Reborn Ace Hack

Chapter 420 Honey Pot

After moving his stiff body for a while, Xiao Yuan sat down again. Jiang Hua, Tiff and Kasperski saw him sitting down and gathered around him.

"You should go ahead and do what you are supposed to do. Don't stare like this, it will affect my working status." Xiao Yuan said to the three of them.

"Capa, Tiff, why are you two here here? Just go and do what you have to do. It's enough for me and Xiao Yuan to be here." Jiang Hua waved his hand and drove Kapersky and Tiff away, while he

I moved a chair and sat down, feeling like I would never give up until I saw what happened.

Seeing Jiang Hua like this, Xiao Yuan smiled bitterly, but ignored him.

Xiao Yuan tracked and analyzed the several addresses he just analyzed, and soon each address got an IP address list. The IP address sequence in the list shows the gateways and dns that need to be accessed in order to access the final destination.

The address of the server, router, and the last address in the address list is the final address of the IP address.

Comparing the list of IP addresses obtained by accessing each address, Xiao Yuan quickly locked two IP addresses. The server where those two IP addresses are located may be the server where the satellite design information is stored. Even if not, it must be the same as the server where the satellite design information is stored.

The satellite data storage servers are related. What is the situation? He needs to enter the servers corresponding to these two IPs to investigate before he can determine.

With the target in mind, what Xiao Yuan needs to do next is to scan these two addresses and obtain further relevant information about these two IP addresses, such as the server's operating system and server software information, as well as the server's open ports, etc.

, but before scanning, he needs to build a network springboard to protect himself first

Okay, the public access port of the mste site used in the previous information extraction of the mste site. All accesses are the same as ordinary users browsing the site and are completely legal. Therefore, Xiao Yuan did not build a springboard at that time, but the subsequent visits were

Many of them are illegal, and you must first hide yourself before proceeding.

The springboard setting strategy still uses a circular logic lock. The setting process took some time because it had to re-scan qualified broilers from above. During this period, Kapasky left Tiff behind and stood behind Xiao Yuan again.

As he operated, Xiao Yuan ignored him. He did not explain, and he was not worried that Kapersky could reveal the circular logic lock.

After setting up the springboard, Xiao Yuan connected the end of the springboard to one of the IP addresses he had just obtained. The next thing to do was a routine operation - scanning to obtain information about the intrusion target.

Xiao Yuan did not rewrite the scanning software, but downloaded it from his private space on the Xuannie Forum. At the beginning, he expected that he might use these things after coming to the United States, so before leaving, he downloaded it from Xuannie Forum

The community has specially opened a private storage space for itself, and placed some common tools that it uses conveniently in it in case of emergency needs.

After the scanning software was started, the information on the computer screen began to scroll rapidly. Before getting further information, Xiao Yuan could only sit in front of the computer and stare at the information on the computer screen and wait quietly. The room was quiet for a while.

When I got down, there was no sound except the humming of the fans in several computer cases.

"Capa, come here and help me." Tiff suddenly shouted. Not only did Kapaski tremble with fright, but he quickly ran over. Even Xiao Yuan and Jiang Hua turned their heads and looked.

Tiff, I want to know what she wanted to do with her sudden start.

"Intercept a few more sets of control information for me, I want to use them," Tiff stared at the full screen of hexadecimal codes on the computer screen and ordered Kapersky without looking back.

"Tiff, have you discovered anything new?" Jiang Hua asked.

"Some ideas need further verification. Don't disturb me now. I will tell you when I have the results." Tiff replied, while still not taking her eyes off the computer screen.

Xiao Yuan still admires Tiff. The control information separated from the satellite video stream is the most primitive binary string, and Tiff can actually analyze the corresponding information from these binary strings. It is really not simple.

Although Xiao Yuan believes that his information analysis ability is not weak, he is not a machine and does not have the ability to directly analyze binary data.

Hearing what Tiff said, Jiang Hua closed his mouth and stopped talking. Xiao Yuan looked at the scanning software on the computer in front of him and it was still being executed in an orderly manner, so he stood up and came behind Tiff, thinking

We want to see how she analyzes binary.

There was also a piece of paper in front of Tiff, with a lot of things densely written on it, including binary strings, some other symbols, and some icons and English abbreviations. Because the writing was very sloppy, without Tiff's explanation, Xiao Yuan

I can't see a reason either.

"Xiao Yuan, I suddenly had an idea. I will use a safer method to send some control information to ste011 later to see ste011's reaction. You should also hurry up." Tiff said.

"I know, I will hurry up." Xiao Yuan said. After speaking, he turned around and glanced at his computer screen. The scanning progress percentage at the bottom of the computer screen had reached 90%, so he walked back and sat on the computer.

After waiting for five minutes, the scan was completed and a result form was printed on the computer screen.

"It's the AIX server again." Looking at the results on the form, Xiao Yuan raised the corners of his mouth slightly and said softly.

Next, Xiao Yuan connected the springboard to the second IP address, started the scanning program, and then switched it to run in the background. He logged in to the Xuannie server again and downloaded several script files from his private space.

return.

Opened one of the script files, which was a script file written in perl language. Xiao Yuan made some modifications to it. Since there was no need to rewrite it, it didn't take much time. It was completed quickly.

When he finished modifying the script, the computer speaker sounded a prompt, but it turned out that the scanning of the second IP had ended.

Xiao Yuan saved the modified script file, switched the scanning software from the background to the front, and saw that the second server was also an AIX server.

"This saves a lot of effort. I hope it's not a honeypot or a system shadow, otherwise it will take a lot of effort." Xiao Yuan muttered to himself when he saw that the two servers were exactly the same type, and added

The vi that was editing the script file switched to the foreground, created a new copy, re-modified it and saved it.

After saving the file, Xiao Yuan switched the control software of the ring logic lock to the foreground, entered a command in it, and embedded the file name of the script file just saved into the command, and then hit Enter. The script

The contents of the file were automatically embedded into a network command and sent to the remote aix server. After a while, a lot of information came back and a text file was automatically generated.

Xiao Yuan did not immediately analyze the returned information, but connected the ring logic lock to the first AIX server, executed the same command, and also saved the returned information into a text file.

Xiao Yuan opened the two text files with vi at the same time, and compared the two text files using vi's own text function.

"It's really troublesome. It's really a honeypot!" Xiao Yuan couldn't help but cursed secretly when he saw that the result was as he feared.

Beep beep beep beep, a rapid alarm sounded, but the other party had already noticed Xiao Yuan's attempted intrusion and began to conduct counter-tracking.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like