Chapter 284: Chapter 203: Do Him In! (Please Subscribe)
At Linjiang Mansion, on the thirtieth floor, the lights were bright.
"Xinxin, make me a cup of Maojian tea," Lin Chuan called out to the room outside. Tonight might be a prolonged and fierce battle, so he wanted to brew a cup of tea in advance to refresh his mind.
"Chairman, it\'s coming right up."
The Little Landlady, wearing pajamas, came out of the room and carefully prepared the Maojian tea for Lin Chuan, then brought it into the room and placed it on the table.
In the morning, Lin Chuan had been dealing with the affairs of the 720 Company.
In the afternoon, he went to the Anling Laboratory to produce a "New Type of Addictive Drugs."
He had also entertained Yu Keke in the evening.
So when Zhang Xinxin entered the room and saw his computer screen filled with code, she felt a pang of distress: "Chairman, let me give you a massage."
Lin Chuan took a sip from the thermos, smelling the fragrance of Maojian tea, and with his other hand, he grabbed the Little Landlady\'s hand and smiled, "I\'m fine, but I have some unexpected business tonight, so you should get some rest."
"Alright, as you say." The Little Landlady pouted.
After the Little Landlady left the room.
Lin Chuan continued to focus on his computer screen.
Meanwhile, far away in the North Bear, Angelina had already transferred the \'International Forum-Underworld\' admin rights to him.
The International Forum is a global open-site without network security protection; no one specifically targets it for attacks.
However, the \'Underworld\' developed by Angelina on the International Forum is essentially a sub-site and requires separate network protection settings.
Each sub-website can exist independently.
So, for instance, when the \'Underworld\' comes under attack, other sub-sites (copyrights) will not be affected.
Its operational mode is primarily neutral.
After gaining admin rights to the website, Lin Chuan immediately began his actions.
His gaze rested on the computer screen, which displayed the \'Underworld\' site\'s backend data.
"XSS attack."
Lin Chuan frowned, recognizing the opponent\'s means of attack.
An XSS attack, also known as Cross-Site Scripting attack.
It involves injecting malicious scripts into a website to capture sensitive information or perform other malicious operations.
The XSS attack Lin Chuan faced was far more complex than ordinary malicious code injection.
Once the quantity reaches a certain level, it can create a significant impact.
It\'s like a DDOS attack, which uses multiple computers or network nodes to send massive amounts of invalid or overloaded requests to a target server, thereby disrupting or even blocking normal network communication, causing the server to collapse.
Highly skilled hackers can take advantage of the server\'s downtime to recover, invading the site and wreaking havoc.
However, as the founder of 720 Network Security Company and having experienced the virtual life of a \'world-class hacker,\' Lin Chuan was calm and composed in such situations.
He didn\'t even need to type any code.
He accessed the super firewall developed by the 720 Company.
However, Lin Chuan only activated the firewall\'s basic defense mode.
The purpose was to make the attackers believe they could breach the firewall and lure them into continuing their assault.
This was to buy Angelina time to trace the attacking IPs\' origins.
"Idol, the site is under attack and might shut down from overload," Angelina sent a message.
Enjoy exclusive chapters from m-v l\'e-NovelFire
Lin Chuan laughed and replied, "I closed it protectively to safeguard users\' information and site data."
"That\'s good."
"They are still performing XSS attacks and coupling it with \'file upload vulnerabilities\' to attack our website server," said Lin Chuan, his expression grave as he held a cup of Maojian tea and took a sip.
\'File upload vulnerabilities\' refers to attackers maliciously uploading files to the target server, using these files as a stepping stone to inject code, execute new commands, or perform other malicious operations.
Professional hackers can still attack the server even if the website is closed, altering server data to fulfill their objectives.
"I\'m starting the tracking now."
In North Bear, inside the HK studio, Angelina immediately opened the \'Kaspersky\' network attack real-time tracking map.
Here, one can monitor the range and frequency of hacker attacks worldwide and differentiate between various types of attacks.
As a member of the North Bear HK Hacker Organization, Angelina is well-versed in operating \'Kaspersky\' and in tracking network attacks.
She began her pursuit at once!
Half an hour later.
After meticulously unraveling the tangled web, she traced the true attacker from a multitude of decoy IPs.
—Originating from Southeast Asia.
"God of Hackers, it\'s the Morgan Group!" Angelina immediately analyzed the IP and drew a conclusion.
"Morgan Group?"
Lin Chuan heard the name and furrowed his brows slightly.
He had heard the name several times in the dark web, but he wasn\'t particularly clear about what the Morgan Group was involved in.
Angelina explained, "Morgan Group is a massive enterprise in gray and black industries. Its operations include addictive drugs, arms, money laundering, and so forth, commanding numerous hackers and assassins, and a host of Cleaners."
Lin Chuan\'s pupils constricted slightly.
This was a professional and vast gray and black force!