Font
Large
Medium
Small
Night
Prev Index    Favorite Next

SC094 Strange combination lock, give tips

It was almost midnight when Nan Lin Guiyi got his laptop. Chen Zhiwei deserved to be a special scout. He has a very powerful single combat capability and can easily kill Dai Jia.

Nan Lin Guiyi is studying encrypted laptops, preparing to crack the password, and check what is hidden in the laptop, which is worth ten million US dollars.

It should be very important information, right?

Nan Lin Guiyi guessed that it was a confidential information about the Japanese government? Or was it stolen from a high-tech company's trade secrets? No matter what it is, as long as the password is unlocked, you can check it!

However, when Nan Lin Guiyi tried to crack the password, he immediately frowned.

The encryption mode of laptops is not an encryption solution that comes with Windows, nor is it a password protection shell made by mainstream encryption software, but an encryption solution that Nanlin Guiyi has never seen before.

In the field of hacking, Nanlin Guiyi is more proficient in intrusion and defense, tracking and counter-tracking. As for decryption and encryption, Nanlin Guiyi is not very proficient, or even just at an average level.

After the inspection by Nanlin Guiyi and Butler, the encryption scheme of the laptop seems to be written to the hardware underlying layer. Although the laptop is started and it is successfully entered into the Windows system, if you want to use the laptop, you need to directly enter the password.

If you want to describe it, then it is a bit like a screen saver password. However, it is not as simple as a screen saver password!

Nan Lin Guiyi tried to break the shell and dismantle it, trying to break the password protection shell and directly destroy the password protection program, so that the password protection is not needed. However, after some attempt, he did not find the existence of the password protection shell at all.

The password program without a protective shell made Nan Lin Guiyi hesitate!

Since there is no protective case, Nanlin Guiyi uses a network cable to connect the laptop to his own host, trying to access the laptop's data through his own host.

Anyway, there is no password protection case blocking the contents of the laptop, right?

Unfortunately, Nan Lin Guiyi's idea is very good. The actual situation gave Nan Lin Guiyi a painful blow. The hard drive of the laptop was unresponsive at all, as if it was not recognized.

But the laptop is clearly running!

Nan Lin Guiyi scratched his head and tried to use the performance of the ACPCS system and the vivid company server to forcefully crack the password. However, the exhaustive method of forcibly cracking the password was immediately declared to be invalid after just less than a minute of opening.

Because the password lock interface directly prompts that there is a suspicion of forcibly cracking the password, the password will be automatically updated to aes-256-bit status.

When Nan Linguiyi saw this information, his eyes suddenly became dark. If you want to crack the AES-256-bit encryption, it is better to be more sober. Even if you give the supercomputer Jing to Nan Linguiyi, you will not be able to break this cheating password.

Those so-called cases of cracking aes-256-bit keys are very special cases, and they do not crack the aes-256-bit keys themselves, but only cracking the encrypted object.

Seeing that it was impossible to crack the password of the laptop, Nan Lin Guiyi did not fight to the death. After all, fighting to the death has no effect. It is not that Nan Lin Guiyi could solve the problem if he fought to the death.

"Private, after system detection, it was found that the password protection program of the target object has mutated and is invading the host in reverse, trying to implant information into the host." Butler reminded Nanlin Guiyi.

Nan Linguiyi frowned and unplugged the network cable connecting the laptop to the host, interrupting the connection between the two.

"Butler, block the data implanted by the target object!" Nan Linguiyi said with a frown.

"yes, private!" Butler responded to Nanlin Guiyi and continued, "The system found that the target object is scanning the wireless network, trying to connect to the wireless network, and cracking the wireless network password."

Nan Lingui's eyes showed a look of fear. What exactly is hidden in this laptop?

"Set the wireless connection to a hidden state, bind the Mac addresses of all known devices, and reject the target object's connection." Nan Lin Guiyi ordered, and he wanted to see if that damn laptop could break the blockade and connect to the wireless network in such a situation.

However, in less than three minutes, Butler once again issued a reminder, "Private, the target object cuts into the hidden wireless network, is trying to copy the host's mac address, is trying to enter the network, is it blocked?"

Nan Lin Guiyi nodded cautiously, "Stop!" After giving instructions, Nan Lin Guiyi decided to turn off the laptop, unplug its power supply, and remove the battery.

In this case, it can't cause any trouble, right?

"Butler, is there any solution?" Nan Lin Guiyi asked. Although Nan Lin Guiyi is a world-class hacker, he prefers intrusion and defense, tracking and counter-tracking.

In the field of encryption and decryption, Nanlin Guiyi is not good at it, at least worse than the other two fields. Nanlin Guiyi cannot solve the encryption solution of notebooks.

"Sorry, private r, the system cannot crack the encryption scheme of the target object. After system detection and logical inference, the encryption scheme of the target object is a real-time chaotic random algorithm, and the system does not have the computing resources to crack it." Butler replied, but the result was not beyond the expectations of Nanlin Guiyi.

Nanlin Guiyi cannot crack it, and Butler cannot crack it. So, Nanlin Guiyi considers whether to ask for a foreign aid? In the hacking world, there are always people focusing on different fields.

Although Nan Lin Guiyi is not proficient in encryption and decryption, there are always people proficient in it!

As long as you find a guy who is willing to help Nan Lin Guiyi, you can use the other party’s strengths to make up for Nan Lin Guiyi’s shortcomings. Just in the meantime, when looking for a suitable guy, Nan Lin Guiyi can promote another plan!

However, before dealing with this matter, Nan Lin Guiyi still needed to throw away the blame for Dai Jia. He had already figured out how to throw the blame, and Qianye Qihai would naturally take the blame for him.

The next day, at 8:10 am.

The Kasai Police Department small conference room and search class meeting were still discussing the issue of the shocking incident of the Kasai Police Department. If this incident is not resolved, no one of the big guys of the Kasai Police Department was happy.

Endo Yuto asked Chiba Qikai, "Officer Chiba, has there been any progress in the case?"

Qianye Qihai shook his head. The wanted notice of the APPB in the entire territory has been issued, but there has been no feedback information. Qianye Qihai is also doubting, could it be that they have ignored something?

Suddenly, Qianye Qihai looked at Nan Lin Guiyi, and she asked, "Officer Nan Lin, what case did you ask Officer Futian yesterday?"

Nan Lin Guiyi was slightly stunned on the surface, but she laughed in her heart. Has Qianye Qihai finally woke up?

Then, just give her a little tip

———

New book uploads, recommendation tickets are required, member clicks, collections, etc. Thanks for all support!

———

Follow the public: qms5120 to learn more behind-the-scenes footage of the works and authors, as well as periodic popularization of computer knowledge.

———
Chapter completed!
Prev Index    Favorite Next