Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 23 Kevin

"We can't stop our attacks, we are the world's leading computer systems, destroy the global financial order and rebuild a new world pattern, no one can stop our attack, we are the masters of the world."

Kevin Mitnik was less than thirty years old and was in full energy. He was hiding in a small town in North Carolina, using the network here to invade Motorola's network.

He previously contacted a Motorola employee and convinced her to give herself a microtac mobile phone code. The reason he was interested in the microtac series was because it looked like a telephone on Star Trek. Motorola's entire company was protected by security, so Kevin established a complex social engineering solution, controlled the telephone network, and established callback numbers internally.

Every time he invaded, he could obtain a business manager's rsa security, and then remotely access their internal network. Finally, he had cracked the development server one after another and found the source code of various mobile phones.

Kevin did not intend to sell these materials because he invaded the system and just wanted to show his great existence. When he invaded the North American Air Defense Command, he obtained information on the deployment of nuclear bombs in the entire United States. If this thing was sold, it could bring him at least $500,000 in revenue. If the Americans re-deployed these things, it would cost hundreds of millions of dollars.

Some time ago, federal agents bribed one of his former accomplices and set up bait to lure him into the trap.

As a result, Kevin discovered this. Even if he escaped, he hid in this small town. During this period, he invaded the American Sun Microsystems Company, Novell Network Company, Nec Company, and Piaotiansi Network, modified the user information in the computer, and left his own special mark.

Now, he is preparing for invading the San Diego Supercomputer Center. The other party has the most advanced computer security defense technology and the world's best computer security expert. Kevin believes that if he hacks into the San Diego Supercomputer Center, he can reach a high point in his hacking career.

Just as he put on his headphones and was about to go online to collect some information while listening to music, there was a knock on the door outside.

Kevin walked over and opened the door and found that it was two white people and an Asian person. He couldn't help but be curious, "Who are you looking for?"

"Kevin, you're in big trouble." A white man looked at his companion and said to Kevin, "Federal agents patronize your house again."

"How could you find this place? Moreover, it's not the ones responsible for the investigation, are you?" Kevin was a little surprised. It was hard for him to think about how these people found him accurately.

He had successfully invaded the FBI network before, found the information of the agents responsible for investigating his own, and modified their information into unforgivable bad guys. At this time, he suddenly saw these federal agents who claimed to be investigating him, and they were people he had never known about him, so of course he would feel suspicious.

However, the other party did not give him any time to react. A white man directly took the electric shock in his exit bag and came over his neck. A faint blue light flashed and Kevin fell down very quickly.

The two men supported Kevin and said, "Okay, the person has finally been found. How can I send him out?"

"Look for the snakehead to smuggle him out." The Asian person replied. "It is difficult to smuggle him into the United States, but it is much easier to smuggle people out. We have a way to transport him to Mexico first and then to Hong Kong by ship."

Kevin spent more than half a month in the hands of these people. When he was sent to Hong Kong, Fan Wubing was already waiting for his arrival in a five-star hotel suite.

At first, Kevin thought he had been kidnapped, but when he saw Fan Wubing, he said in surprise, "I recognize you! You are the genius child who stirs up the American economy!"

"How did you know me?" Fan Wubing was also stunned for a moment, and then he thought of something that the other party was a super hacker.

Sure enough, Kevin looked at Fan Wubing with some confusion and replied, "I have seen investigative information about you in the secret database of Federal Agent FBI. Because you are very young, I am very surprised that the genius who stirs up the US economy is actually a child."

"Well, I'm almost adult now." When Fan Wubing heard the term "genius child", he touched his nose in a slight rush, thinking that he would not be eighteen years old next year, and that he would be considered a legal adult at that time.

FBIs are interested in big names with sensitive identities, especially Fan Wubing, a mysterious big person who was once a great American official who could not even invite them. The super rich people in the world naturally have to investigate through means.

