Reborn Ace Hack

Chapter 660 Despised

After glancing at the tracking results on his notebook, Xiao Yuan decided to help Ninglan turn on the shadow copy function first, and then ignore it, because turning on the shadow copy function doesn't take long.

After entering the control terminal startup command at the command line, and entering the account and password, Xiao Yuan successfully entered the control terminal and found the shadow agent copy function. Xiao Yuan opened it and exited from the control terminal.

"This function is so magical and fun, Ning Lan, thank you, big brother." Ning Lan sent a message to Xiao Yuan.

"No need to thank me, this is a function you have. Brother just opened it for you." Xiao Yuan replied.

"Brother, go and do your work. Ning Lan has to study his shadow function. Goodbye." As if she had gotten a new toy, Ning Lan said hello to Xiao Yuan and stopped talking.

The result returned by adre is a socket. The so-called socket refers to a tuple consisting of an IP address and a port. The port in the socket is 80, which is the default port number of the http protocol. This port is suitable for Xiao

From a long-term perspective, the use value is not great. Most computers connected to the Internet will open this port. Because of this, no matter what operating system it is, there are very few vulnerabilities on this port. Therefore, when a hacker invades a computer,

This port is generally rarely used.

However, with the other party's IP address, Xiao Yuan can use some tools to scan the other party's host, and then obtain the other party's computer operating system and other ports open on the system, and use these ports to enter the other party's computer.

This job is very familiar to Xiao Yuan. Compared with anti-tracking, which he is not familiar with, his intrusion ability is stronger. Before trying to scan the other party's computer, Xiao Yuan first made some preparations to prepare for himself.

He built a few springboards and habitually formed a circular logic lock. However, after forming the circular logic lock, he hesitated and adjusted the circular lock strategy before starting to scan the opponent's computer.

.

The scan went very smoothly, far exceeding Xiao Yuan's expectations. The result returned was that the other party was using a Windows system. This is not the point, because the Windows 98 system can also be sorted out in the hands of an expert. Unix and Linux can also be sorted out.

The hands may also be full of loopholes. What surprised Xiao Yuan was that this tool successfully logged into the computer after sending a few commands.

"How could this happen? Could it be that this is a honeypot?

"Or is it a springboard for the other party?"

"..."

Xiao Yuan quickly withdrew from the remote system, and instantly thought of some possibilities based on his own experience. Of course, it was not unreasonable for him to think so, because he could invade his computer silently, pretend to be an intelligent agent, and even

Even if the hacker who stole his data and files was using a system that was led astray by Adre's tracking, if this is possible, the other party would really be in trouble." Xiao Yuan finally thought of another possibility.

What was the truth? Xiao Yuan felt that he still needed to go into the computer and investigate carefully to see if he could find any clues. He logged in to the remote Windows 98 and began to carefully check the system.

The result was a bit disappointing to him, because he didn't find any valuable information from this computer, and he didn't even install any monitoring software. Once, he deduced that this computer was not a honeypot.

"If it is not a honeypot, there are only two possibilities left. Is this computer a springboard on the way to find the other party, or is it a fork in the road that is led by the other party?" Although adre has an automatic search function, Xiao

Yuan has not used it before, but has been using the more accurate and efficient manual designated tracking exit. The reason why he used the automatic function this time is because he did not use the automatic function from the other party's computer.

No abnormal data was found, so he wanted to take a look at aadre and returned the initial execution results: a suspicious data link was found, should reverse tracking be performed? adre started the anti-tracing process, and the return results of this tracking were also smooth, Xiao Yuan

After getting the result, I scanned the host at that IP address again, and the result was that the other party was still a Windows 98 system full of vulnerabilities.

"This is most likely a trap by the other party."

After getting such a result again, Xiao Yuan subconsciously made this judgment, because before he invented the circular logic lock, he had also used this method to mislead others, but at that time, in order to confuse the other party, he would deliberately put these

The security of the nodes used to confuse the other party has been improved, and he believes that most hackers will do this if possible when counter-tracing, but now this guy has left some nodes full of vulnerabilities to him, so that

He felt the other party's unabashed contempt for him.

Xiao Yuan did not feel angry because of the other party's contempt. On the contrary, he was a little lucky. Always paying attention to and being vigilant about his opponents is a basic quality that a hacker should have. Contempt means underestimating the enemy. A master will lose his life because of underestimating the enemy.

The example at hand is not that it has never happened, not to mention that he did not

Not a script kiddie. Adre conducted several tracings, and when the results were the same as the previous two times, he was ready to give up. Adre deleted the bridge terminal and was about to cancel the springboard, but the springboard monitoring terminal on his computer failed.

There was an alarm sound, someone was trying to crack his springboard.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like