Reborn Ace Hack

Chapter 009 Anti-tracking

"Understood, he will definitely not be able to escape."

As the company's ace network security engineer, Fatty is very confident. In his opinion, the hacker who entered the honeypot he set up is like fish on the chopping board.

His eyes did not leave the computer screen, the information in the window on the screen was still scrolling, and all Xiao Yuan's operations in the honeypot were clearly visible.

The software that records Xiao Yuan's operations in the honeypot is a component of Hunter Shield, a very powerful network anti-intrusion software developed by their company. This software not only has the function of recording network operations, but also has very powerful network information.

analysis and address anti-resolution capabilities, so when the software discovered a hacker intrusion and alerted the Xiaopang technician, the address anti-resolution had already started.

Soon, Hunter Shield got the network address of the first-level springboard closest to them, but the subsequent analysis suddenly stopped because the data stream he got from this springboard was different from any existing network protocol.

The data formats do not match.

I tested this honeypot system by exploiting an undisclosed vulnerability on the Internet, and found that this honeypot system was actually a software built on the server of my mother's artificial intelligence laboratory, so Xiao Yuan easily bypassed this honeypot system.

The honeypot system leaves an illusion of still logging in to the honeypot system, easily entering the real server and obtaining the real administrator rights of the server.

In this case, he can clearly see all the operations on the network server from the remote end. Because the honeypot system is just a software running on the server, he can also see clearly all the behaviors in this software.

, of course, it was also clear that the other party tried to counter-track his real address along the springboard.

Because it is necessary to ensure that the honeypot system can recognize its own instructions, the network protocol that enters the honeypot system from its last springboard can only use the existing network protocol. Therefore, the other party can easily obtain the network address of the last springboard.

, but to trace back from this springboard, it is necessary to analyze the data flow transmitted between springboards.

The data flow transmitted between springboards uses the network protocol Xiao Yuan created himself that was built into the Trojan horse program he wrote. The other party tried to compare the existing data flow with the data format of the existing network protocol, trying to

Naturally, it will not work to find the address of the springboard on the previous level.

"Holy shit." The fat technician had just boasted, and immediately encountered an unsolvable problem. He felt that he was losing face, so he couldn't help but cursed.

"Li Daming, please be civilized. What happened?" The beautiful boss frowned when she heard the fat technician Li Daming swear. She reminded him.

"Boss, the other party is either a master, or the intrusion tool used was written by a master. It is a bit difficult to reversely analyze the other party's real address!" Li Daming said truthfully.

"what happened?"

The beautiful boss knew the character of his subordinate very well, and it was really rare for him to take the initiative to raise difficulties like this.

"The network protocol used for information transmission between the other party's springboards is self-created, and our shield can't parse it. It's too bad." Li Daming explained.

"Think of a way again, don't back down when you encounter a little difficulty." Adre, the beautiful boss encouraged him, then gritted his teeth and said, "I don't believe he is more powerful than the Snake Tooth God." After saying this, he knocked hard as if to vent his anger.

Hit the Enter key.

As the enter key was struck, a large amount of analysis data quickly scrolled in the command line window. In addition to the functions of general anti-tracking software, adre also has a certain degree of intelligence and can detect some unconventional customized networks.

The protocol is analyzed intelligently.

Li Daming is very confident about this software, because he thinks that no matter how powerful the other party is, it may not be as powerful as the author of the software, Sheya. You must know that Sheya is one of the top hackers in the world, and his strength is compared to that of the world's top hacker.

A hacker, Kevin Mitnick, also did his part. In a sense, Snakeya is more powerful than Kevin, because Kevin was caught, but Snakeya was still alive and at ease. Adre ran for five or six minutes.

A line of green English information appeared in the command line: "Network protocol parsing is completed. Do you want to continue the network address de-parsing? (yn)"

"Boss, it's successful." Li Daming shouted excitedly when he saw this line of information.

"Okay, good job, continue." The beautiful boss's voice also sounded a little excited. In fact, she knew that Li Daming had such an artifact-level tool in his hand, so when adre was running, she watched intently.

Here, she also saw the prompt information in the command line window.

Li Daming executed the continue analysis command, and then, together with the beautiful boss, stared at the computer screen with bright eyes, waiting for the real address of the intruder to be resolved.

