Reborn Ace Hack
Chapter 008 Ring Logic Lock II
The next thing Xiao Yuan had to do was to select some computers from this list to invade and implant Trojans. He decided to do this process manually. He selected some computers with IP addresses abroad and running Windows 98.
As for the operating systems of Unix and Linux, he had no choice because the backdoor program he wrote could only run on Windows systems.
Xiao Yuan chose a computer in the United States that was running Windows 98 as the first target of the invasion. Since the Windows 98 system had just been released not long ago, it had the most vulnerabilities, and most of them had not been discovered, so Xiao Yuan
Without much effort, Yuan used a buffer overflow vulnerability in Windows 98 to invade this computer and successfully implanted his own Trojan into it. At this point, this machine successfully became the first broiler he had mastered after his rebirth.
.
Xiao Yuan had always been cautious when invading and implanting Trojans on this broiler, because all his intrusion commands were issued directly from his own computer. Although he disguised his real network address,
If you are unlucky and encounter a master, this master is very
It is possible to decipher Xiao Yuan's real address based on his intrusion instructions and carry out anti-intrusion or even anti-control on Xiao Yuan's computer. You must know that Xiao Yuan does not have any advanced hacking tools in his hands now. This situation is like his
It was like facing a samurai who was probably heavily armed with bare hands.
In fact, Xiao Yuan found that his luck was not that bad. The owner of the first computer he hacked was not an expert.
Next, when Xiao Yuan controlled the second broiler, he no longer sent it directly from his computer. Instead, he used his first broiler as a springboard. The instructions he issued were first sent to the broiler, and then
The Trojan horse he planted into the broiler was sent to the computer he wanted to invade, so that,
If his intrusion command is counter-tracked, he can only trace the broiler he used as a springboard. At this time, if the other party continues to track Xiao Yuan's real address, he must know the encryption method and usage of the Trojan.
network protocol, which will undoubtedly greatly increase the difficulty of the other party's anti-tracing.
After controlling the second broiler, Xiao Yuan set up this broiler as his second-level springboard, and then began to try to invade and control the third broiler, and so on, until he controlled twelve broilers. After setting up the springboard,
Just stopped.
When Xiao Yuan set up springboards, he did not use a straight-line setup, because no matter how many straight-line springboards were set, theoretically speaking, once the opponent cracked the first-level springboard, he could use the same method to set up other springboards.
Therefore, real masters have their own methods when setting up springboards. When Xiao Yuan sets up springboards, he usually uses a method he invented called circular logic lock.
The springboards set up in this way will logically form many ring structures, and the connections between the rings use a special encryption method. If a hacker discovers Xiao Yuan's intrusion and tracks him, he will
Falling into those ring traps, if the anti-tracking hackers don't understand the connection method between the logical rings set by Xiao Yuan, they will fall into the trap and never get out. Of course, it is impossible to trace Xiao Yuan's real network address.
Here, Xiao Yuan only controlled twelve broilers, so he only set up one logical lock. Even so, he believed that the number of people in the world who could really crack his own logical lock would not even take a slap.
The master control program of this logic lock is the remote control program he later wrote. All network commands are issued by this remote control program. At the same time, through springboards at all levels, the information uploaded from the computer he invaded is also received by this control program.
, and displayed.
After doing all of this, Xiao Yuan began to move the target to his final destination, the server of Jiangzhou University Artificial Intelligence Laboratory.
Xiao Yuan was very familiar with the IP address of the server for Jiangzhou University's artificial intelligence experiment in his previous life, so he did not need to scan it to get it. However, Xiao Yuan noticed that during the scanning process of the network scanner just now, the address was
Several major servers of Jiangzhou University have been scanned, and the addresses of several major servers of Jiangzhou University have been recorded in the broiler list file by the scanner. An undiscovered vulnerability has been obtained by the artificial intelligence experiment of Jiangzhou University.
Enter the administrator name and password of the room server, and then log in to the server remotely through the springboard.
Xiao Yuan's purpose of logging into this server is to find out who entered the server and stole his mother's research information. According to the memory of his previous life, all important information in the smart laboratory is stored in
In a unified ftp directory, he entered a few file retrieval commands. After a short time, the server-side file list was transmitted back through the network.
Xiao Yuan checked the file list and did not find the ftp directory in it.
"Holy crap, who is so cruel and deleted all the ftp directories? It's just hackers like this who destroy everything and smear hackers. What a bastard." Xiao Yuan cursed secretly, then entered two more commands, thinking
He wanted to bring up the system log and check it out. The system log file was a bit large, but the speed in China in 1998 was really not flattering. Therefore, it took him nearly ten minutes to create a log file that was only a few megabytes in size.
The transfer has just been completed.
Opening the log file, Xiao Yuan glanced at it and found that he seemed to have been fooled. What he had invaded was not the server of the artificial intelligence laboratory, but a honeypot system.
"Empiricism kills people and capsizes the ship in the gutter." Xiao Yuan felt very depressed. He estimated that the intrusion operations he had just performed had been recorded by the honeypot system, and his intrusion had been discovered, but he was not nervous.
, because the ring logic lock he set up is enough to protect him from being discovered by others.
As Xiao Yuan expected, just when he entered the honeypot as an administrator, a beeping alarm sounded in the computer room of the Jiangzhou University Artificial Intelligence Laboratory, and a chubby young man who was taking a nap suddenly woke up.
Come here and stare at the computer screen with bright eyes
, and at the same time, the mouse in his hand clicked, and a window recording the intruder's operations popped up, with information scrolling on it. If Xiao Yuan were here, he would find that the information scrolling in this window is exactly him
Every step of the way in this honeypot.
While the fat man was staring at the screen, he reached for the phone on the table and quickly dialed a number.
"Boss, a fish is hooked."
Soon, there was a rush of footsteps. A tall beauty in her twenties, four or five years old, wearing off-white casual pants and a light red bat shirt with a devilish figure walked in from outside and sat on another table.
In front of the computer.
"Anti-resolve the other party's address, be sure not to let him slip away!"
ps: In the new book period, please continue to ask for flowers and collections. If you like this book, please support Green Tea. Thank you. Your support is the driving force for Green Tea to update. If there are VIPs, Green Tea will be inspired and will explode more.
You'll Also Like
-
Douluo: I teach and educate people at Tianshui College!
Chapter 180 3 hours ago -
Elves: Starting from Different Color Lalulas
Chapter 383 3 hours ago -
After forcibly taking the blood of the sick and delicate prince to continue his life
Chapter 290 3 hours ago -
Douluo: Tang San is my brother
Chapter 366 3 hours ago -
Doupa: More sons, more blessings, I build the strongest family
Chapter 362 3 hours ago -
People are in Douluo, but they are struck by lightning at the beginning
Chapter 103 3 hours ago -
Fighting from the opportunity of gifting
Chapter 379 3 hours ago -
I'm in Konoha, I want to be Hokage
Chapter 217 3 hours ago -
When Huo Yuhao traveled through Douluo
Chapter 160 3 hours ago -
Douluo: My nanny is Bibi Dong
Chapter 259 3 hours ago