Reborn Ace Hack

Chapter 272 Video

Looking at the Class A address on the computer screen, which was not available in China, Xiao Yuan frowned deeply and at the same time realized the seriousness of the matter.

"Is that the end of it?"

Xiao Yuan was extremely unwilling, so he decided to go to the place where this IP was located to see who was causing trouble.

No matter how clever the method is to intrude into other people's computers, the steps are the same. Exploring the other party's operating system, scanning ports and vulnerabilities, and then taking corresponding measures according to the specific situation. The difference between masters and inferiors is that when masters do these things, they are concealed.

Stronger, more diverse and flexible means.

In order to hide himself from the other party, Xiao Yuan scanned the IP address through the Xuannie server, because the other party has been maintaining a connection with the Xuannie server, and at a fixed time, it will send a message to the Xuannie server.

Send a service request, and the service request packet contains a short script code fragment. The code fragments contained in the four service request packets will form a script code with complete functions. This code is on the Xuannie server.

The purpose of execution is to obtain the system log of Xuannie server.

Based on this, Xiao Yuan judged that the other party must be an intruder, so he counter-tracked the other party, but ended up tracking him abroad.

Now, Xiao Yuan is preparing to attack Zi's shield with Zi's spear. Since the other party will embed script code in the command, he can do the same, and he does it more secretly because he embeds the code into the system log data obtained by the other party.

In the package, this code will return a series of information about the other party's computer after the system log packet arrives at the other party's machine.

Because the other party is likely to be an expert, when a regular script is executed, the other party will most likely be discovered. In order to avoid this, Xiao Yuan also put a lot of thought into designing this script and added

A piece of judgment code is written. This judgment code will first detect the operating system type of the other party's computer. After getting the type of operating system, the following code will perform different operations for different operating systems based on the results obtained by the previous judgment code.

After writing this code, Xiao Yuan placed a hook program on the Xuannie server. The function of this program is to intercept the log data packet sent by the server to that IP from the bottom of the system. After intercepting the data packet, Xiao Yuan wrote

The script code is embedded into the data packet, and then the processed data packet is released.

After doing all this, Xiao Yuan stopped temporarily, waiting for his script to return the basic information of the other party's computer. While waiting, he called Xuannie Company again and told Tang the result he had just discovered.

Xinyu, let him prepare for the worst and find ways to deal with it in advance.

After making the call, Xiao Yuan had obtained relevant information about the other party's operating system on his computer. Like him, the other party's operating system was Windows 98.

This result made Xiao Yuan stunned for a moment, because Xiao Yuan believed that since the other party could bypass the Xuanni firewall and enter the Xuanni server silently, he must be an expert. And when an expert uses the Windows 9x system when conducting network intrusions, it is

A rare thing, although Xiao Yuan also used w before

Windows 98 was used for intrusion, but it was conditional at that time. Once he met the conditions, he never used that system with Windows 98 to do intrusion. Only Xiao Yuan used that computer when he wanted to write some Windows-based programs.

Until then, it has been idle the rest of the time.

Of course, the other party is using the Windows 98 system, which is a good thing for Xiao Yuan, because this system has inherent limitations, and it has just been launched for a year, and there are still many loopholes that have not been discovered, and these will

Provide great convenience to Xiao Yuan.

After confirming that the other party was using the Windows 98 system, Xiao Yuan wrote a script again and sent it to the other party's computer through the Xuannie server. This time he directly exploited a vulnerability in Windows 98, and his approach was bolder than before.

Some.

Through this code, Xiao Yuan easily logged into the other party's computer remotely and began to explore the other party's computer. Soon he made new discoveries. He found a piece of assembly code on the computer and sent it back to his own computer.

After getting on the computer, he read it briefly and found that this code was the assembly code of the CIH virus that wreaked havoc on the Chinese network a few hours ago.

Xiao Yuan looked at the code on his computer and was stunned again. Things went smoothly beyond expectations, so smoothly that he couldn't believe it.

"Is it really that simple?" Xiao Yuan murmured to himself, and then he felt relieved. In any case, he found the source code of the virus from this computer, which showed that the other party should be the culprit.

Knowing that the other party was the culprit, Xiao Yuan did not feel relieved because he knew that relying solely on the information he obtained through anti-tracking and the virus source code obtained from the other party's computer would probably not be of much use.

Even if Xuan Nie takes Xiao Yuan's discovery as evidence, it will not explain any fundamental problem. Moreover, since the other party wants to throw dirty water on Xuan Nie, they can find many ways to counterattack this evidence and insist that these evidences are Xuan Nie.

I'm afraid many people will believe that Xuan Nie forged it, and the other party may even regard the virus source code that Xuan Nie produced as evidence that Xuan Nie is the mastermind behind the entire incident.

Therefore, Xiao Yuan had to look for further evidence. He executed several network commands on his own computer and waited for a while. The script implanted in the other party's computer returned a process list. He wanted to find the process in the other party's computer.

Some further evidence.

In the process list, there is a process that caught Xiao Yuan's attention. The name of that process has the word camera. Camera means camera.

"The other party's computer should be equipped with a camera." Xiao Yuan quickly made a judgment, and at the same time, he thought that if he could steal the video data collected by the other party's camera, it might be a breakthrough point.

It is not difficult to intercept the other party's video data. You only need to write a hook program to do it. However, the amount of video data is very large, and the bandwidth currently used by Xiao Yuan is not enough to support such a large amount of data transmission. It seems that only

These videos are transmitted back to the company, and the company's bandwidth is sufficient.

Thinking of this, Xiao Yuan acted quickly. After making preparations, he picked up the phone and called out. He gave Tang Xinyu these instructions. After putting down the phone, he started further work.

…………

At the headquarters of Xuannie Company, after Tang Xinyu put down the phone, he quickly left the office and went to the network department. He found Gu Lang who was monitoring every move on the server and conveyed Xiao Yuan's instructions to him.

Xiao Yuan asked Gu Lang to allocate enough bandwidth to a computer, and then prepared to receive the video data uploaded by Xiao Yuan from the other party's computer. This task was very simple. Gu Lang was soon ready and then called Xiao Yuan.

, and told Xiao Yuan the IP address of the computer he had prepared.

After hanging up the phone, Gu Lang opened the video receiving software, and together with Tang Xinyu and other employees of the network department, they were waiting for the video data to arrive. They felt a little curious at the moment, but more nervous because Xiao Yuanchuan

Before the video arrives, no one can be sure whether the returned video will contain the evidence they want. Xiao Yuan himself cannot, nor can Gu Lang and Tang Xinyu.

After waiting for a few minutes, the playback window on the video receiving software flashed, and the video data stream arrived. Everyone's heart was in their throats at this time, and the only sound left in the network was people's breathing, and the occasional transmission.

There were one or two times because of the sound of nervous swallowing. yjesus, damn..."

A burst of heavy breathing and a man's roar rang out from the computer speakers, breaking the silence and tension in the Luo Department.

Everyone's eyes widened instantly. The visual and auditory stimulation brought to them by the two men having a fierce interaction in the playback window was so great that everyone including Gu Lang and Tang Xinyu instantly forgot about it.

What on earth are they waiting for?

ps: The gay moment has arrived, do you have any votes, haha...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like