Maruko felt a headache.

He really didn't expect that the file sent by Kara actually contained a virus and directly bypassed his verification system.

When he couldn't contact Kara before, he also observed the actions of other hackers.

Others seemed to be able to move freely in the confidential building, stealing permissions and invading the system, and the resistance they encountered was at most at the level of a first-year student.

For a freshman, he could indeed be considered a genius, but to people of their level, he posed no threat at all.

Unexpectedly, I capsized in the ditch and suffered a great loss without any warning.

It was indeed unexpected that they could design such a time for infection and even exchange it for a virus made by senior students.

When performing tasks in the battle block, you are allowed to exchange viruses made by senior students, which is the same as purchasing high-level equipment.

Although it is not prohibited by the rules, it comes at a high cost.

The core of the battle block is to strengthen oneself and verify strength, and almost no one will choose this method.

On the one hand, it consumes a huge amount of resources and is of no help in improving strength; on the other hand, even if you win, you cannot truly understand your own shortcomings and it is difficult to find and fill them.

However, under the current circumstances, the other side clearly lacks talent in network attack and defense, so exchanging for more advanced viruses and taking the initiative to attack is also a strategy.

What’s more important is that the other party’s goal is to win the mission, not for their own growth.

I was indeed careless.

The virus selection was also very accurate.

Among the fourth-year seniors, the virus created by "Cat" is the most difficult to deal with.

Her virus is purely a competition of basic skills, with a wide range of infection and deep penetration.

People with less technical skills than a "cat" have little chance of cracking the system; even if they have the same level of skills, they can only spend a lot of time repairing the system bit by bit. As long as there is any omission or uncertainty, the virus will come back at the right time.

"This is troublesome..."

Maru sighed and could only leave his companions to their own devices, hoping that they would discover something was wrong in time.

As he worked on sorting out the virus, he reviewed the entire process in his mind.

I still underestimated my opponent.

The "Kara" you first come into contact with is most likely the other party in disguise.

If we trace back further, the monitoring system I left behind might have been identified by the other party long ago. They were just taking advantage of my strategy and setting this trap.

The fact that they could detect his monitoring system meant that their technical level was at the same level as his, or even slightly weaker.

But even so, the other party, just to be on the safe side, spent a huge sum of money to buy the virus, which clearly shows that they want to kill with one blow.

But there was one thing he couldn't figure out: How did the other party know for sure that Kara would shut down the communication port? If he could have contacted Kara directly at that time...

Unless the other party already knows that the Kara port is closed.

It is actually not difficult to do this - as long as you continue to initiate connection requests or attacks on Kara's port, Kara will most likely choose to block the signal and temporarily close the port.

This is very likely to happen.

The younger students were clearly aware of the combat power advantages of their own bionic robots. Fighting alone, the older students were no match for the robots. Only by uniting and outnumbering the older students could they have a chance of victory.

As long as you understand this level, you can make targeted arrangements: as long as you prevent them from joining together, you can secure victory.

As for the fact that he was infected with the virus, it might be a coincidence, or it might be a sudden impulse after the other party discovered his monitoring system - but the effect was surprisingly good.

"The new generation is truly remarkable."

Maru sighed and now he could only let his companions fend for themselves.

……

In the main control room.

Noah watched the plan progressing in an orderly manner on the big screen.

The virus "Ball of Thread" purchased at a high price has successfully locked the hacker who tried to connect with Kara, taken over all his terminals, and all monitoring rights were transferred to the name of "Hound Type 1".

The growth rate of sub-AI is astonishingly fast.

With a massive database as its nourishment, it reached the technical level of a second-year hacker as soon as it was born.

AI is the ultimate product of information technology. The Internet language and data concepts that humans need to study hard are as natural to AI as breathing.

If it were not for its short growth period, it would be able to grow steadily to the fifth-grade level. There would not be any bottlenecks in the whole process. You just need to follow the steps and familiarize yourself with the operation.

With the assistance of sub-AI, the processing methods of "Hound Type 1" have been enriched.

