game dynasty
Chapter 216 Tracking
Chapter 216 Tracking
Time passed quietly. When it was a little bit, the monitoring had shown that the computer that was connected to the connection was not closed. [] Of course, the computer occupied by the server and Ge Jun was not closed.
At this time, Ge Jun also successfully completed the latest remote control procedure of Trojan horses, which can detect any movements on the server, and even show the desktop of the target computer in a 16 -bit color manner. However, since the opponent is also the top top
As long as you are a little more careful, you can make an abnormality from the data packet, so the desktop display will not start. (The Trojan horses implanted by automatic version of antivirus software in the morning are relatively simple.)
When Ge Jun completed all this, Liu Xianhe and Dong Xinwu had been watching. In the end, Liu Xianhe and Dong Xinwu cried and laughed. Compared with Ge Jun, their own tools were simply seeing the cannon guns.
It's.
However, it is puzzled that Ge Jun and Liu Xianhe are a little puzzled. When Ge Jun used the latest control program to scan the entire computer, but did not find that the Trojan service side of the other party was suspected.
Then, then
At one point, the red light instructions on Ge Jun's monitoring procedure suddenly turned on. Dudu's alarm made all the drowsy people's spirit at the same time at the same time!
"Come!" Ge Jun said with a steady stream of data.
"They really came through the dial -up program. Well, I started to pass the service side. Can I get a copy of it?" Ge Jun turned back to Liu Xianhe while he was constantly refreshing data, "Wait for you to know this."
"OK." Liu Xianhe nodded happily.
Soon, with the upload of the other party's server, Ge Jun also immediately used the advantages of broadband plus LAN to immediately grab the entire server side!
Ge Jun's access method is to control Yang Chaoran's computer through broadband, and then enter the inner aspect through Yang Chaoran's computer.
The technology made Ge Jun secretly say that it is necessary to know that if Yang Chaoran's computer is not hidden into online, then the opponent is likely to scan whether there are other computers on the line as soon as possible.
Or delay and rise to alertness.
Sure enough, if Ge Jun expected, Ge Jun cut the server planted by the opponent at almost a second after a second after the speed of lightning, and one second after wiking the operation log, the opponent started the server and remotely controlled remote control.
Then, then
"It's done! Sure enough, he was scanned for the first time
Group! "Wipe off the sweat beads on his forehead, Ge Jun is grateful to Dong Xinwu at a glance if it was not Dong Xinwu, it is estimated that this level would not be better.
Dong Xinwu is hidden in a curved. In comparison, Dong Xinwu's move is much better.
With a smile, Dong Xinwu pursed the tea, then took the service samples from Ge Jun, unplugged the line of his computer before inserting the premium disk. It was sophisticated and cautious.
"Well, they still used a springboard this time, target
It is 6113678232. "Ge Jun kept passing the latest data reported by it.
"Henan's." I didn't think about it, and Liu Xianhe reported the region. "This
I came to track, the old Dong analyzed the Trojan sample. By the way ... Xiaojun, can you copy your control end to me? "
Obviously ... Ge Jun's control program has exceeded the functions of Liu Xianhe and others too much.
What needs to be explained is that those who can use a hacker software are not exactly that hackers are often hacked. They use scanners to scan the vulnerability everywhere and be proud called RKER, or script children.
It is a large amount of linked knowledge and assembly knowledge. They can even complete a perfect invasion without using any tools. Of course, there are tools that are not used instead of playing with a large number of orders to complete the invasion.
… The same is true, almost every top master has a set of hacker tools and Trojan dictionaries he made.
After listening to Liu Xianhe's request, Ge Jun smiled and nodded without hesitation. At the same time, he took Xi Ding's U disk to copy his computer's program.
However, when Liu Xianhe was preparing to sweep the cat, Dong Xinwu stopped: "Wait, let me first make the analysis and then do it."
"If the opponent's server has anti -scanning function, then we should still be careful." Dong Xinwu added.
Ge Jun raised his eyebrows, but Liu Xianhe nodded like he realized.
It seems that Ge Jun's doubts explained that Dong Xinwu rarely smiled and explained, "There are so many cases we have contacted, and one of the Duke of a foreign hacker has such a control system.