"Do you want to see the information about FBI's investigation of you?" Kevin knew that he was unfamiliar with Fan Wubing, so he proposed a proposal to ease this strange relationship between the two people.

Fan Wubing looked at Kevin and thought to himself that this person was indeed a little smart, otherwise he would not be able to do the hacker industry. You should know that hackers are actually looking for loopholes in human nature and are the most clever in their thinking about human psychological activities. Otherwise, it is impossible to break through layers of obstacles and invade those complex network servers, and leave behind many fogs and traps, so that the technicians who track themselves through invasion traces can be at a loss or fall into his trap, and find other scapegoats.

"Okay." Fan Wubing nodded, indicating that Kevin could use a computer next to him.

"Hong Kong people are very rich." Kevin turned on the computer, connected to the Internet, and sighed.

Kevin's skills were indeed excellent. He just found a few springboards and used them as his own disguise and easily entered the FBI database. After searching, he found materials about Fan Wubing, but he said in surprise, "Damn! He actually increased the density level again! But this is not a problem for me, Kevin!"

The density level was improved, and it only took Kevin a few more minutes. Not long after, Kevin used a printer to print out the information about Fan Wubing, which was as thick as a hundred pages.

Fan Wubing looked through the grass for a while and couldn't help but cursed casually, "Grandma, you actually put so many nails in me!"

I didn't know if I didn't see it, but I was shocked when I saw it. Among Fan Wubing's current foreign employee team, there were actually more than a dozen senior managers who were involved in FBI, either FBI's spies, or informants who had money relationships with FBI.

In the information, there are many records of their contact with FBI, which can be said to be as proof as mountains of evidence.

"It is indeed not easy to protect yourself in a hostile Internet world. You have to always think that in a corner on the other side of the earth, an unethical person is spying on your system vulnerabilities and using them to steal your most sensitive secrets." Kevin said next to him. He has left the FBI network and started to attack the Hong Kong Financial Center network.

"I originally planned to install a network system within the company, but now I'm a little hesitant after watching your performance." Fan Wubing said to Kevin with a smile, "Very good! Kevin, you have a legal job now. Are you interested in becoming the highest paid professional hacker in the world? Well, you should be a computer network security expert!?"

"How much is the annual salary?" Kevin asked. "And, what do I need to do?"

He knew that there was no free dinner in the world, and high returns required corresponding investment, but he didn't know what Fan Wubing would ask him to do? I believe that it would not be just maintaining the internal network system of the company.

"How about an annual salary of $1.8 million?" asked Fan Wubing. "Our company treats employees very well, but you need to change your identity. At least in writing, you can't call Kevin Mitnik anymore."

"A yearly salary of $1.8 million?!" After hearing this, Kevin's heart beat violently twice, "Okay! Not to mention changing his name, it's okay to change his gender!"

"Change gender? Do you really have this kind of consideration?" Fan Wubing asked curiously.

"Just just say it." Kevin said seriously.

Instead of taking Kevin back to the mainland, Fan Wubing arranged a fake identity for him, and sent six bodyguards to him. At the same time, more than a dozen staff members were driven by him to form a branch of the Paradigm Investment Group, a Paradigm Network Security Maintenance Company in Hong Kong. The company's supervisor was a confidant screened by Fan Wubing, while Kevin served as deputy director. In addition, he recruited technical talents in network construction and security maintenance in Hong Kong to form his own team.

As for the current task he assigned to Kevin, he was trying his best to invade Samsung's network, obtain their research data on LCD technology, and invade several major mobile phone manufacturers, and obtain core information on their mobile phone chips and software systems.

When Fan Wubing left Hong Kong, he thought that if Kevin succeeded in any of them, it would bring him immeasurable benefits. This benefit was enough to change his starting point in LCD technology and mobile phone core technology, and could allow himself to stand at a height that was almost the same as the major giants from the beginning.

Annual salary of 1.8 million US dollars is really cheap!
Chapter completed!
Prev Index    Favorite Next