Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> The most powerful hacker

Volume One, Chapter 420: Undercurrent (7)

Previous page        Return to Catalog        Next page

    Chapter 420: Undercurrent (7)

    Chapter 420: Undercurrent (7)

    After thinking about what happened in the past two days, Zhang Yang knew that Anubis was involved. Unexpectedly, these bastards played in a very deep way, but Zhang Yang still couldn't figure it out. How could the people from Anubis know that Zhang Yang could  Find those few pictures that they deliberately deleted and then kept?  Zhang Yang has already checked the mail server where the picture is located. It will take about three or four days to completely clear out all spam. By then, even the infected bugs will not be able to find it.

    Xiang Tingwei definitely doesn't have that much money to buy this kind of server. The only possibility is that he is a member of the anubis organization and anubis bought it for him. But this does not make sense. If he is a member of the anubis organization, anubis  There was no way he could be exposed so casually.  At least so far in the world, no hacker has been heard of being a member of the anubis organization and then being caught.

    If this is not the case, then there is only one explanation. Xiang Tingwei is just a bait thrown by the other party. In other words, Xiang Tingwei himself may not even know that he is a bait. He thinks he is a member of anubis.  If anubis was really allowed to handle this matter, it would be impossible to leave so many flaws.

    Thinking of this, Zhang Yang narrowed his eyes slightly. After thinking about it for a long time, Zhang Yang quickly made a decision. He directly put the mouse on the yes on the desktop and clicked the OK button!  After clicking the OK button, Zhang Yang immediately disconnected himself from the infected bugs. At the same time, Zhang Yang started all scanners and the Brood Firewall.

    Zhang Yang, the ID of l, may not be able to hide it. In other words, Zhang Yang is the identity of l and he is ready to be exposed one day, as long as his other idgscsd is not exposed.  Now, although Anubis has set up a trap, waiting for Zhang Yang to jump into it, even if Zhang Yang is now traced by people from Anubis to his real IP address, Zhang Yang will have nothing to lose!

    But if Zhang Yang didn't know that the other party had laid a trap, he might have exposed something unintentionally, but now that he knows, the matter is different.  Now it¡¯s up to who can outplay whom. Since Anubis has set up a trap, the person attacking this time is definitely the person with the highest strength. They have seen the strength of gscsd. If they track Zhang Yang as gscsd,  We won't let ordinary hackers come.

    Just in case, Zhang Yang deleted all the information and logs about the infected bug in his computer. Even if the other party tracked Zhang Yang's computer, they would not be able to find the infected bug.  Reluctant to let the child catch the wolf, Zhang Yang discovered the trap, but if he didn't touch the trap, it was unknown where the anubis people were or how they would investigate him again.  .

    In this way, the other party will be very passive if they are secretive and open to the public.  But now, Zhang Yang has already thought about it. At worst, L's identity will be exposed. If the other party finds out that he is L, then they will not suspect that gscsd is also him. In this way, Zhang Yang seems to be in the light, but in fact, his true identity is in the dark.  place, and if anubis wants to track Zhang Yang, it is impossible for him to sacrifice nothing, hurt the enemy by one thousand, and lose himself by eight hundred.

    If the identity of Zhang Yang L is discovered by the other party, then Zhang Yang must let the other party peel off his skin.  With an idea in his mind, Zhang Yang started very quickly. After clicking on the trap, Zhang Yang immediately started to arrange a honeypot on his cock. The wretched Superman's method of arranging honeypots gave Zhang Yang a lot of inspiration.

    He used his own method to arrange several honeypots, and then used the method of wretched superman to arrange honeypots. On the several layers of broilers outside, Zhang Yang did not place a brood firewall, but simply repaired the system. However,  Zhang Yang activated all his scanning software and monitored these broilers at all times.