It is sending out a large amount of information in the identity of Maruko during this period of controlled time.

The core content of this information is to mark Kara's current location and the meeting point with other people.

Since the other party wants to gather strength and seize the time to seize the blueprint, we might as well take advantage of this - as long as we follow the principle of "unity and convergence", we can easily control their route.

In order to increase credibility, "Hound Type 1" asked "Kara" to proceed along the established route in the identity of Maruko.

This route will pass through two preset convergence points, and there will be no obstacles along the way, creating the illusion that the route has bypassed security forces. However, "Kara" will not stop, but will continue to move under the guidance of the system.

The surveillance footage passing through these meeting points is intercepted separately by the "Hound Type 1" and distributed to other hackers.

Information is being sent out one after another.

On the big screen, colored light spots representing different hackers lit up one after another in the permission list of the corresponding monitoring area.

Their methods of concealing their actions were not very clever.

After all, it has been known from previous actions that the current defense level of the confidential building is "some defense, but not much", which is a level that can be easily controlled by them, so there is naturally no need to worry too much.

While the hackers were verifying the situation, Jode, Avalon, Yuri, and Lina were heading towards the meeting point along the designated route.

Cecily is closest to the meeting point and is also moving towards it.

On the big screen, everyone was intentionally guided to a specific area, the lines of their movements intertwined with each other and finally locked at one point.

The destination is close to the ventilation duct, which makes it very convenient to move up or down. There are minimal surveillance devices around it, making it easy to hide.

To be fair, it is a very good way to sneak in or evacuate, which further increases the authenticity.

From this point of view, Remiel is indeed professional.

So far, the performance of the Hound One has far exceeded expectations.

From strategic goal setting to phased task planning, everything is impeccable. The action plans formulated are also closely centered around the goals, making the best use of the resources at hand.

Through subsequent plans, the intention of the "Hound Type 1" can be clearly seen.

Martin couldn't help but say, "Why do I feel like... we can win?"

"Take out the 'seemingly'," Deliat said excitedly. "We're really going to win! In terms of combat power, we're overwhelming them. With hackers helping them, we only need to make minor adjustments to make them part of our plan."

"That was also the battle plan formulated by the Hound One," Martin reminded.

"We are the creators of the Hound I. Isn't its plan our plan?"

Virgil's face flushed. "If I could really win... I can't even imagine it."

He is still a little dazed.

Was this meticulously planned combat support system that led the seniors by the nose really created by them?

Noah smiled and said, "The show is about to begin."

As he finished speaking, the combat plan of "Hound One" moved on to the next step.

Almost all hackers received a message from Maruko at the same time:

"I have obtained the drawings Kara obtained through an encrypted channel. Please come and copy them immediately and analyze whether there are any design loopholes. Please also send a copy to the mechanical design department. It would be best if they could issue an analysis report clearly identifying the weaknesses."

There is a download link below the information.

After the system's built-in detection tools showed that the file was intact, several hackers unanimously conducted in-depth analysis of the file in their own way:

Lao Hei analyzes the internal data of downloaded files to determine whether they contain privilege escalation or encryption behavior.

Ghost deployed sensitive files to test download content.

The sandbox creates a completely realistic "reality sandbox" - it can simulate the real hardware and network environment almost perfectly, but it is closed itself.

Several hackers used different methods, but all came to the same conclusion: this was a harmless program.

No sensitive operations or suspicious code were found within the file, no ghost deployment alerts were triggered, and no aggressive behavior was observed in the sandbox.

Quite safe.

It can even be opened normally in an isolated environment.

The content inside is indeed a complex design drawing. Although it is only a quarter of it, it already shows extremely sophisticated design ideas and imaginative concepts.

Anyone who sees this drawing will naturally come to a conclusion - it was created by a genius.

"It will probably take some time to reverse engineer the complete design from this drawing." Ghost observed the structure on the drawing. Although it was different from the field of network security that he was good at, it did not prevent him from appreciating the simple and elegant design.

