Reborn Ace Hack
Chapter 421
The sound of the alarm attracted Jiang Hua and Kaspersky, who was doing nothing.
"What's going on?" Jiang Hua asked.
"Falled into a honeypot." Xiao Yuan replied, pulled up the monitoring software from the background, took a look, and found that the anti-tracking IP address for him was actually sent from the second AIX server, and the other party's
The anti-tracing has just started, and it is still wandering outside the ring logic lock, and has not even entered the loop set by the ring logic lock.
Out of confidence in the ring logic lock, Xiao Yuan did not immediately pay attention to the other party's anti-tracking, but threw the monitoring software back to the background, leaving only a status bar at the bottom of the screen, and then continued to analyze the information he had just obtained.
file.
"What is a honeypot?" Jiang Hua asked curiously.
"A honeypot is a trap set in advance." Kapersky answered after taking Jiang Hua's words.
"Xiao Yuan, so you fell into a trap?" Jiang Hua asked.
"Yes, I found two identical aix servers. I initially judged that one was disguised by a honeypot system." Xiao Yuan said.
"How did you determine that you fell into the honeypot? Is it because of these annoying alarms?" Jiang Hua asked again.
"Calling the police is because the other party is counter-tracking me and trying to find our current location. If the other party only records my behavior in the honeypot without counter-tracking, it will not call the police and I will not find it so easily.
It's in a honeypot." Xiao Yuan explained.
"Why are you so careless?" Jiang Hua said.
"The reason why a honeypot is called a honeypot is because of its disguise. Especially some clever honeypots are even mirrors of the real system. If you don't enter it, you won't be able to find out that it is a honeypot at all, let alone now.
We have no target at all, and there is no way to tell whether the opposite side is a honeypot," Xiao Yuan said.
"This is a bit like a battle between military strategists. In order to find out the true situation without knowing the enemy's situation at all, sometimes even though they know it may be a trap, they can't escape. They can only step into it and think of other ways to deal with it."
Xiao Yuan explained again.
"Xiao Yuan, you don't seem worried. Can I take it that you are confident in the springboard strategy you have set up?" Kaspersky asked.
"You can think so." Xiao Yuan said.
Kapersky stopped asking, and Jiang Hua didn't speak anymore. Except for the alarm sound from Xiao Yuan's computer from time to time, there was no other sound in the room again. Tiff seemed to be in a state of complete selflessness, and she was quickly in the room.
What was written on the paper in front of her was that the alarm sound from Xiao Yuan's computer did not have any impact on her.
Xiao Yuan's attention was not entirely focused on the other party's anti-tracking. When doing further work, he occasionally paid attention to the status bar of the monitoring software at the bottom of the screen to control the other party's anti-tracking status. When the other party's tracking entered the ring logic lock
When he was struggling in the first cycle, he directly executed a command through vi, turned off the alarm sound of the monitoring software, and the room became quiet again.
Although he is not worried about the other party's counter-tracking, Xiao Yuan has another worry. Since the other party is counter-tracking him, it means that his intrusion behavior has been exposed. The other party will definitely not sit idly by and ignore his intrusion.
If you take certain preventive measures, it will inevitably become more difficult for you to obtain satellite data from the other party's server. And if the other party takes some extreme measures to prevent you from stealing the data, such as cutting off the server's network connection
, then there is really nothing you can do.
Therefore, he must seize the time and take other measures before the other party makes the next reaction. It is best to prevent the other party from disconnecting from the network without authorization.
So after throwing the information file he just obtained to the analysis software for analysis, he switched it to the background, and then started to write another program in vi. He was now going to do something that even in his previous life he had only done in his brain.
Something he has imagined but never done. If this was just an ordinary invasion, he would not do it at all. But this time is not an ordinary invasion. The success of this invasion is related to whether Wang Junpeng can be found.
, Therefore, failure will make him very unwilling and even angry.