    All this may seem cumbersome, but it actually didn¡¯t take Zhang Yang long, probably more than twenty minutes.  While doing this, Zhang Yang retrieved the broadband port information applied for from Ting Wei from the telecommunications server.  After just looking at it casually, Zhang Yang immediately knew that his suspicion was probably correct, which meant that Xiang Tingwei indeed had traces of this supercomputer.

    Now that he knew it, Zhang Yang was no longer polite. He looked at his scanner, but there was still no movement.  It seems that no matter whether the other party has received the message or not, they haven't started to take action yet anyway, and Zhang Yang still has plenty of time.  Or the other party is waiting for Zhang Yang to be less wary before taking action.

    Scanning the port of this super server, the system used by the other party is also a Linux system. Linux is too easy for Zhang Yang to invade. Although this system has obviously been patched by experts, there is no perfect system in this world. All  ??There are loopholes in the system, but this loophole has not been discovered yet.  The Linux system of this supercomputer has been patched quite perfectly, and all vulnerabilities that have been discovered so far have been patched.

    ¡°And there are several unannounced vulnerabilities that have been patched, but it doesn¡¯t matter. To Zhang Yang, there are still several vulnerabilities that still exist.  Zhang Yang immediately started attacking the supercomputer. Having a loophole was not a panacea. There was no assistance from the infection bug this time, so Zhang Yang had to do everything by himself, so the invasion speed was relatively slow.

    Moreover, the other party's system also has a firewall with quite good protection capabilities. Just when Zhang Yang was about to invade the system, the broiler he had been monitoring suddenly reacted. Zhang Yang immediately slowed down and focused his gaze.  On top of his own broiler.

    Zhang Yang has been monitoring the operation of all background programs on his broiler. Just when Zhang Yang was about to successfully invade, several requests appeared on his broiler. These requests showed feedback access requests from some websites. This  This kind of request will be encountered as long as the computer is connected to the Internet, but this kind of request will be automatically rejected by the system even if there is no firewall.

    But the difference between these requests is that when the system rejected it, it cleverly sent another data access request, and at the same time, a small feedback message also started to access the broiler.  Originally, there were almost no protective measures on this broiler. Seeing these two signals, Zhang Yang knew that the people from anubis should take action.

    This kind of intrusion will basically not be discovered if it is not monitored in real time.  So Zhang Yang didn't do anything, he just let the other party start to invade his cock. Zhang Yang didn't stop his actions here, but quickly invaded the supercomputer system and directly began to crack the system's management permissions.

    After starting to crack the code, Zhang Yang couldn't help but laugh bitterly. Damn it, no wonder everyone wants their own formula to be high. A high formula is good!  Cracking the management program, if it is an ordinary server, the cracking process is not complicated, because its server needs to be responsible for many things, and the system's response efficiency is not that fast. Even if the system rejects some illegal access requests you deliberately generate, there will be  There is a certain reaction time, and during this time, you can do a lot of things.

    But now, the administrative rights of the supercomputer that Zhang Yang cracked were forced to use the super computing speed to increase the difficulty of Zhang Yang's cracking by several levels. mlgbd, seeing that the usually tried and tested method was rejected by the server again  , Zhang Yang couldn't help but uttered a curse word.

    The other party has powerful computing power, but now the broilers in Zhang Yang's hand are ordinary servers, and the computing power cannot keep up with the computing speed of this supercomputer.  Your sister!  If Zhang Yang didn't want to expose his ability in viruses, Zhang Yang would have wanted to directly copy a virus with powerful destructive capabilities and completely kill the supercomputer system.

    When there was no progress on Zhang Yang's side, the other party had successfully hacked into Zhang Yang's first broiler and started scanning to find the second IP connected to Zhang Yang. However, Zhang Yang still didn't move. If it was too early, it would be easy for the other party to let him go.  Exposed, although Zhang Yang has not yet obtained the super administrator rights of this supercomputer, he has already checked the running status of the supercomputer. Xiang Tingwei should not be at home at this time.

