Chapter 148: It is very easy to invade the school host of Yan University. Zhou Yang built a super administrator in the host. Creating a super administrator is not the main thing. The main thing is to hide the super administrator¡¯s account. There are many people managing the school server, so the accounts inside are also extremely complicated. The super administrator¡¯s account alone is There are seven or eight. Zhou Yang secretly invaded the school's host computer and used his own scanner to check several commonly used ports based on the information transmitted to him by the lottery system. The common trap method used by many hackers in broilers is to set and modify several major ports and some policies. Few people check these policy settings, even super administrators will not check these things for nothing, so these places have become the most commonly used means of ambush. Because when you want to create a super administrator account, you always have to go through these ports and modify the policy, and the trap they placed will issue an alarm, telling the owner of the trap that there is someone who has illegally invaded the host. Needless to say, Zhou Yang¡¯s scanner was written using the knowledge he passed on from the lottery system. It can be said to be very powerful! The analysis results came out quickly. Zhou Yang originally thought that there would be no experts on the servers of Yanda. However, when the scan results came out, Zhou Yang understood that he had underestimated the computer department of Yanda. There was something hidden in it. There are many masters. There are several traps hidden in several major strategies and port locations, four of which are not worth worrying about and are very rough. You can find them with a little more care. But one of the traps is quite clever. If you are not careful, you will think that it is a system service, because it has been perfectly integrated with the system services. This system service trap can be said to be quite clever, because it disguises itself as a key service of the system and hides the real system service, so even ordinary experts will not take it seriously. It seems that there are many "owners" of this server, but when Zhou Yang enters, these traps will be useless, because the main function of these traps is to work when you don't find it. Once an expert finds it, stop them. Sending an alarm message is easy. Zhou Yang quickly bypassed these traps and began to crack the school's management system. While cracking the school management system, Zhou Yang copied the virus he wrote. The tracking strategy and concealment adopted by this virus were definitely more powerful than the super virus Zhou Yang discovered. He didn't have to worry about being caught. people discovered. Moreover, this embedded virus will automatically replace the key files of the system and hide the super administrator account created by Zhou Yang in a while. Soon, Zhou Yang obtained the highest authority of the school management system, secretly created a new super administrator account for himself, and Zhou Yang activated his virus. Soon, the virus hid the super administrator account that Zhou Yang logged in. Now even if Zhou Yang logs in, others will never be able to find that there is another person logged in to the system. The alarm system of this virus trap is definitely more effective than any other trap. For example, if the school's host server is compared to an important military area, then those rough traps are equivalent to the key parts of this military area. of sentry. The clever trap Zhou Yang discovered was like a combination of laser alarms, monitors and mobile whistles installed in some secret places. "Once Zhou Yang's virus infects the system, it's like the entire military base is covered by a super radar all-weather. This radar integrates infrared detection, thermal energy detection imaging, heartbeat detector, all-round digital simulation detection, etc.! It is no exaggeration to say that it can detect even a fly flying in. Of course, everything is not absolute. If you become bacteria-level, this thing will be useless. However, Zhou Yang thinks there should not be many red domain masters who can reach this level, and there probably won't be any. However, this operation also made Zhou Yang understand the destructive and aggressive nature of computer viruses. When everything was over, a sense of accomplishment arose spontaneously. This was the first broiler that Zhou Yang had produced with his own strength, although the safety level was a bit low. Most people get a broiler and move on after it is done, but Zhou Yang is like a child who got a fun toy. He is so excited that he patrols his "one-third of an acre" endlessly. After shaking for less than five minutes, the virus placed in the server suddenly sounded an alarm. Zhou Yang was stunned for a moment, and then quickly switched back to the server page. Soon Zhou Yang captured a data stream. Because it is a school server, you must have access to Yanda¡¯s official website and forums.Traffic is generated, but this data flow is obviously not a normal access, it is sneaked up from the back door. Zhou Yang chuckled twice, "Sister, this will be my brother's territory from now on, how dare you come and play casually?" Seeing that the other