Good code has a unique beauty in itself.

He copied the drawings and was about to transmit them to the mechanical design staff, when all operations were suddenly locked!

A tangled, wriggling mass of lines appeared on the screen, spreading outward like a swarm of insects.

Apparently, his personal processor was infected with a virus and the system was locked down.

"How is that possible? I checked it and there's no virus!"

"How on earth is this done?"

Ghost tried to operate, but found that all external communications had been blocked.

He was completely isolated from the outside world until he cracked the virus.

The sandbox faces the same problem.

Staring at the lines moving on the screen, he whispered two words:

"Is it 'cat'?"

"It didn't trigger in the real sandbox... This shows that this is a conditionally triggered virus..."

"What exactly is the trigger condition?"

On the other side, Lao Hei's fingers moved quickly on the keyboard.

His system was also blocked. However, because the underlying system was entirely his own design, and the key programs were obfuscated, the virus didn't adapt well to the local environment, and the blockade wasn't as strict as expected, which gave him room to maneuver.

"The trigger is information on the encrypted communication channel."

"The file itself has no obvious virus characteristics. The codes for privilege escalation and data control have been split and hidden in various corners of the document."

"Once it comes into contact with information on an encrypted communication channel, it triggers self-replication and multiplication. In this process, hidden code segments will nest within each other and combine into a complete virus."

"And during the scanning process, if all hidden codes are not completely removed, the virus will come back."

"It's Cat's style indeed."

"It's estimated to take another 15 minutes to completely clear the area. If I remember correctly, Cecily should have been close to the rendezvous point when the virus was triggered... This was a pre-set trap."

"15 minutes...is that still enough time?"

……

"We're almost there, what should we do next?"

Joad and his group stopped in front of a dead end street.

"Wait a moment, I'll open the channel right away." "Ghost" replied almost instantly.

Just as he finished speaking, there was a slight sound above his head and a secret door slid open quietly.

At this moment, Lina suddenly spoke anxiously: "I feel very wrong... very uncomfortable, I have never felt so uncomfortable."

Jode, who was about to enter, suddenly stopped. Lina's intuition was always accurate. The last time she had a similar feeling, they had fallen into an enemy ambush.

"Could it be that this time too..."

Just as the thought came to mind, the anxious and urgent voice of "Ghost" exploded in his ears: "Oh no! Two bionic robots are following the trail we left behind! There are too many of us, and information will be leaked too easily!"

Heavy and alternating footsteps were heard in the distance, at an extremely fast frequency, approaching rapidly.

The voice of "Sandbox" followed closely: "We will try to intercept, you go and meet up first!"

Qiao De suddenly realized: "It turns out that it's because they were caught up... No wonder Lina has such a strong sense of crisis."

"Let's go! Meet up first!"

He jumped up first and went through the secret door.

Behind the door was a corridor, with traces of people passing through visible on the ground. "This should be the direction," Joad confirmed the arrow projected by the terminal. "The navigation also points here."

After walking a few steps forward, they found a precisely cut circular entrance connected to a downward ventilation duct.

This is clearly a sign of someone's action.

Is it Kara?

That makes sense.

The monitoring facilities here have obviously been cleared away, and it is indeed safer to enter the ventilation duct.

The group quickly sneaked in and followed the traces.

After turning a corner, the traces ahead seemed to disappear.

Where are the Kara people? They didn't leave first, did they?

Just as they were puzzled, the floor beneath their feet suddenly collapsed, revealing bottomless darkness! The surrounding walls simultaneously pressed inward, forming a sealed black box.

The only passage is the abyss revealed below.

Avalon roared.

The body suddenly rushed against the wall.

He punched the wall with his right hand and found that the surface was sticky and incredibly strong, making it impossible to use it as leverage.

The ceiling pressed down, leaving the four men with no room to resist and they could only plummet downwards.

"What's going on? Ghost, sandbox!" Joad asked angrily.

The ghost's voice was very calm: "Can't you see it? It's a trap."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like