Battlefield Contractor
Chapter 2816: Internet Crime
Tang Kun stepped forward and stretched out his hand to Mr. K, "Can I see your tracker?"
"Of course, this is the latest device. Very tiny chips, implanted subcutaneously, and transmitting signals via satellite. Few devices currently can detect it." Mr. K handed the box to Tang Kun and said, "Very safe."
Tang Kun took it, but didn't even look at it. He squeezed the small metal box flat and placed it on the table.
"I only know the safest way that will not be detected, and that is to bring nothing." Tang Kun said slowly, "Any device that can transmit wireless signals may be found. And once checked When it arrives, it is a trivial matter that our lives are not guaranteed, and this mission will never be successful. Therefore, I will refuse to carry any form of tracker."
"But if you don't have this, how can we lock your position?" Mr. K frowned. "Can't you enter the interior of the Vanguard organization, but we don't know your location? Without a tracker, what should we do next?"
"There will always be a way, but our first priority is to get in. We have trackers, and we may not even be able to get in. I know that the CIA’s equipment is very good, but the secret agency’s countermeasures may not be worse than yours. . If we want to mix in safely, we have to be clean.” Tang Kun said slowly.
Mr. K looked at the squashed metal box and turned to Tang Kun with some doubts, "Who are you? Are you instructing us how to do it?"
"This is Mr. Tang." Lin Rui said, "The portable security consultant we asked Cobain for. All his views represent ours."
Mr. K frowned, "There is no tracker, no communication equipment, you have found their nest, how do you send the information?"
"This is our business." Cobain shrugged. "We are different from you, but each has its own way."
Mr. K said helplessly, "Okay. Since you insist, do what you want." He took out a card from his pocket, "This is the admission ticket. The location of the Extreme Hacking Summit is written on the card. Now, there is also a QR code on it. You must pass a specified camera within the specified time and scan the code to verify your identity before entering the venue."
Cobain took a look, and suddenly shook his head, "This is not a standard QR code. This special QR code uses another algorithm and becomes a system independently. Its role is to deceive you. These laymen."
"What do you mean, this is what our technicians got after solving the invitation puzzle." Mr. K frowned.
"Extreme Hacking Summit is like this. Every two years, the organizers will release a series of coding puzzles. As an invitation, only those who successfully crack it can enter the summit." Cobain looked at him, "but it is full of All kinds of traps, people who don’t specialize in hackers are easy to make mistakes. This card is an example. If we really hold this card to scan the QR code to go to the appointment, we can also go in, and there will indeed be a party, but there They are all peripheral personnel, worthless, not the real summit site."
"How come? This is the information that some of our technical experts cracked in two days." Mr. K frowned.
"As I said, your technicians may be very skilled, but they are not professional hackers and do not understand some of the established hacking rules." Cobain shook his head. "There are also some unwritten rules in the hacker world, which are difficult for outsiders. Understand. Using this rule, this card actually contains another layer of puzzles.
This special QR code has a corresponding relationship with the address above. If you untie them all according to this rule, and then rewrite them in sequence, you will get another brand new code. This method is vividly called gold panning. The final result is the real ticket. This card is actually just a cover, and it will lead you astray. "
"This...is it really?" Mr. K frowned.
"You think the Extreme Hacking Summit has been held for several years, but no one has found out what's going on? It's not because ordinary people can't reach the next level of thinking, but because they don't understand the deeper rules of the hacker world." Cobain nodded. Said, "Prepare me a decent computer, scanning equipment, a pot of espresso, and a pack of cigarettes. I think I can solve their hidden puzzles in one night."
Mr. K said suspiciously, "Are you really sure, there is another puzzle in it?"
"Replace it like a fake, prepare what I want, and give me another night. You can get the address you want tomorrow." Cobain smiled.
Cobain did not lie. In fact, he had not used the entire night to completely decipher the hidden information on the card. This is a simple set of codes, after reorganization, the result is a URL.
Cobain gave a whistle, "found it."
"It's so complicated, is it the website of the dark web?" Lin Rui frowned.
Cobain tapped the computer and smiled slightly, "No, it is not so easy to get a real ticket. This is the last test. The target is Vodafone, one of the UK mobile operators, and is currently the world's largest mobile operator. . I have to bypass their security protection and hack into a group of servers designated by them to obtain real tickets."
"Actually, this is already a crime." Mr. K frowned.
"Yes, if you want to enter the real hacker summit, you must first prove that you have enough cybercriminal capabilities. Welcome to the world of hackers." Cobain mocked while typing on the keyboard. After an intense operation lasting more than two hours, Cobain completed the invasion and obtained a set of codes. "This is the final ticket. Only those who get this set of codes are eligible to become the top."
"What is this? This is not even an address. How could it be an admission ticket?" Mr. K frowned.
"This is a leased safe in the Bank of England. We can obtain the key based on the information and then use this set of passwords to open it." Cobain nodded, "What's inside is the real summit address."
"What, this extreme hacker summit is not in the United States or Russia, but in the United Kingdom?" Mr. K said in surprise.
"I'm afraid it is." Cobain nodded. "I think we have to go to England. If you follow your previous card, it will be counterproductive."
"Damn it, I didn't expect you hackers to have so many tricks." Lin Rui smiled bitterly. But he also knew that, taking Cobain as an example, everyone who can mix in this circle is really smart. These hackers are not only smart and bold, but they also despise authority. This also makes them a target for cyber terrorists to solicit.
You'll Also Like
-
My Acting Skills Are Infinitely Refreshed, Starting From The Time I Don’t Eat Beef
Chapter 265 43 minute ago -
Fairy Tail: You Can Become Stronger By Spending Krypton Gold
Chapter 57 43 minute ago -
Through The Book, I Became The Stepfather Of Five Villains
Chapter 338 43 minute ago -
Fantasy: I Am Invincible With A Multi-Billion Increase At The Beginning
Chapter 354 43 minute ago -
At the beginning of making Honkai Impact III, my boss is Yaya
Chapter 118 56 minute ago -
My second brother Feijian is invincible in the world!
Chapter 197 56 minute ago -
People who enjoy comics will never die in Shura Field.
Chapter 161 56 minute ago -
In the comic book world, the reincarnation of leaves with super powers stops when the game is refres
Chapter 84 56 minute ago -
I Don't Want to Be a Heroic Soul
Chapter 102 56 minute ago -
Comprehensive comic, I fight against the weird and wonderful in the daily world.
Chapter 97 56 minute ago