By the way, according to the news, it is indeed possible to scan on the meat chicken to achieve the purpose of evasive tracking. "
"Duke?" Ge Jun nodded thoughtfully, "Well, let's analyze it better. By the way, you pay attention whether this code is
RNE's identity. "
"
Prince RNE? "Dong Xinwu repeated.
"It's Prince, if right, the Duke you just said is a team.
Liu Xianhe and Dong Xinwu looked at, "Are you talking about the vampire kingdom?"
"This is this vampire kingdom!"
※
Perhaps it was knowing that this was the last chance. Karlev's movement was not as relaxed and comfortable as his expression. On the contrary, he became more careful.
Such a move is indeed a bit abnormal in Powell, but for Powell, it is obviously a good thing for Powell to become cautious. This is obviously a good thing.
"
After the group scan is completed, no other computer is turned on. "
"The Trojan scan is completed, and no other server is found."
"The system log scan is completed, and no suspicious operation is found."
Listening to the report of Kalev's sinking reports, Powell's expression became relaxed.
"If we can bring Duke York's service side, it will be more perfect." Carev sighed after confirming the last operation.
Powell was suddenly surprised to know, Kalev and York have not been very harmonious.
Without paying attention to the expression of his companion, Kalev took a sip of coffee and finger like Fei: "Okay, guidance, prepare all the answers, I want to simulate M and users."
※
"After analysis, you can scan."
The spirit of everyone in the room was gathered. For a while, the ratio was silent, and only the hanging clock on the wall sounded in Didi, marking the passage of time.
With the analysis of the server, Liu Xianhe also opened the scanner at the same time to the
After a moment of scanning, after a while, the access permissions were obtained for a door that had been opened.
Next is to find a visit
Liu Xianhe has reason to believe that when the opponent puts his full energy under the invasion, it is impossible to notice this small interview.
"Speed, Lao Liu, their second set of server is also implanted, this is an analog M address."
"OK, it's done, the address of the next layer of springboard is 6121112468." quickly answered, Liu Xianhe's fingers kept flying on the keyboard.
In the disappeared, the two gangs began to fight against time.
On the one hand, Ge Jun needs to obtain the actual address of the opponent before the opponent's thorough cracking password, and on the other hand, the opponent must get Liu Xiang's password at the fastest speed ... and more terrible is that the process of tracking cannot
There is a little negligence.
Time is very urgent, and it seems very slow.
Ge Jun kept reporting the opponent's process through feedback information, and Liu Xianhe kept scanning, uploading the server, and then bypassing all places that might be dissatisfied to find and analyzed the next layer of springboard.
Yes, the current two springboards are analyzed in succession
The number of connections is very small.
"Oh! This may be the server! There are more than 400 connections!"
With Liu Xianhe's exclaiming, everyone's face changed together!
Currently connecting to more than 400! This means that there are at least 400 computers at the same time, that is, four hundred computers may be the next four floors! If you want to be in more than 400 pieces
Find the real invaders' springboard ... The face of Xi Xiaoding, who was still worried about, was white.
On Ge Jun's computer, a row of numbers also clearly jumped out at this moment.
"President Liu is visiting the server."
"Scan! Then implant my Trojan, do the other computer exist if there is a service side. If so, catch it directly. If not, use my horse to track and cut it!"
After Ge Jun finished speaking, sweat beads had been secreted on his forehead.
Truth, this is a gambling. If it is aware of the opponent, then all anti -tracking will lose.
You'll Also Like
-
Practice starts with skill points
Chapter 564 7 hours ago -
1890 King of Southeast Asia
Chapter 910 9 hours ago -
The other world starts with debt
Chapter 150 9 hours ago -
Witch Alchemist
Chapter 368 9 hours ago -
The Witcher: The Journey to Transcendence from Marvel
Chapter 435 9 hours ago -
StarCraft: Becoming the Zerg Overlord
Chapter 405 9 hours ago -
Everyone cultivates immortality, I dominate the world with my derivatives
Chapter 121 9 hours ago -
No, how did my electronic girlfriend become a sword fairy?
Chapter 123 9 hours ago -
I met the school beauty, and all my boasts came true.
Chapter 313 16 hours ago -
All people change their jobs: I am the origin of blood
Chapter 250 16 hours ago