Not only is the IP address exposed, but the software I wrote myself to prevent file theft is also completely ineffective.
Chen Ming chuckled and replied, "The moment the firewall detects the attack, you've already been exposed."
Tang Xinyi felt mixed emotions. With such advanced skills, she couldn't even break Chen Ming's firewall!
I feel a little lost.
But when I thought that I couldn’t even break the firewall made by Chen Ming, the security of this system was beyond doubt!
Thinking of this, Tang Xinyi felt happy and relieved.
Chen Ming is so powerful that it is no wonder that I spent so much effort to recruit him.
You found the right treasure!
As the farce ended, everyone returned to their workstations in high spirits.
Lin Guang came over and looked at Chen Ming with great interest, "Team Leader, what are we going to do in the future?"
At this time, he had great trust in Chen Ming. Under Chen Ming's command, the firewall they built was so powerful that even the section chief could not break it. A sense of pride arose in their hearts.
Xiong Dahe also came up and said, "Yes, team leader, I can't wait for the next step."
During working hours, Xiong Dahe would not call Chen Ming "Laosi" or "Si Dangjia", but "Team Leader".
Chen Ming hesitated for a while, "I haven't thought about it yet, you guys take a rest first, I'll talk about it when I think about it."
Chen Ming became the leader of the information security team, and he was allowed to arrange many things as long as they complied with the rules.
Now that the system upgrade has been completed, Chen Ming’s initial small goal has been achieved, and now he really doesn’t know what to do.
It seems there is nothing that can be done.
After thinking about it, an idea suddenly popped up in Chen Ming's mind, and his eyes suddenly lit up, "How about we do a fishing enforcement?"
He knew that there must be many spies hiding in Longguo. These people specialized in stealing Longguo's military intelligence and undermining Longguo's security and stability. Longguo even wanted these spies at a high price, and would reward them handsomely once they were caught or provided intelligence.
People also jokingly called these people the walking 500,000 people.
Chen Ming wanted to use the firewall's counter-tracking and the ability to intercept intelligence from the other party's hard drive to catch these people.
"Fishing enforcement?" Everyone asked in surprise, "How do you do that?"
Chen Ming pondered for a moment, feeling a little troubled.
The military intranet is a closed domain that cannot be connected to the external network. If hackers want to invade, they can either insert a USB flash drive with communication function into the military computer or dig out the underground national defense optical cable to connect, but both methods are extremely difficult.
The former requires infiltrating the troops, but the possibility of this is very small.
As for the optical cable, once it is damaged, the enemy will be surrounded within five minutes. If those 500,000 people walking dare to move, it would be tantamount to walking into the muzzle of a gun.
Because of the high difficulty, the troop system is rarely invaded.
If sting enforcement is to be carried out, the spies need to be able to connect to the military network and then counter the tracking.
However, how to connect the spies to the military network is a major challenge.
ps: Kneeling to reward monthly tickets.
Chapter 61: Phishing enforcement, directly open the intranet link to the external network!
How can spies successfully connect to military networks to conduct phishing operations
Chen Ming pondered over this question.
It is a bit unreliable to let them do it themselves. The only way is to connect the intranet with the external network.
Chen Ming discussed his ideas with his teammates in the group.
Chang Heng hesitated and said, "There is no problem with connecting the intranet to the extranet, but is the risk too great?"
The reason why the army sets up an intranet is to protect files and prevent secrets from leaking.
After all, once connected to the external network, the risk of confidential information leakage will be greatly increased.
"I plan to give it a try. Anyway, our firewall is quite strong now. Even top hackers will have difficulty invading it in a short period of time." Chen Ming pondered and said, "And once we catch these people, it will be a great achievement."
The firewall has just been upgraded and can protect internal files very well. After connecting to the external network, it can minimize the risk of confidential information leakage.
Moreover, if they could capture those 500,000 people who were walking, it would be beneficial to the Dragon Kingdom.
"We support you." Xiong Dahe said, "But for such an important matter, I think you should still ask for instructions."
Although Tang Xinyi made Chen Ming the leader of the security team, he also gave him a lot of power.
But this is a big deal, so it would be best for Chen Ming to ask for instructions.
Chen Ming nodded.
It was inevitable to ask for instructions. He was not so arrogant as to act on his own in such a big matter.