party did nothing, he was obviously very confident in his own technology. After invading the server, he directly used the server as a springboard and boarded another machine. Zhou Yang did not pay attention to the machine he logged in to, but secretly followed his data flow back. Zhou Yang wanted to see who this person was. Although there is one external public IP of Yanda, and more than 30,000 teachers and students in the school use this public IP, the school's internal network, the IP of each dormitory, and the names of students are all bound. As long as he can track him inside the dormitory, Zhou Yang can find out who this person is. Tracking and anti-tracking are strictly speaking common to the blue domain and the red domain. However, Zhou Yang is very powerful and has an advantage. That is to say, the entire Yanda server is under Zhou Yang's supervision. , so it is very simple for Zhou Yang to find the Yanda intranet. Soon Zhou Yang followed the data flow and touched it. Girls dormitory? No way? It¡¯s actually a girls¡¯ dormitory! Zhou Yang hesitated for a moment, then touched it directly. In Room 524 on the fifth floor of the girls' dormitory building of the Department of Computer Science, Meng Qianqian was about to check out the Black Alliance Forum, but she didn't know what was going on. She felt like she was being followed when she turned on the computer. She saw that the forum page had been opened. The feeling in her heart became even more powerful. After hesitating, Meng Qianqian quickly disconnected her network connection and turned off the computer. When she turned off the computer, the uncomfortable feeling disappeared, and cold sweat broke out on her forehead. She finally understood where the feeling of being followed came from. She should be being watched. On. Meng Qianqian is a freshman in the Department of Computer Science at Yan'an University, and she is also a hacker. She has a well-known name in the underworld called Poison Rose. ¡°Well, the name doesn¡¯t match the person. But she really doesn¡¯t understand why she is being followed? ¡°Have you done anything recently that has harmed the country and the people, Poison Rose thought. Suddenly, she thought of a possibility, that is, the server of Yan University was controlled by someone. She had just entered the Black Alliance Forum through the server of Yan University, so this was the only possibility. But who can be so awesome at controlling Yanda¡¯s servers? Meng Qianqian really can¡¯t understand! After hesitating for a moment, Meng Qianqian reopened the computer with some anxiety, and then quickly checked her computer to confirm that there was no problem. Meng Qianqian went to the Black Alliance, and she cried loudly in their internal chat tool. expression, and then said: "Woo, I'm being followed" Zhou Yang was so depressed that he was bleeding. Just when he was about to find the specific location of the data stream, the other party actually disconnected the network directly. I was confused. Could it be? Have you been discovered? Impossible, Zhou Yang felt that he was already very secretive. After the search failed, Zhou Yang quickly thought in his mind that this person must be a master. He never expected that there would be such an awesome master in Yan University. ¡ At the same time, in an underground research room in the United States, several people were talking about something. "Beirut, have those major hacker teams agreed to our request?" asked a middle-aged man with blond hair. The young man named Beirut nodded and said: "General, those teams have agreed to our request and will follow us to attack China's network." The middle-aged man nodded and said, "Don't be careless. , You must know that that country is a crouching tiger, hidden dragon, who knows if there are many hidden patriotic hackers who have not appeared. "General, don't worry, we will definitely give China Network a heavy blow this time!" Beirut said confidently. And at the headquarters of China Network Base, several people were also discussing something. "Wang Yun, have you found the team you are looking for? This time, several other countries are coming with force and want to severely damage our country's network field. If we cannot resist, the country's interests will be affected. It¡¯s a big loss,¡± said Xiang Hua, the Minister of Network Technology. "Minister, as I said before, I have made an agreement with the Great Hacker Team. We are all Chinese, so they have promised to help us when the time comes. I believe that with their help, our chances of winning will be higher." Wang Yun said. "It's better to recruit as many experts as possible. This time, several major countries can be said to be serious. The U.S. Empire??We even roped in some expert teams from their countries, so that we would have the upper hand. "Another person said with a frown. Xiang Hua also frowned and nodded. He also knew about this news, and even the leaders were paying attention to this national war. After all, it was related to the country's influence on the Internet. The development process is closely related to the interests of the country. ¡°Let¡¯s use this time to recruit more experts and explain the relationship clearly to them. As for the rest, let¡¯s do our best! Xiang Hua said in a deep voice. (To be continued