Reborn Ace Hack

Chapter 008 Ring Logic Lock II

The next thing Xiao Yuan had to do was to select some computers from this list to invade and implant Trojans. He decided to do this process manually. He selected some computers with IP addresses abroad and running Windows 98.

As for the operating systems of Unix and Linux, he had no choice because the backdoor program he wrote could only run on Windows systems.

Xiao Yuan chose a computer in the United States that was running Windows 98 as the first target of the invasion. Since the Windows 98 system had just been released not long ago, it had the most vulnerabilities, and most of them had not been discovered, so Xiao Yuan

Without much effort, Yuan used a buffer overflow vulnerability in Windows 98 to invade this computer and successfully implanted his own Trojan into it. At this point, this machine successfully became the first broiler he had mastered after his rebirth.

.

Xiao Yuan had always been cautious when invading and implanting Trojans on this broiler, because all his intrusion commands were issued directly from his own computer. Although he disguised his real network address,

If you are unlucky and encounter a master, this master is likely to decipher Xiao Yuan's real address based on his intrusion instructions, and conduct anti-intrusion or even anti-control of Xiao Yuan's computer. You must know that Xiao Yuan does not have

With any advanced hacking tool, this situation is like facing a samurai who is probably fully armed with his bare hands.

In fact, Xiao Yuan found that his luck was not that bad. The owner of the first computer he hacked was not an expert.

Next, when Xiao Yuan controlled the second broiler, he no longer sent it directly from his computer. Instead, he used his first broiler as a springboard. The instructions he issued were first sent to the broiler, and then

The Trojan horse he implanted into the broiler is sent to the computer he wants to invade. In this way, if his intrusion command is counter-tracked, it can only be traced to the broiler he used as a springboard. At this time, if the other party continues to track

If you want to know Xiao Yuan's real address, you must know the encryption method and network protocol used by the Trojan, which will undoubtedly make the other party's anti-tracing difficult.

After controlling the second broiler, Xiao Yuan set up this broiler as his second-level springboard, and then began to try to invade and control the third broiler, and so on, until he controlled twelve broilers. After setting up the springboard,

Just stopped.

When Xiao Yuan set up springboards, he did not use a straight-line setup, because no matter how many straight-line springboards were set, theoretically speaking, once the opponent cracked the first-level springboard, he could use the same method to set up other springboards.

Therefore, real masters have their own methods when setting up springboards. When Xiao Yuan sets up springboards, he usually uses a method he invented called a circular logic lock. This method is used to set up springboards.

The springboard will logically form many ring structures, and the connections between the rings use a special encryption method. If a hacker discovers Xiao Yuan's intrusion and tracks him back, he will fall into those ring traps.

If anti-tracking hackers don't understand the connection between the logical rings set by Xiao Yuan, they will fall into a trap and never get out. Of course, it is impossible to track Xiao Yuan's real network address.

Here, Xiao Yuan only controlled twelve broilers, so he only set up one logical lock. Even so, he believed that the number of people in the world who could really crack his own logical lock would not even take a slap.

The master control program of this logic lock is the remote control program he later wrote. All network commands are issued by this remote control program. At the same time, through springboards at all levels, the information uploaded from the computer he invaded is also received by this control program.

, and displayed.

After doing all of this, Xiao Yuan began to move the target to his final destination, the server of Jiangzhou University Artificial Intelligence Laboratory.

Xiao Yuan was very familiar with the IP address of the server for Jiangzhou University's artificial intelligence experiment in his previous life, so he did not need to scan it to get it. However, Xiao Yuan noticed that during the scanning process of the network scanner just now, the address was

Several major servers of Jiangzhou University have been scanned, and the addresses of several major servers of Jiangzhou University have been recorded in the broiler list file by the scanner. An undiscovered vulnerability has been obtained by the artificial intelligence experiment of Jiangzhou University.

Enter the administrator name and password of the room server, and then log in to the server remotely through the springboard.

Xiao Yuan's purpose of logging into this server is to find out who entered the server and stole his mother's research information. According to the memory of his previous life, all important information in the smart laboratory is stored in

In a unified ftp directory, he entered a few file retrieval commands. After a short time, the server-side file list was transmitted back through the network.

Xiao Yuan checked the file list and did not find the ftp directory in it.

"Holy crap, who is so cruel and deleted all the ftp directories? It's just hackers like this who destroy everything and smear hackers. What a bastard." Xiao Yuan cursed secretly, then entered two more commands, thinking

He wanted to bring up the system log and check it out. The system log file was a bit large, but the speed in China in 1998 was really not flattering. Therefore, it took him nearly ten minutes to create a log file that was only a few megabytes in size.

The transfer has just been completed.

Opening the log file, Xiao Yuan glanced at it and found that he seemed to have been fooled. What he had invaded was not the server of the artificial intelligence laboratory, but a honeypot system.

"Empiricism kills people and capsizes the ship in the gutter." Xiao Yuan felt very depressed. He estimated that the intrusion operations he had just performed had been recorded by the honeypot system, and his intrusion had been discovered, but he was not nervous.

, because the ring logic lock he set up is enough to protect him from being discovered by others.

As Xiao Yuan expected, just when he entered the honeypot as an administrator, a beeping alarm sounded in the computer room of the Artificial Intelligence Laboratory of Jiangzhou University, and a chubby young man who was taking a nap suddenly woke up.

He came over and stared at the computer screen with bright eyes. At the same time, he clicked the mouse in his hand. A window recording the intruder's operations popped up, with information scrolling on it. If Xiao Yuan were here, he would find out

, the information scrolling in this window is exactly every step he performed in this honeypot.

While the fat man was staring at the screen, he reached for the phone on the table and quickly dialed a number.

"Boss, there's a fish hooked."

Soon, there was a rush of footsteps. A tall beauty in her twenties, four or five years old, wearing off-white casual pants and a light red bat shirt with a devilish figure walked in from outside and sat on another table.

In front of the computer.

"Anti-resolve the other party's address, be sure not to let him slip away!"

ps: In the new book period, please continue to ask for flowers and collections. If you like this book, please support Green Tea. Thank you. Your support is the driving force for Green Tea to update. If there are VIPs, Green Tea will be inspired and will explode more.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like