HacKer

Chapter 303: Hk traps have to be pitted by others!

Shi Lei just took the SO plan on the enterprise-level fixed broiler and retrieved the local disk of the No. 1 server. Re-formed the overall SO package, ready to open, and issued an alert for endless defense.

Clicking on the log of the endless defense, Shi Lei’s face suddenly changed!

The SO plan package actually records the IP address of the server No. 1 and attempts to transmit information to the International Intelligence Agency of the Ministry of Foreign Affairs.

If there is no endless defense to stop, this message is sent out, then JFS can know the real IP address of Shi Lei in a flash.

And in the situation that Shi Lei did not know, I knew the real IP address of Shi Lei!

Knowing the real IP address of Shi Lei, what the International Intelligence Bureau of the Ministry of Foreign Affairs can do, will make Shi Lei **. They won't directly invade this IP address, or even probe.

They will only query this IP address, corresponding to the actual geographical location.

Do not doubt, from the IP address, you can really find the actual address. Although the IP address will be dynamically allocated, for example, the IP address used today and the IP address used tomorrow may be different.

But can't you find out the dynamic allocation?

This idea is very naive!

With network services, you need physical access to the network, that is, there is a network cable connection. With a network cable connection, a record will be generated by the network service provider.

The network cable is physically present. No matter how high your hacking skills are, it is impossible to black out the network cable.

The line where the entity exists, on the network server side, there will be a number record. For example, Shi Lei’s network service in Jingyayuan, through the physical network access service, the network service provider will assign an IP address to this line. If anyone knows the IP address and hacks into the network service provider, it can pass IP address, find out which IP address is assigned to which line.

From the number of this line, you can find the real address of Shi Lei in the line number record!

Even if Shi Lei is black into the network service provider and has modified this information, it will not be genuine insurance. Because the data is installed on the line, not only electronic records, but also written records.

When Jingyayuan introduces network service providers, network service providers will make a written record when assigning each line.

Therefore, Shi Lei blacked out the record information of the network service provider. If someone really wants to investigate, as long as the network service provider has a relationship, you can check the written records, then Shi Lei is tragedy!

As for wireless Internet access, it is even less reliable. Wireless signals have positioning characteristics, and wireless Internet access is easier to track than wired Internet access!

Shi Lei was shocked by the SO plan and had a cold sweat. Fortunately, there was endless defense. Otherwise, this is the rhythm to be captured by the International Intelligence Bureau of the Ministry of Foreign Affairs!

Fortunately, when Shi Lei sent the SO plan back, he used the unordered file segmentation technology to divide the SO plan into more than one hundred copies, and transferred them to multiple broilers before they retrieved the No. 1 server. IP connection records are also eliminated. Otherwise, in the point-to-point transmission just now, the IP address of the first server, I am afraid it will be exposed!

‘Damn the Ministry of Foreign Affairs’ International Intelligence Agency, do all these insidious settings! Fortunately, my brother is cautious, otherwise it will be overcast by you! ‘Shi Lei’s heart secretly rejoices.

There is a problem with the SO plan file package. Before it was confirmed, Shi Lei was inside JFS and easily entered the confidential information server.

Originally, it seems that there is no defense, and the smooth entry into the confidential information server has actually fallen into the trap of JFS.

JFS security experts designed a bitter meter, and they suspected that someone had entered the JFS internal network, so they made such a trap.

Shi Lei is unfortunate in the middle!

The only thing to be thankful for is that Shi Lei did not completely fall into the trap. Although he was overcast, he was not detected by the real IP address.

This is a blessing in misfortune!

In the mind of Shi Lei, after analyzing it, he is no longer eager to open the SO plan package. I am afraid that it is not a good thing that can be easily taken away by him.

There may even be follow-up measures.

In order to study the SO plan package, Shi Lei established a sandbox environment. Any changes in the sandbox environment have no effect on the system ontology.

The sandbox environment has been widely used in the field of anti-virus and anti-trojan security.

The sandbox environment is being established, and Shi Lei suddenly stopped, allowing the Ministry of Foreign Affairs of the International Intelligence Agency to be so confident and daring that it should be very powerful!

Stopping the establishment of the sandbox environment, Shi Lei split the SO plan into more than one hundred copies and sent it to a fixed broiler. At the same time, Shi Lei also fixed the broiler at that station and copied the endless defense.

On the fixed broiler server, Shi Lei began to establish a sandbox environment. In the event of a SO plan, there are major problems that can also be fixed by broilers.

After establishing the sandbox environment, Shi Lei decompressed the SO plan package. The SO plan file package, without password protection, is in the expectation of Shi Lei.

