The Strongest Hacker

Chapter 39 The first broiler (Part 1)

Chapter 39 The First Broiler (Part 1)

After carefully checking his network and confirming that no one was following him, Zhang Yang couldn't wait to start experimenting with the things God gave him answers. Zhang Yang's current level is actually very high, but he is as if you are building a building. Like tall buildings, the knowledge of the red domain can only be regarded as a part of it, an overall framework.

But if you want this building to be incomparably strong, beautiful, and superior to other buildings, then the frame alone is not enough, and the frame alone can only be said to be an unfinished building. But with a frame, it's always faster than starting from the ground up like everyone else does. What Zhang Yang has to do now is to quickly fill up all these frames with the knowledge of Lan Yu.

So after seeing GOD's short answers, Zhang Yang can quickly understand, and it's useless to memorize these basic knowledge, now the only thing is practice. GOD has even told Zhang Yang in his answer that many hackers have accumulated broilers over time, and they don’t just look for them every time before making a move. That way the newly found broilers are not safe, and preparing these broilers in advance is just It depends on your means.

Low-level hackers look for personal computers as broilers and springboards, while experts look for servers of some companies, or even large servers of some high-tech companies, because the switching time of personal computers is not fixed, and network restrictions sometimes affect However, the server is different. Its computing speed is not a problem, and its network is not a problem. As long as it can be called a server, the network is at least connected by a dedicated line.

But since it is called a server, the network security of these servers is naturally taken care of by security companies. Unless you think that your strength is higher than these security companies, otherwise, forget it and save yourself from being caught by these security companies when the time comes. The loss outweighs the gain if people trace your IP.

However, Zhang Yang now has a very good test object, which is the school server of S University. There is no doubt that S University is rich and powerful. The donations from the teachers and sisters are a huge amount.

Therefore, S University is a relatively prominent university in science in China. The strength of the computer department is naturally beyond doubt, and its servers are also very advanced. The difference is that although the servers of S University have a lot of security maintenance fees every year, But in fact, these servers are all managed by the school's computer department teachers and students. As for where the network security costs go, everyone knows.

There is no need to say these things. Anyway, the school's server does not have any important information. Even if it is attacked by hackers, it is nothing more than a loss of data, as long as the backup is taken out. Speaking of it, the school's server is unwilling to hire a dedicated security company, which has another meaning.

The computer department of S University can be said to be one of the best in China, and the strength of the computer department of Q University, which ranks first among comprehensive universities in China, is needless to say. The computer departments of these two universities have always been at odds with each other. of. In the group of animals in the computer departments of the two universities, there are indeed many highly skilled people. If you invite professional security experts, the cost of being hacked every time is too high.

And if you don't care about it, it will have a great motivating effect on these students in the computer department of your school. This is one of the main reasons why the computer department of S University can compete with Q University.

However, this also gives Zhang Yang a chance. Anyway, the school server is also a server, which is better than a personal computer, and there is another advantage. If you use the school server as a springboard, even if someone tracks it down, Zhang Yang only needs to hide his identity a little bit. IP,

There is simply no way to find it.

The external IPs of 30,000 to 40,000 people in the entire S University are all public IPs. If you want to find someone out of 30,000 to 40,000 people, the difficulty is no different from finding a needle in a haystack. When school started, Zhang Yang easily hacked into the school's mainframe, but this time was different from last time, this time Zhang Yang wanted to build a super administrator in the mainframe.

Creating a super administrator is not the main thing, the main thing is to hide the account of this super administrator. There are many people in the management of the school server, so the accounts inside are also extremely complicated. There are seven or eight. Secretly hacked into the school's mainframe, Zhang Yang used his own scanner to check several commonly used ports according to the information that was leaked to him.

Yidaoliu said that many hackers often use trapping methods in the bot, which is to set and modify several main ports and some policies. Few people check these policy settings, even super administrators will not check these things, so these places have become the most commonly used means of ambush.

Because you want to create a super administrator account, you always have to go through these ports and modify the policy, and the traps they place will send out an alarm, telling the owner of the trap that there are people who illegally invade the host. Needless to say, Zhang Yang’s scanner is powerful. This is a scanner developed by GOD a few years later, and after Zhang Yang learned from thanatos, he modified it with his own understanding.

The analysis results came out soon. At first, Zhang Yang thought that the school's servers would not have any experts, but when the scan results came out, Zhang Yang realized that he still underestimated the animals in the computer department of S University. A lot of master wow.

There are several traps hidden in several major strategies and port positions, four of which are not serious and rough, and can be found with a little care. But one of the traps is quite clever. If you are not careful, you will think it is a system service, because it has been perfectly combined with the system service.

Zhang Yang was a little happy immediately. After all, he didn't have enough experience in setting traps. Although these people's settings were rough, they gave Zhang Yang some inspiration and experience. But in the end, the trap of this system service is really clever, because it pretends to be a key service of the system and hides the real system service, so even ordinary experts will not take it seriously.

It seems that there are quite a few "owners" of this server, hey, but now it belongs to me, Zhang. The main function of these traps is to work when you don't find them. Once a master finds out, stop them from sending alarm messages. It's very simple. Zhang Yang quickly bypassed these traps and began to crack the school's management system.

While cracking the school management system, Zhang Yang copied in the virus he wrote. The tracking strategy and concealment adopted by this virus are definitely stronger than the super virus Zhang Yang discovered. He doesn't have to worry about being discovered . Moreover, this embedded virus will automatically replace the key files of the system, and at the same time hide the super administrator account created by Zhang Yang.

***********************

There are so few recommended votes...the top few on the new book list...they have thousands of votes, we are so pitiful.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like