    If you want to counter-track the opponent for a while, this thing is a powerful tool!  This $400 million supercomputer is more powerful than the combined performance of Satellite 1 and Satellite 2 where the infected bug is currently located.  With the other party's invasion, Zhang Yang finally made progress. After all, a supercomputer without anyone operating it is nothing more than a faster computer.

    Unless this system is a perverted system like an infected bug, Zhang Yang may not be able to invade it, but now, this supercomputer is not difficult for Zhang Yang.  After obtaining the management rights of this supercomputer, Zhang Yang quickly started scanning the system without paying attention to the people over there who were hacking his fourth broiler.

    The scanning progress is very fast. Although there are many files in it, the huge computing power makes it equivalent to a self-check in just a few dozen seconds.  Looking at the scan results, Zhang Yang immediately removed several junk honeypots, then installed his own firewall, and Zhang Yang began to patch the remaining vulnerabilities of the entire Linux system.

    When Zhang Yang finished all this, the people at anubis finally came into contact with Zhang Yang¡¯s first level 1 broiler, which was the server of a domestic enterprise. Zhang Yang also placed the Brood Firewall here.  The other party's several tentative visits were quickly rejected by the mother nest, but this level of visits would not cause the mother nest to alarm, and Zhang Yang did notKeep taking care of it.

    He just "watched" the opponent's movements quietly, waiting for the best opportunity to make a move. After a brief trial, he fell into a long silence.  Suddenly, Zhang Yang discovered that a large number of junk viruses had been injected directly into the entire server. The other party did not attack the Brood Firewall directly, but first used the virus to penetrate into the original firewall of the server, and then began to expand.  Because this server is someone else's, it is impossible for the mother nest copied by Zhang Yang to activate all functions. If that happens, the server's security technicians will immediately find out, and Zhang Yang will be kicked out directly.

    The mother nest was only placed in the most core and critical position by Zhang Yang, and Zhang Yang did not care about the peripheral systems at all.  Just when Zhang Yang was waiting for the other party to successfully invade, suddenly an alarm prompt box popped up in the lower right corner of Zhang Yang's system. Zhang Yang immediately answered the alarm prompt box and switched it out. Seeing this prompt box, Zhang Yang couldn't help laughing.  He smiled, and his hands immediately started typing quickly on the keyboard.

    This alarm prompt box was sent by a honeypot arranged by Zhang Yang. It seemed that although the other party discovered most of the honeypots, this honeypot was arranged by Zhang Yang according to the method of the wretched Superman guy. Sure enough, the other party was not prepared for the moment.  Got hit.  Now that the honeypot has been guessed by the other party, it would be too fake if Zhang Yang doesn't make any moves.

    So Zhang Yang immediately started to move. At the same time as Zhang Yang started, the entire broiler server system instantly became extremely slow. The other party obviously realized that he had encountered a honeypot, and stopped hiding his body and began to forcibly crack the tracking.

    Zhang Yang quickly began to shrink his defenses and directly detonated several virus bombs buried in the systems of the broilers that had been invaded by the other party, causing the entire system to collapse.  Zhang Yang logged in to his super administrator account and kicked out all logged-in administrators of this server.

    At the same time, Zhang Yang immediately opened all the nest functions on his next broiler. Just when Zhang Yang finished all this, his computer screen suddenly went black, and he was also kicked out of the system. It was obvious that the other party had already  After obtaining the management rights of the broiler, Zhang Yang noticed that a data stream almost immediately followed the computer he was connected to.

    At the moment of being kicked out, Zhang Yang directly opened the remote control command of the broiler's nest and deleted the broiler's nest from the broiler that had lost management rights.  No matter what, the mother nest cannot fall into the hands of the other party.  In less than thirty seconds, the opponent had tracked Zhang Yang's latest cock and launched a swift attack.

    From the intensity of the attack, Zhang Yang was immediately certain that this was not a human operation, but that the opponent had activated a powerful tracking Trojan.
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report