Reborn Ace Hack

Chapter 269 Unexpected result

"The enhanced version logged into the Xuannie Forum. The first thing that caught my eye was this title. The poster was the official ID of the Xuannie Forum.

"Enhanced version of CIH virus? What is this? Is there a new variant of CIH virus?"

A series of questions flashed through Xiao Yuan's mind, he opened the post, glanced at it a few times, and immediately took a breath of air. He stopped reading the content of the technical report for the time being, but quit the post and quickly browsed in the forum.

After reading it once, I soon had a general understanding of the whole incident.

"Who is doing this?"

"Did the Chinese do it, or did foreign forces take the opportunity to cause trouble on the day of the CIH virus outbreak?"

"Why didn't such a thing happen in the previous life, but it happened now? Is it because my rebirth changed some of the development trajectory of this world, which led to this incident?"

Xiao Yuan frowned, thinking about these questions in his mind, especially the last question, and what was directly related to this matter was that he reminded Tang Xinyu and Gu Lang to start the CIH virus.

"Is it because of this?"

"No matter what the reason is, it's best to find out the author of this virus, otherwise all speculations can only be speculations."

Xiao Yuan stopped thinking wildly. He couldn't sleep at this time anyway, so he might as well try to trace the source of the virus. After making this decision, he no longer hesitated, quit the forum, and began to prepare for the upcoming event.

Prepare for tracking.

This is easy to say, but not easy to do, because since the virus author can write such a perverted virus, he must not be mediocre. He must also think that once this virus is put on the Internet, there will definitely be countless people.

People are tracking him on the Internet, so before releasing the virus, he must hide himself properly. This is one of them.

Secondly, six or seven hours have passed since the outbreak of the virus. This long time is enough for the virus author to remove all traces of himself on the Internet. In order to prevent others from finding him, he is most likely to remove all traces of himself from the Internet.

After clearing the traces related to oneself, and then disconnecting from the Internet, this kind of situation

The situation is like a kite flyer who flies the kite in a place where no one can see it, and then cuts off the string in his hand. The kite flies away, and he also packs up his things and leaves. People want to pass

It is almost impossible to find a kite with a broken string and the person who deliberately avoids flying the kite.

Therefore, if Xiao Yuan wants to track this person on the Internet, to a large extent, he is doing something impossible.

Although Xiao Yuan thought that this matter might be impossible to accomplish, he was unwilling to give up and even said that he had to do it.

First of all, this person created this virus in just a few hours, almost destroying Xuannie Company's previous efforts, and even had a considerable negative impact on Xuannie Company.

Secondly, this matter did not happen in the previous life, but it has appeared in this life. So Xiao Yuan wants to know what the purpose of this person is to make a virus. Is he like Chen Yinghao, the author of the original CIH, who relies on his technical superman purely because he wants to challenge

Authority, or does it have some other purpose?

After making the decision, Xiao Yuan no longer hesitated. If he wanted to track the other party, he must get certain clues. These clues were naturally the virus information still circulating on the Internet. He needed to grab these poisonous information from the Internet.

data packets, and then statistically analyze the network address information contained in these data packets to find some clues.

Xiao Yuan's notebook has ready-made tools for capturing packets from the network. Now, the thinkpad600 in his hand, after continuous development and improvement some time ago, already has a large set of tools that can complete various network tasks.

Some of these tools he collected from the Internet, and some were designed by himself. Under his careful design, some of these tools have functions that are no less powerful than the original Snake Tooth tool.

What he lacks now is the signature code of the virus. There are various data packets on the network. If he wants to find the data packet containing the virus from so many data packets, the signature code of the virus is indispensable, so he enters again

He went to the Xuan Nie Forum, opened the technical report he had read before, found the section that recorded the virus signature, copied the signature from it, and saved it on his computer.

Next, what he still has to do is to hide himself. This is common sense that a hacker operating on the Internet should have. He will naturally not forget it, and it did not take him too long to set up the springboard this time, because he had previously mastered

There are still a lot of those chickens that can be used, enough to form a circular logical lock on the network.

After setting up this step, he set up a small packet capture tool stored on his computer, and then released it through a ring logic lock. This small tool is actually a network worm, which has the ability to automatically find a host through the network.

Infection and self-propagation function, but this tool is different from the enhanced CIH virus variant that is raging on the Internet. After entering the host computer, it will not destroy the host computer, but only performs one function, that is

Capture network data packets entering the host computer.

After capturing the data packet, this small tool will analyze the data packet. If it meets the conditions, the data packet will be transmitted through the ring logic lock to a high-performance Unix server located abroad controlled by Xiao Yuan, and use that

The powerful computing power of the server analyzes and summarizes the address information contained in the data packet, and then transmits the final analysis results back to his laptop.

In the above process, after he releases the packet capture tool, other links will run automatically without his intervention.

The reproduction speed of the packet capture tool is very slow at first, but its growth rate is exponential. That is to say, as time goes by, the infection speed will become faster and faster. Therefore, after this tool is released, within three minutes

Finally, the first host was found. After six minutes, the number of hosts had reached sixteen. After another three minutes, the number of hosts had reached sixty-four. After half an hour, the number of hosts had reached thousands.

Taiwan, and the number of hosts is still increasing at an increasingly high rate.

At this time, the master control software on Xiao Yuan's computer received the first piece of statistical analysis information from the foreign server. This information was obtained by analyzing more than 3,000 data packets captured by the packet capture tool.

The analysis results show that the source addresses of virus packets are evenly distributed, and no address has a particularly high probability. Such results are not informative.

Xiao Yuan had already expected this result. Three thousand data packets seemed like a lot, but it was not enough to draw certain patterns from them, so he put his laptop on the table and leaned against the bedside.

went up, picked up a book and started reading.

After reading for a while, Xiao Yuan got off the bed and came to the computer desk to look at the statistical results received on think600. At this time, thinkpad600 had received eleven statistical reports, and when it came to the last two reports, the analyzed data

The number of packages has exceeded 100,000, and the analysis results are no longer evenly distributed, but show very obvious characteristics of a normal distribution.

At this time, the remote server sent another analysis result. The number of analyzed data packets had reached 200,000. The normal characteristics of the source address distribution of these data packets were more obvious, among which the addresses with the highest probability of occurrence were

One of them is particularly eye-catching, that address actually comes from Xuan Nie Company!

ps: The update ends today.

There are some terms in probability and statistics in this chapter, such as distribution, average distribution, normal distribution. As for what distribution, average distribution and normal distribution are, you can search them on your own. Green Tea will not explain them anymore. Of course, these terms are not

The impact on reading can be ignored.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like