Xiao Yuan was using the remote control software to search for the traces left by the hacker who stole his mother's research information on the server, but he didn't want to see a warning message pop up in the control software window. It turned out that his first springboard had been breached.

The other party has counter-tracked into his circular logic lock. Soon, a series of prompt messages are displayed. The other party has made one turn in the logic lock set by himself and started to make a second turn.

"The other party is not simple!"

Xiao Yuan no longer bothered to look for traces of hacker intrusion, and turned his attention to the other party's anti-tracking. What he was interested in was that if the other party could analyze his customized network protocol, could it break through the ring logic lock he set?

We know that breaking through the ring logic lock is more difficult than the previous analysis of the network protocol.

To break through the ring logic lock, you need to do two steps. First, you need to understand the setting strategy of the ring logic. This alone is much more complicated than analyzing an unencrypted network protocol.

Assuming that the other party can guess the setting strategy of the circular logic lock, there is still a bigger challenge waiting for the other party, that is, after each cycle of the circular logic lock, the built-in Trojan program written by Xiao Yuan detects such a result and will automatically

Run an encryption algorithm built into the Trojan to automatically encrypt the transmission data stream.

This encryption algorithm is also unknown in the current world. The most important thing is that this encryption algorithm will disguise the encrypted data stream as an unencrypted normal data stream, thereby misleading the other party to obtain the wrong network address, and then falling into a circular logic.

Lock, and the cycle continues forever.

Xiao Yuan saw the other party spinning around in his circular logic lock, but when he thought the other party would keep spinning, he didn't expect the other party to stop after spinning a few circles. Apparently, he found that he had entered a circle.

There was an endless loop, so he began to try to crack the circular logic lock. The result surprised him, and at the same time he became very curious about the other party's anti-tracking software.

…………

Li Daming and the beautiful boss stared at the computer screen and saw that the scrolling anti-analysis information stopped and displayed a message, so they all opened their eyes to see the content of the message: Anti-analysis encountered an unsolvable logic lock

, Address resolution failed!

"Holy shit, there is no solution to the logic lock!" Li Daming's eyes suddenly became bigger than those of an ox. In extreme surprise, he screamed as if his asshole had been exploded. A software that could be called a snake-toothed giant has no solution.

The logic lock was simply incredible, but he didn't know that it was not easy for this software to be able to determine that it had entered a logic lock so quickly and try to crack it.

"No solution to the logic lock?" The beautiful boss turned her head, glanced at the eye-catching red English on Li Daming's computer screen, frowned and said. Even adre can't crack the other party's logic lock. Although he claims to be extraordinary, he can't compare to Snake Fang.

, so he simply gave up.

The beautiful boss did not blame Li Daming. Although she was not a hacker, her company dealt with hackers the most. Therefore, she knew that in the field of network security, intrusion and anti-intrusion, there was never a lack of geniuses or miracles.

Even the world's top hackers would not dare to say that they are invincible. What's more, although Li Daming has good skills, he is still far from being a top hacker.

"Don't be discouraged, think of other ways?" The beautiful boss encouraged Li Daming, but she was a little unwilling to give up like this.

"The logic lock set by the other party is too powerful. Even after using Sheya's software, there is still no solution. I really can't do anything." Li Daming scratched his head and said, and then added, "Maybe only Sheya came in person.

Maybe it can be cracked."

"So, we can only watch each other come and go freely, as if we are in no one's land?" the beautiful boss asked.

"Boss, I'm sorry, it's my incompetence." Li Daming apologized to his boss in frustration.

"Hasn't that person left yet?" the beautiful boss asked.

"Yes, I don't know what he wants to do. After logging in to our honeypot system, he just looked through the file directory, and then he just hung there without leaving." Li Daming replied, he has not left until now.

They still don’t know that Xiao Yuan is hanging in the honeypot just to confuse them.

"Can you get in touch with him?" the beautiful boss asked, she had become very curious about him.

"Without the other party's real address, I don't think there is much hope, because I can only try sending a message to his springboard. I don't know if the other party will receive it." Li Daming explained, while tapping the keyboard with his fingers.

, a greeting was sent out.

After the greetings were sent, Li Daming and the beautiful boss stared at the computer screen, expecting the other party to respond. After five or six seconds, a message was actually sent, but the content made Li Daming and the beautiful boss look at each other speechlessly.

He smiled bitterly.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like