When the SO plan file package was being unpacked, and through endless defense, Shi Lei immediately discovered that the CPU usage of the broiler server increased dramatically.

The files extracted from the SO plan package are all automatically run, consuming the CPU resources of the broiler server, and constantly sending information out.

Not only that, these auto-running files are being self-replicated in a large amount, flooding the sandbox environment in an attempt to crash the sandbox environment.

Endless defense blocks these auto-running files from damaging the sandbox environment.

Shi Lei analyzed these files and found that most of the files were malicious computer viruses. A small number of files were the back door of the system. There were also some log files, which scanned similar accounts and passwords on the computer and then passed back to JFS.

In front of the No. 1 server, Shi Lei snorted.

‘The Ministry of Foreign Affairs International Intelligence Bureau, you are really insidious! ‘Shi Lei’s heart despised JFS, and then in the fixed broiler, completely removed the SO plan and cleaned up the sandbox environment and endless defense.

The SO plan obtained from the International Intelligence Bureau of the Ministry of Foreign Affairs is obviously an empty shell trap, and Shi Lei is somewhat depressed. At the same time, he is more curious about what the SO plan is.

Shi Lei, who is in a bad mood, once again came to the online world of Wozang, ready to find JFS to play a game of police chasing thieves. Shi Lei is of course playing the role of a network thief, and JFS plays the role of a network policeman.

After coming to the network of Wozang, Shi Lei first explored the back door of the system embedded in the JFS internal network. Shi Lei found that the back door of the system actually existed, which made him very doubtful.

JFS security experts, the first time did not find the back door of the system, Shi Lei will not doubt. However, the SO plan has such a sinister setting. Shi Lei is sure that the fixed broiler that receives the SO plan must be known by the Ministry of Foreign Affairs International Intelligence Bureau. Since even the broiler server knows, if you don't know the back door of this system, Shi Lei really doesn't believe it.

Since the International Intelligence Bureau of the Ministry of Foreign Affairs has already known the back door of Shi Lei's system, and they have not cleared it, it is obviously trying to induce the hackers to come in, and then come to a slap in the face!

The guy of the International Intelligence Agency of the Ministry of Foreign Affairs is really insidious!

After guessing the insidious intentions of JFS, Shi Lei naturally could not go to be fooled. According to the practice, Shi Lei landed on the official website of NHK TV to see if there is any latest news.

On the official website of NHK TV, a red headline highlights a huge news headline.

"International Intelligence Bureau of the Ministry of Foreign Affairs, easily annihilating Mr. M's offensive and successfully rescued the Tokyo Metropolitan Police Department"

Looking at this title, Shi Lei is a little dumbfounding. NHK TV station likes to pull the frame as always. It is obvious that Shi Lei did not confront JFS, leaving only a small botnet to delay the International Intelligence Bureau of the Ministry of Foreign Affairs.

However, in the mouth of NHK TV, it became JFS to reinvent Mr. M, and Mr. M was beaten hard. How shameless is this to be able to write a press release?

Shi Lei read the full text and resisted laughing. Suddenly, he found a strange place at the end of the article.

‘... Looking for Mr. M, there is a need for cooperation. ’

This short paragraph of text is obviously not the original text of the NHK TV news release, but it should be added later. Shi Lei immediately hacked into the web server of the NHK TV official website, searched for the text in the web server, and added the incoming IP record.

It took a few minutes to find this record. After clearing the record, Shi Lei controlled the broiler and tracked the past according to the IP address.

After tracking the past according to the IP address, Shi Lei just entered the other party's server, and the other party immediately sent a message.

‘Mr. Mr., hello! ’

There is no signature, no mark, only a simple greeting, and it is the summer text!

Shi Lei quickly surveyed the server and found that there were more than ten connections in total. His heart was secretly moving: ‘Is it a dark night dynasty? ’

‘Who are you? What is it about looking for me? ’

The Xia Guo text that Shi Lei also uses, in the circle of top hackers, which one does not have multiple languages?

It was the dark night of the dark night dynasty that touched Shi Lei. He accepted the suggestion of code D and looked for Mr. M's help.

‘Mr. M, do you have a hatred with JFS? We also have a hatred with JFS! In the words of Xia Guo, we have a common enemy, we can cooperate! ’

Shi Lei curious about the night dynasty guy, what exactly he wants to do, the other side uses Xia Guo to test himself, Shi Lei does not intend to expose, so he asked.

‘How to cooperate? What do you want to do? I still have some good feelings for you Xia Guo. ’

In the dark night, Shi Lei denied that he was a Xia Guoren, and there was a trace of regret in his heart.

‘Mr. Is there a system vulnerability in the JFS internal network? We are going to enter the JFS internal network and mess around the JFS internal network! ’.’

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like