"If you all think there is no problem, then I will go and talk to the section chief." Chen Ming glanced at everyone.
The team members nodded one after another, "We support you!"
Chen Ming immediately stood up and reported his ideas to Tang Xinyi.
After briefly explaining his idea, Chen Ming quickly said, "Although connecting to the external network will increase certain risks, I believe in my firewall. Moreover, if we can counter the tracking, determine that the other party is a spy, and capture him, it will also reduce the risk of Dragon Country's information leaking."
At this time, Tang Xinyi was also in deep thought.
This is a big deal. If any accident happens, it will definitely be a major blow to the Red Star Brigade.
But if we can catch the spy, that would be a great achievement!
Tang Xinyi raised her head and looked directly at Chen Ming.
540 saw Chen Ming's eyes, and her wavering heart suddenly became firm for some reason. "Okay, link to the external network, I agree."
She inexplicably had full confidence in Chen Ming's skills.
Chen Ming nodded heavily and gave a standard military salute, "Yes!"
Back at his workstation, Chen Ming smiled at everyone and said, "Let's go fishing!"
Several team members showed joy and immediately returned to their workstations and began to work on connecting the intranet with the extranet, and then waited quietly.
Chen Ming sat in front of his workstation and waited for a long time, but the firewall remained calm and there was no sign of intrusion.
Chang Heng, who was sitting next to him, frowned and said, "Nothing is happening. Those spies probably don't know that the troops have been connected to the external network. We can't expect anything by just waiting."
"Yes!" This sentence suddenly woke Chen Ming up.
These people may not even know that the troops have been connected to the external network, so they naturally will not attack.
For fishing enforcement, you need bait!
Without bait, who will take the bait
Thinking of this, Chen Ming immediately opened a civilian military forum.
Now that you are connected to the external network, you can naturally enter the forums on the private external network.
The probability of hiding spies is highest in military forums. Many enemy agents like to hang out in forums and obtain intelligence through exchanges between veterans.
Many veterans don't think too much when chatting, and they may inadvertently reveal a lot of information in the army to these spies with ulterior motives.
Chen Ming opened the forum and used hacking techniques to quickly break in and gain administrator privileges.
Using the administrator's privileges, I found several of the most frequently browsed network IDs.
Note down these IDs, search them one by one, and send them private messages.
The content of the private message is: This is the link to the military intranet. As a military enthusiast, I am sharing it with you. You can go in and learn about the real situation of the troops. Link: xxxxxxx.
After doing all this, Chen Ming sat on the chair, put his hands on his head, and waited quietly.
The bait has been thrown out, just waiting for the fish to bite the hook.
As they waited, time passed by unknowingly and it was time to get off work, but the members of the information security team did not leave. They sat in front of the computer and waited quietly.
Even dinner was packed up by the team members and eaten in the computer room.
At the same time, in Dragon Kingdom Magic City, in an ordinary residential area:
In a messy and dim single room, there was only a computer flashing a faint light. A man was sitting in front of the computer, constantly scrolling the mouse and browsing the military forum.
He is an office worker in Shanghai. He works diligently every day, going out early and coming back late. When he sees his colleagues and neighbors, he greets them with a smile and is very friendly. His family background is also very ordinary, and he is a very normal person inside and out.
However, only a very few people know that his true identity is actually a spy from the Sakura Country.
In addition, he is also a hacker, and his commonly used ID is ranked quite high in the Hacker Alliance.
After get off work every day, he would sit in front of his computer and use hacker techniques to collect various internal information of the Dragon Country military on the Internet and report it to the Sakura Country Spy Department in exchange for a considerable commission.
The way he collected information was nothing more than hanging out in some military forums, military BBS, etc. When he saw a message left by a veteran soldier, he would hack into the other party's computer through the Internet to look for valuable information.
At this moment, he was staring at the computer carefully, checking the messages on the forum one by one.
Suddenly, a red dot flashed on the private message icon, indicating an unread message. He opened it curiously and took a look. Suddenly, his pupils shrank and his heart beat faster.
Army intranet link!
Just as he controlled the mouse and moved it to the link, he suddenly hesitated.
As a spy, he would naturally click on it without hesitation, but as a hacker at the same time, he became alert instinctively.
Such tempting words and the direct link were more like a piece of cake in front of a gate, as if as long as he touched it, the gate would fall and destroy him!