Reborn Ace Hack

Chapter 486: Fisherman's Benefit

During this period, the three Brians continued to try various methods, trying to take back the administrator rights from chn_honker, but the other party seemed to know the methods they could use so well and were so comfortable with them that they relied on their own

The efforts to regain the server management rights were becoming more and more desperate, and at this time, Frank's shout gave them new hope. "Ker?" Brian asked.

"Don't argue, it still needs some time." Frank waved his hand, interrupting Brian's question. After a brief excitement, he calmed down again, because the tracking software prompted that after the first layer of protection logic, there was still

There is another protection logic, and according to common sense, the second layer of protection should be more complex and strict than the first layer of protection. Therefore, if you want to track down chn_honker, you can find it and help them solve this crisis, even if you scold them

, they will also endure it.

Frank buried his head in front of the computer and sent out another series of commands. Information analysis and extraction for the second layer of protection immediately began.

Frank originally thought that the second level must be more complicated than the first level, and information extraction and analysis would definitely take more time. However, the reality was somewhat different from what he thought. After more than ten minutes, the information extraction and preliminary analysis were completed.

The analysis is over.

"It's over so soon?" Frank was so surprised, even a little unbelievable, that he checked the results several times before confirming the result. Ker put the most complex defense on the first level, it should be like this

Yes, the first layer of protection logic design is very clever. This is the first time I have seen such cleverness.

Wonderful protection logic, if you follow the normal thinking to crack it, you will definitely be dragged into an endless loop. chn_honker should be very confident in his own protection, thinking that no one should be able to crack the first layer of protection. It is a pity that he forgot that they have a Chinese saying

As the saying goes, there are people outside the world, and I am the outsider?"

Frank quickly found a reason that sounded very reasonable and explained it to himself. I have to say that this guy is very conceited and has such strong confidence in his own skills that he doesn't think about it at all.

His tracking direction has been taken to another direction by the person sitting across the network who knows him well, and that person is currently sitting in front of the computer, staring at the computer screen, stroking his chin and laughing evilly.

After thinking about it, Frank input the information he obtained into another analysis software and began to conduct secondary analysis on the information. The analysis speed was also much faster than the first layer of protection.

"Well, the logical structure of the second layer of protection is also very sophisticated. The tracking complexity will also increase rapidly with the increase of nodes. However, compared with the ring structure of the first layer, it is still simpler. This kind of setting logic can deal with

It's enough for ordinary people, but it's a pity that he met me and deserved bad luck." After the secondary analysis results came out, Frank secretly evaluated the setting logic of the second layer of protection, and at the same time sent the analysis results to the tracking software.

After the tracking software obtains the setting policy configuration file of the second layer of protection, the tracking continues. This time the tracking is still faster than the anti-tracking speed of the first layer of protection, and the results will be obtained soon.

"Brian, go find old man Thomson and come over." After the results came out, Frank directly ordered Brian.

Brian was very excited because Frank asked him to find Thomson, which meant that the tracking was likely to be fruitful. Furthermore, it also meant that this crisis would soon be over, so he almost trotted out of the server room.

, five minutes later, Thomson was almost half dragged and half dragged to the server room. Ker's IP address is here, and I won't be needed for the next thing." Frank saw Thomson walking in.

, stood up from the seat, walked over, patted the old man on the shoulder, and said with a smile.

"I know you won't let me down, Brian. Find out where this address is right away. If you have the result, come to my office and report to me. Frank, are you interested in going to my office for a cup of coffee?" Thomson said.

I was very happy. After giving Thomson an order, I smiled at Frank and said.

"It's an honor. Please wait a moment while I pack my things." Frank said with a slight smile.

…………

When Frank got the tracking results, Xiao Yuan also got the tracking results almost at the same time.

What he just did was to plug the ring logic lock outside of fly007's springboard. The purpose was to confuse his old friend and make him mistakenly think that his ring logic lock was the first layer of protection, while fly007's own springboard was the second layer.

Protect, and then mislead an old friend to let him locate the tracking target to fly007, so that he can take advantage of it.

Based on his understanding of old friends, Xiao Yuan also made some settings when grafting the ring logic lock to fly007's springboard. Such settings will transmit the data back to Frank when he extracts the analysis data from the network.

A copy of it on his computer, based on what he said about it

An old friend knows that his old friend usually uses this special data packet to confirm whether the IP address obtained is the final result of the tracking. If so, a flag bit in this data packet will be filled with 1.

If not, this flag will be filled with zeros.

After Xiao Yuan intercepted the data packet, he only needed to see whether the specific bits in some data packets were 1 to know whether the IP address contained in the data packet was the final result tracked by an old friend.

The superb anti-tracking technology of his old friend did not disappoint Xiao Yuan. He only waited for half an hour before he got that special data packet. Therefore, when Frank got the real address of fly007, he also got the real address.

address.

After Xiao Yuan got fly007's IP address, he immediately checked the source of the address. The result surprised him because the address actually came from Berkeley.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like