Chapter 168: Network Attack (Part 2)
The large screen did not fail, and it was stuck because of the server.
And it is not just a big screen, but also a warning box of "data decoding failed" is popping up on all computer monitors of the communication team's command terminal.
"What's the situation?" Han Zhenjiang heard the abnormal sound of the communications consultant typing on the keyboard in the communications team and immediately asked.
"Report, the server seems to have an error." Because the same fault prompt appeared on the screen of several communications consultants' military notebooks, the communications team leader immediately made a judgment.
"Quickly troubleshoot the problem!" Han Zhenjiang gave the order with a dark face.
"Yes!" After the communication group leader responded, he wanted to softly restart the server, but the computer card could not perform the operation at all, so he got up and wanted to press the hard restart button on the server chassis.
"Wait a minute!" Qu Sen, who was stunned before, suddenly stopped the movement of the communication team leader.
Because Qu Sen just taught everyone how to operate the updated command system, he still attached great importance to his words. He stopped immediately after hearing the sound of stopping.
After Qu Sen once again confirmed the system's fault, he walked to the back of the server case with a strange expression, and stretched out his hand and unplugged the network cable plugged into the downlink network card.
Seeing the frantically flashing signal light on the network card go out, I sat in front of the computer again, and pressed the Enter key with one hand.
There are countless warning windows superimposed on the monitor, and as the Enter key is pressed, it begins to disappear quickly. After the last "clang" sound disappears, all the alarm windows disappear.
Because the downstream network of the server has been physically disconnected, the command center is now unable to accept the information sent by the following units. Qu Sen tried sending out information, and now all nodes in the communication network are in data congestion. Even if the nodes he sent the information received, they cannot view it because the computer is stuck.
"What's the situation?" Han Zhenjiang, who had already walked behind Qu Sen, saw that the computer could be used, asked.
"Report to the commander, we should have been attacked by the blue party's network." Qu Sen answered while reviewing the server operation log.
"Cyber Attack?" Hearing this answer, not only Han Zhenjiang, but everyone in the command center looked at each other.
The word "cyber attack" often appears in movies and TV series. Everyone always thinks it is a high-end operation with a sense of interpretation. The chances you encounter in reality are very slim. Unexpectedly, the exercise just started and saw something new.
However, this "fresh" is obviously too bad.
"Can it be solved?" Han Zhenjiang digested the information he heard and hurriedly asked.
At this time, Qu Sen had already determined the guess in his heart through the server system log and replied: "The Blue Party attacked our server network through the virtual 8o8o port vulnerability of the system, causing communication congestion among all nodes in our network. If nothing unexpected happens, they may have begun to steal the commands we sent before."
"Stolen all the orders we issued?" Han Zhenjiang was stunned when he heard this.
No matter how he is not surprised, he cannot understand the fact that the enemy has stolen all the military secrets on his side without even showing his face.
"We have enabled a brand new identification code, and the commands sent are all secret words. Even if they get information, they will not be able to crack it in a short time." Qu Sen was still calm at this time and immediately expressed his judgment.
"Is there any solution?" Han Zhenjiang calmed down when he heard this and asked very quickly.
"I can remotely close the virtual 8o8o ports of all nodes, but without the assistance of this port, the transmission degree of our commands will be affected somehow." The two of them discussed in-depth on the train of Zhou Li's work, her attack principles and solutions, so Qu Senxun gave the solution.
"How big is the impact?" Han Zhenjiang asked immediately.
This cannot be expressed in quantifiably on how much impact it will have, so Qu Sen used the most refined language to explain the affected principle: "The main impact is the degree of data convergence, which has no effect in a single line state. When multiple instructions enter and exit at the same time, the processing degree will be significantly slowed down. How slow is it depends on the busy network."
"That means it doesn't have much impact?" Han Zhenjiang expressed his understanding.
"From our existing number of nodes and network bandwidth, if not all nodes receive data at the same time, the impact will not be great!" Han Zhenjiang wanted an absolute explanation, but computer computing is full of variables, and it is difficult to get an absolute value, so Qu Sen could only make a theoretical statement and tell his own judgment.
Fortunately, Han Zhenjiang is a commander with a rich comprehensive knowledge reserve. He quickly digested Qu Sen's words and issued an order very simply: "Then do it, use the fastest degree!"