In order to seize the time, Xiao Yuan stopped paying attention to the analysis results of the information analysis software. At the same time, in order to reduce interference, he even threw the status bar of the monitoring software showing the other party's anti-tracking into the background, leaving only the black mark of vi on the entire screen.
and the code he typed out.
"Capa, come here."
At this time, Tiff suddenly shouted and called Kapersky back, who was watching Xiao Yuan write the program. As a result, Jiang Hua was the only one left in the room.
It took Xiao Yuan half an hour to write the program. After he finished writing the program, Tiff and Kaspersky were still busy. He compiled the program into an executable binary file, put it aside temporarily, and then installed the monitoring software
I opened it, took a look, and found that the other party was still trying to break through the circular logic lock. Although there was a breakthrough, it was still far from being able to break through the circular logic lock.
He entered a series of commands into the master control program of the ring logic lock and tested whether the two IP addresses were still connected to the network. The result returned made him sigh in relief. The two IP addresses were not disconnected from the network.
open.
Putting the ring logic lock control program back into the background, Xiao Yuan switched the information analysis software to the foreground. He saw that the analysis had ended and several strings were given.
Xiao Yuan copied these strings from the analysis results, embedded them into a script file, and then wrote the storage address of the program he just wrote into the script file.
After doing all this, Xiao Yuan once again called up the control program of the ring logic lock and entered a command in it. This command will parse the script file and finally synthesize it with the script file to form a more powerful one.
Network commands are sent to the remote aix server, and the software Xiao Yuan just wrote is also sent there.
In fact, intrusions often have a lot to do with luck. At this moment, Xiao Yuan was also betting on his own luck. He was betting that although the other party discovered his intrusion attempt from the honeypot, he did not use the AIX system vulnerability he had mastered.
Block it or take other measures.
The server he chose to send is another AIX server that is different from the IP that is anti-tracking him. After sending this command, all he can do is wait for feedback from the other party's computer before taking the next step.
action.
"Wow!" While waiting for the other party's server to return a message, Xiao Yuan heard Kaspersky exclaim. He turned around and saw that Tiff was also excited, so he asked, "How are you?
Is there any clue over there?"
"We just have a preliminary result, but there are still some key parameters missing. Without these parameters, it still won't work," Tiff said.
"Keep up the good work." Xiao Yuan said.
Tiff gave him a rare smile, obviously because she had made a big breakthrough, and she was in a good mood at this moment.
"You have to work hard, those key parameters may only be obtained from satellite design data," Tiff said.
Xiao Yuan also smiled and turned his gaze back to the computer screen. The results returned by the control software showed that the command and file transmission had been successful, and he was just waiting for the return information.
After another five or six minutes, some return information scrolled in the information receiving window of the ring logic lock's master control software, but these messages quickly stopped, and then the master control program returned a red prompt message: "
Target connection failed."
The situation that Xiao Yuan was most worried about appeared: the other party disconnected the AIX server from the network.
"I hope that program just now can work!" Xiao Yuan stared at the prompt information on the screen, narrowed his eyes slightly, and thought silently in his heart.
You'll Also Like
-
Planting a sacred tree from Douluo
Chapter 254 10 hours ago -
Douluo: Tang San took me to the Wuhun Palace
Chapter 130 10 hours ago -
Be the boss of the heavens from the world of Ke Xue
Chapter 182 10 hours ago -
Dou Po: I, Young Master Taixu Ancient Dragon
Chapter 190 10 hours ago -
Dou Po: Xuan Emperor Xiao Xuan
Chapter 305 10 hours ago -
Starting from Konoha heavy gold to seek a son to revive Uchiha
Chapter 113 10 hours ago -
Douluo: A Peerless Man, A Fake God
Chapter 146 10 hours ago -
My kaleidoscope pupil technique is dark blue with dots
Chapter 235 10 hours ago -
I of Douluo made up the future video
Chapter 501 10 hours ago -
Predator Reborn
Chapter 1066 10 hours ago