Chapter 1204

The bank may be located in Africa, and has the arrogance of Europeans as colonists, and despises the intelligence of local people. Therefore, the security of the bank network system is perfunctory, better than nothing.

In order to achieve their goal in a fixed period of time, both of them planned to act together and concentrate their dominant forces on one port.

As a result, the two people did not attack at the same time. They only thought about one person and tried to find out that the port only had a very simple password protection composed of any four letters.

And after trial found that the composition of the password is relatively backward, can only be composed of letters, numbers and other arbitrary symbols can not be used in the password.

The combination of four arbitrary letters is 26 * 26 * 26 * 26, which is 456976 combinations.

It is very tedious to test these 400000 combinations manually, but if you use a small program of exhaustive method, you can find it in less than a second.

Thinking of the mobile phone running out of the password: ABCD, speechless shook his head.

This is a multi-minded big, just put a big bank's external port with such idiotic password combination?

She sent a text message to Zhao Liangze: the password has been found.

Zhao Liangze looked at the password of ABCD, but it was not strange at all.

He has been in this place for several months and is familiar with the quality and attitude of the people here.

This is really what the IT network managers here can do.

Not for anything else, because it's hard for them to recruit real programmers to be database admins.

Found the password to enter the intranet port, and Zhao Liangze smoothly intruded into it.

After going in, the two soldiers were divided into two ways.

Zhao Liangze is more professional. He pays attention to checking the overall network system, finding out the software and hardware used by the bank, and then leaving a Trojan horse back door inside.

The main concern is to find information related to safedepositbox.

This part should be in the operation module.

With his fingers gliding on the mobile phone, he found the branch system of the bank dealing with safe deposit box in a few minutes.

This is a very simple SQL database.

It records the details of each safe deposit box.

The number of the safe depositbox is the primary key of the database, and each of them is not repeated.

After finding out the primary key of SQL, we immediately searched it with 365 and immediately found the safe they were looking for.

Happiness comes so fast that I can't believe my eyes.

Looking at their watches, it took less than five minutes for them to find out from sitting on the sofa and taking out their mobile phones.

"Is that too easy?" Thinking of the murmur, worry is a trap, and use their own "robot. Exe" program to go in a circle.

This is a small program she wrote in her spare time. Just like a mine detection robot, she goes for a walk first. If there is an exploration program inside the other party's system, she will treat her "robot. Exe" program as an intrusion hacker.

In this way, she can understand the security measures of the other party and the emergency strategies for hackers through the information transmitted by "robot. Exe".

Her "robot. Exe" in the other party's system, if no one in the situation, quickly around a circle, did not trigger any alarm system.

This shows that either the other party's system security is too bad, and there is no foreign invasion at all.

Or the other party did not set up any system security at all, thinking that the system intranet would not be broken.

After thinking about it for a long time, he was sure that the other party was not aware of it, and then he entered the other party's banking system at ease.

After wandering around for a while, she realized why the security system was so weak.

Because this bank regards computer network system only as an auxiliary content of their business work.

Unlike other places, the network has become an inseparable part of our work.

In this banking system, it is impossible for you to transfer money directly through the Internet.

So they don't care how secure the system is, because these systems are not mainly used for work, but are used to store historical data like hard disks.

This kind of performance is in the middle of my mind.

What she needs to look for is historical data.

Quickly browse through the history of the system and remember to record all the information related to the safe 365 and send it to your cloud mailbox for storage.

She did these things quickly and covertly. Before the other party noticed any clues, she had already withdrawn from the whole body, even obliterating the login record of the port.Back out of the bank's internal system network, open your own cloud mailbox and check the contents related to the safe No. 365.

After reading for a long time, she only saw such a sentence in the bank's records.

Safe number: 365.

Date of unpacking and leasing: mm / DD / yyyy.

My heart moved.

This date is the year of my birth.

In other words, this safe has been rented for nineteen years.

The rent is $50 a year. It's been paid in advance for 100 years.

"Tut" a sound.

It's been a long time.

Listen to lainz's voice. The data related to the genetic vulnerability of Chinese people is stored here?

How can they not find out after so long?

The brow of care frowned.

From the letter leinz sent her, their goal is to point here, right?

What is the purpose of leading her step by step?

Is everything here the same?

Thinking about it, we still ruled out this possibility.

The other side, step by step, led her over, certainly not to do the game.

If the game is done, it should be in the Alps. It is only in accordance with their style to arrest her for a long time.

But they do not do it up to now, and they very much hope that they can come to the bank and see the safe. They think that, in nine cases out of ten, this safe is real.

The real is empty, the empty is real, the true is false, and the war is full of deceit.

That's what reintz and hoshohn do with this kind of person.

Pondering over it, continue to look down.

When I arrived at the tenant column, I saw the English name of the dragon and the Phoenix: Kevin Ku.

It's her father's English name.

The tears of concern came out at once.

She rubbed the high-definition signature on her mobile phone to give her father a more intuitive feeling.

Looking at the conditions for opening the safe, he shook his head in silence.

This safe is in the bank underground warehouse. Today is the seventh day of October double monthly pass, the last day!

Everyone has a monthly ticket to vote!

It's the third watch at eight in the evening.

Mamda!

╰(*°▽°*)╯。

www.novelhold.com , the fastest update of the webnovel!