email address is the user name, and the @ after is the email server address.
After finding the address of the mail server, Meng Fei was not polite. He decisively cracked the code and hacked in to get the mail user list.
The mail user list is a communication book, which is a very important thing. Not only does it contain everyone's email address, but also everyone's name and position.
It means that the basic information of everyone in the entire unit is here.
Some headhunters recruit people and send emails across the entire company, relying on the mailing list. Of course, they didn't necessarily get it by hacking in, most likely with the help of an insider.
Meng Fei selected the email addresses of people whose positions were related to security, and then started writing scripts directly on the Taotie Man's notebook to send mass emails to these email addresses.
The content of the email is an extremely tempting advertisement for a Chiwu* love website. Not only are the pictures quite attractive, but they also come with a free short video.
He downloaded this directly from a website on Chiwu. After downloading it, he made a few modifications, inserted a Trojan horse and sent it out.
The office email system has minimum filtering rules for obvious website advertisements, which will directly filter them out and will not be sent to employees' mailboxes at all.
However, if the email system has been hacked by him, it is not difficult to suspend the filtering rules.
A minute later, a sentence popped up on the script.
"Remote connection achieved."
This was the result of someone among the security personnel in that office opening the email and clicking on the short video.
In the short video, there is a Trojan implanted by Meng Fei, which directly infects the operating system through the player vulnerability. Then establish a connection, take a screenshot, take over the input, and transfer.
Meng Fei pressed Enter in his mind, and the person's desktop was displayed. All Chiwuwen's desktops are still playing short videos.
Resisting the urge to appreciate art with the Chiwu boy, Meng Fei began to open hidden windows in the machine, bury backdoors, and scan the system to find an entrance to the security system.
This person seems to be an important maintenance personnel of the security system, so his authority is not low.
The system entrance is easy to find. Meng Fei can now use this machine as a springboard to control the entire security system of Baal Temple at any time.
The backdoor was buried deep in the system in the form of a rootkit. It is difficult for ordinary anti-virus software to scan and find it, let alone remove it.
When Meng Fei was finishing all this on the plane, a two-dimensional JK girl suddenly popped up on the computer of Kakui, a young man who was stationed at the Baal Temple branch of the Chiwu Ancient Culture Research Institute.
She has long flowing green hair, a delicate and cute loli face, and wears a cool white short-sleeved shirt and a dark blue checkered pleated skirt. Under the skirt is a pair of slender legs.
This is the image of his idol Akemi Tsukune. Of course Miss Touchyin is not only his idol, but also the wife of countless otakus in the world.
In Chiwu, where the two-dimensional culture is developed, Chuyin has served as the heroine in countless two-dimensional animations and film and television works. She is the dream lover of countless fans. Many otakus directly call her "Mingmei's wife".
For many Chiwu otakus, just having a bed sheet that touches the sound is enough to comfort them throughout their lives. Of course, there are many such otakus in Qingmang, Suanni, the entire Dongzhou and even the entire world.
Miss Touchyin pouted and looked at the screen with an unhappy look on her face. Then she looked at the young man's lewd expression and said rudely:
"Uncle, are you watching something bad again?"
It's a pity that this person wearing the name of Touching Akemi is an AI program developed by their research institute to monitor system security and the working conditions of their employees. This gave him an unpleasant feeling of ruining his idol.
In fact, the heroine of the CG video he was watching was Akemi Akemi.
As a system security maintainer, he knew very well not to click on videos in such emails. Unfortunately, there was nothing he could do. He was hit at the fatal point and felt extremely itchy.
Then again, who would hack his computer? To hack the security system of a dilapidated monument? To evade fares?
He quickly turned off the video that was playing and almost gave him a nosebleed, and then said:
"No way? I was just checking a suspicious video on a routine basis."
Although Touchyin will appear from time to time to supervise his work, it will not directly peek into his screen or email content. After all, Chiwu's privacy protection laws are still very strong.
"Someone just attacked the email system you maintain."
Touchyin reminded.
"Haha, how is that possible?"
Now it was Kakui's turn to sneer. When it comes to professionalism in system security, he feels that there is no way he can be inferior to an artificial intelligence program.
"Someone just sent more than fifty identical emails to the office you are responsible for within ten minutes. I guess it may be a mass phishing email."
"It's a pity that you guessed wrong."
Kakui pressed his temples to relieve his nervousness.
"I've already checked the email you mentioned. It's just an advertisement from a small website. I receive several emails like this every day at home."
This implicitly revealed that he liked the website, but he was not aware of it.
He also wanted to say that if you hadn't jumped out and interrupted, I would have "checked" the video and you from beginning to end.
"Shouldn't this kind of email be filtered by the email system?"
"Spam filtering rules are not one-size-fits-all."
Kakui decided to give this ignorant little loli a good education.
"Spam filtering systems are constantly improving, but spam is also evolving to find loopholes."
"I recommend a comprehensive analysis of the content of the email to see if there is hidden malicious code. In addition, I recommend a comprehensive scan of all servers and PCs on the intranet."
“It’s three o’clock in the afternoon, when there are the most tourists.
“We have tens of thousands of headshots to process.
"But you use your CPU processing time to scan small advertisements?"
"Just in case."
Akemi asked him reluctantly.