Reborn Ace Hack
Chapter 187 Collective betrayal
"This seems to be the network address of our Jiangzhou Telecom!"
Gu Lang was very familiar with Jiangzhou's IP address range. The moment this address was tracked, he recognized that it came from Jiangzhou.
"Can you find out where this address comes from?" Xiao Yuan asked.
"The geographical location is easy to check. The specific unit, I'm afraid Telecom will not make it public." Gu Lang said.
"Leave it to me, I'll check it," Tang Xinyu said, taking a pen and paper and writing down the address before going out.
"Prepare me a computer with a programming environment, and I will prepare a big gift for this friend." Xiao Yuan said to Gu Lang.
"I'll take you."
Gu Lang took Xiao Yuan to the company's development department and asked: "What development environment do you want?"
"VC will do." Xiao Yuan said. For development under Windows, the most flexible and powerful one is VC. The current Xuan Nie Firewall is what Xiao Yuan originally used in the VC6.0 development environment, using C++ and
Developed jointly by the assembly.
"Come on, this machine is equipped with it." Gu Lang led Xiao Yuan to a computer and helped him turn on the computer.
"Okay, I'll just stay here. You should go back to the network department and keep an eye on it. The feature analysis of the firewall should come out at this time. If those adres are copied to the computer, then open vc6.0 and create a new win32 project.
, because what I want to write is just a temporary small tool, and no advance system design is required, just type the code directly.
While he was writing the code, Jiang Hua came over because Xiao Yuan had no time to pay attention to him. He watched Xiao Yuan type the code for a while and then left again. Later, Tang Xinyu came again and brought Xiao Yuan a message, that IP
It is the IP of Tianlong Company.
This news surprised Xiao Yuan, but after thinking about it, he easily figured it out. Xuannie Company and Tianlong Company are both newly opened network security companies, and coincidentally, the core products promoted by the two companies are
It's a network firewall, so invisibly, the two companies have become commercial competitors, and it is reasonable for the other party to deliberately attack Xuan Nie.
"I just don't know how much Zhang Dalong paid to invite Sardines here?" Xiao Yuan thought to himself, based on his understanding of Sardines, this guy is extremely obsessed with money. If he had to do it himself, he wouldn't have a hundred thousand dollars.
I'm afraid it won't be possible. Of course, we don't rule out the possibility that Sardine only provided technical support and didn't directly take action. In that case, the price Zhang Dalong would have to pay might be smaller.
"Is Black Jack who invited Gu Lang to join blackskull last time also in Zhang Dalong's company? Did he find Sardine?"
"No matter what the situation is, since you have met me, be prepared to receive a big gift."
Almost for an instant, Xiao Yuan's hand didn't stop coding, but his mind was spinning several times.
It took more than an hour to complete the coding work. Xiao Yuan compiled the debugged program into an executable file, copied it to a floppy disk, and returned to the network department.
"What's going on now?" Xiao Yuan asked.
"It's still the same attack method as before, but this time these IPs seem to have intelligence, and they seem to have found the pattern of traps automatically set by the second layer of protection. Although there are not as many IPs entering the second layer of protection as last time,
But the cracking efficiency is much higher than last time. If you hadn't enabled the kicking function, you really wouldn't be able to resist this time. You have to think of a long-term solution. It's so annoying to come in batches like this.
." Gu Lang said.
"To make the opponent stop attacking, the conventional method is to block all the opponent's broilers, and then cut off the attack master. Give me the computer, and I will give Tianlong Company a big gift. They accepted this
It’s such a big gift, it shouldn’t take care of us.” Xiao Yuan said. Adre established a virtual channel from the Xuannie server to the host with the IP address just detected, and then the software written by Xiao Yuan became a
A cannonball can be dropped by the firewall to the other party's computer through this channel.
In order to ensure that he can put his code into the other party's computer, Xiao Yuan needs a very clever data package. This data package can use the vulnerability to open a backdoor on the other party's computer, allowing Xiao Yuan to quietly insert the software he wrote.
Of course, this prerequisite is that the other party is using a Windows system. If the other party is using a non-Windows system such as Linux, Xiao Yuan's efforts may be in vain.
After all the configurations were completed, Xiao Yuan used the packet capture function of the firewall to capture several http packets, then selected one of them and modified the packet. The advantage of this is that Xiao Yuan did not need to do it himself.
Designing this data package from scratch saves a lot of time.
It took Xiao Yuan more than twenty minutes to design this data packet. At this time, more and more IP connections with certain intelligence broke into the firewall. If the second layer of defense of the firewall hadn't been kicking people out, I'm afraid the firewall
It was really going to be broken by the opponent's infinite intelligent sardines. The channel established by adre sent his pre-designed data packet.
Soon, a message was returned after sending the data packet. Xiao Yuan was overjoyed because the other party was using a Windows system and the vulnerability he knew still existed. The code contained in the previous data packet had already exploited that vulnerability.
A backdoor was opened on the other party's computer.
Xiao Yuan once again typed a few lines of commands in the firewall control window, sent the program he had written previously, and installed it on the other party's computer.
The first step for this software to enter the other party's computer is to generate a service process in the system, and then delete itself. The next work is left to the service to handle itself.
The first step of this service is to generate a list of the processes running on the other party's computer and send it to Xiao Yuan's computer.
Xiao Yuan carefully observed the list and found a very familiar process in it, so a look of understanding appeared on his face and he secretly said: "It is indeed him!"
After getting the information about the other party's running program, Xiao Yuan issued a command to the service in the other party's computer and also sent the other party's IP address.
"It's done, these nasty sardines will disappear soon." Xiao Yuan said with a calm smile.
"What did you do on the other party's computer?" Gu Lang had been carefully watching Xiao Yuan's every move and did not ask until Xiao Yuan stopped and then asked.
"It's nothing. I just want those sardines to turn against each other, so that we can stop." Xiao Yuan said with a calm smile.
You'll Also Like
-
The Emperor's Dominance
Chapter 2220 2 hours ago -
Simultaneous traversal: All Abyss difficulty
Chapter 181 2 hours ago -
I'm almost reaching the maximum level of evil god, and you're advising me to change my job
Chapter 179 3 hours ago -
Hunter: I became stronger even after I died
Chapter 121 4 hours ago -
After I became a villain master, my beautiful apprentice fell in love with me
Chapter 117 4 hours ago -
Simulate a thousand times, I have a method to speed through the escape game
Chapter 518 4 hours ago -
Return to Singapore 1995
Chapter 562 4 hours ago -
Hunter x Hunter: Pokémon Master, the World's Strongest
Chapter 475 4 hours ago -
The Wizard: From Zero-Ring Wizard to Almighty Lord
Chapter 64 4 hours ago -
Xiuxian Baiyi System, I know everything
Chapter 638 4 hours ago