"Yes!" Qu Sen received the command and quickly closed the virtual 8o8o port in the server system, and then began to remotely operate various terminals on the network one by one.
It takes time for more than 30 terminal devices to operate one by one. In addition, it is in a state of network congestion, and some terminal devices are still restarting continuously. This time has been further extended. Nearly two hours have passed when Qu Sen completed all the operations.
As terminal equipment was re-launched, the situation of front-line troops was successively reacted back to the command center.
In the past two hours, the Blue side launched a multi-point attack on the Red front-line troops at the same time. Fortunately, there was a response plan under the command state. The Red side's joint defense and maneuvering maneuvers were caused by some losses, but the losses were completely within an acceptable range.
At the same time, based on the contact between the two armies, the configuration and number of Blue Strike attack troops were also collected by the Red Strike and fed back to the command center.
At this time, the Blue Party advanced to the command center. Zhou Li saw that the last Red Party terminal device on the Internet also lost its connection, and couldn't help but pat the keyboard lightly.
The network congestion not only caused considerable difficulties to Qu Sen's remote operation, but also the same was true for Zhou Li's stealing of intelligence.
It is precisely because of copying the information stored in the Red Party's terminals that Zhou Li did not completely block the Red Party's network. Seeing that one after another of the devices in the list lost links one after another, the progress bar of copying the Red Party's terminal database jumped forward one by one.
When the connection was finally lost to a terminal device, the total progress jumped from 97% to 100%.
Although Zhou Li was angry, she couldn't do anything. She could only decode the copied database file and sort out it out to the Officer Sun of the Military Intelligence Department who was doing cracking.
For Officer Sun, the more materials Zhou Li gets, the more conducive it will be to crack the secret words of the Red Party.
This task that should have been completed by a group now falls on her shoulders alone. Director Sun is under great pressure and dares not distract himself. He works hard to find common ground and coherence in the collected information to straighten out the logical relationship.
She knew very well that at present, even if she finally cracked this information, she could only obtain the troops represented by the Red Party's identification codes from the information.
As for specific information, in addition to the logistical-related data, other invalid ones are definitely meaningless.
The Red Party is not a fool. Since we know how to solve the sudden network failure, we will naturally know the cause of the failure, which is because of the Blue Party’s cyber attack. Since we know this, we will definitely make large-scale adjustments to the deployment of the troops.
However, being able to force the "enemy" to make adjustments in military deployment is enough for Yue Jianjun. The sudden attack in the first stage did not achieve the expected effect, so he was ready to seize the opportunity of his opponent's adjustment, find his weak points to display his special skills, and intersperse and cut operations.
The communication has returned to normal, and the tense atmosphere in the Red Party command center has become a little relaxed.
Han Zhenjiang looked at the war zone situation chart that was restored to dynamic mode and couldn't help but say: "That old boy Yue Jianjun is really bad. He just wants to hit me, but he doesn't want me to fight back!"
After saying that, he turned to look at Qu Sen: "You kid has been studying for a year. Didn't you just learn to be beaten, but didn't you learn to be beaten?"
Qu Sen certainly understood what Han Zhenjiang meant by "beating" and "beating people". He looked at the war zone map and said: "What I learned now is not enough to try to attack a cyber attack. But if you have the chance..."
"Speak happily, how can I know if I can create opportunities for you if you don't say it!" Although Han Zhenjiang spoke very impatiently, he had already looked up to Qu Sen several levels above the original basis.
Even he himself did not expect that Qu Sen would be seconded back, and this idea of temporarily slapping his head could have such a big effect, and he couldn't help but look forward to him in his heart.
Qu Sen couldn't help feeling a little guilty when he saw everyone in the command center looking at him, but he still organized his language to point to the eastern battlefield area of the war zone map, a complex terrain said:
"If the Blue Army enters this range, we must use the communication relay device. If we can destroy one of them and get the identity identification code of that unit, I can invade their communication relay network. Although it cannot affect all Blue troops, as long as the troops are connected to the communication relay network, they can invade, and they can even be mobilized through fake instructions."
"What did you say?"
Han Zhenjiang's eyes suddenly widened. Although he heard Qu Sen clearly, he still couldn't help but confirm again.
Chapter completed!