Four hundred and fiftieth chapters grab the fox tail
Oliver is fifty-six years old and a computer teacher at California middle school. She maintains the school’s servers every day and browses the school’s external email address.
Oliver is used to login to the platform, enter the ID in the password bar and user bar, and then click Enter to enter the page to manage it. The web page that only takes three seconds to open on weekdays actually stuck today, and it was slower to open after 0:5 seconds. Oliver didn't care. After all, it was stuck for a while, and her vigilance was not very high.
Xuan Qi used Oliver's personal computer as a springboard and entered the server directly without disturbing the port monitor. With the lesson from last time, Xuan Qi was very serious. He typed his palms dozens of times on the keyboard. Rows of data flowed quickly on Xuan Qi's computer screen, and Xuan Qi was also observing the data flow like a waterfall.
Sure enough, D also has a honeypot program in the server. Xuanqi entered a few more commands, and the supercomputer immediately started running 100%. As the supercomputer continued to run, there was an additional log folder in Xuanqi's computer.
No matter where the IP comes from, it will leave traces as long as you visit it. Hackers call the traces left by footprints. A clever hacker will erase all the footprints after exiting the intrusion. Only the second-hand hacker will delete the entire log document. You should know that things that exist in the computer hard drive. No matter how broken you delete it, there is a possibility of recovery. The safest way is to erase it, as if you have never been there.
After some checking, Xuan Qi found three deliberate IPs, one from Tokyo, one from the capital of China, and one from Seattle.
Seeing that IP from the capital of China, Xuan Qi showed a trace of helplessness on the corner of his mouth. He hadn't been a hacker for too long and forgot to use a springboard to catch broilers. He directly invaded his shirtlessness. The wise man would have made mistakes. No wonder he always felt that something was wrong. It was as if he was not wearing underwear.
Xuan Qi carefully wiped off the footprints he left on this server, and then tracked down the IP addresses of Tokyo and Seattle. When he just found the Tokyo addresses, Xuan Qi felt a burst of shock, as if something important had been left out by him.
Xuan Qi sat in front of the computer, looking at the file directory that was scrolling like a waterfall, and suddenly had a cold war. Xuan Qi knocked hard on the carriage. The IP, which was originally exposed to the Internet, disappeared without a trace. Xuan Qi immediately went to check the supercomputer, and this check really found a problem. Someone was cracking the supercomputer's firewall. This firewall was written by Xuan Qi and adopted some concepts from later generations, so it was not cracked for a while.
Seeing this, Xuan Qi couldn't help but breathe a sigh of relief. He almost caught DD, but was caught by others. Who is this person? Not only did there be a honeypot in that server, but there were also two hackers lurking. Xuan Qi knew that he could get UU points at most, and the guy who appeared later had at least the strength to have dU points.
At this moment, the disciples on the Mask Island were staring at the computer screen and dazed intently. They tried every means to break through the other party's firewall. In the next second, the other party disappeared without a trace. This was so weird and speechless.
The disciple whispered to himself: "Who is this person? With such a defensive strength, he should not be a broiler. Is this his host?" After saying that, the disciple began to shake his head again: "No, if it was his host, with such advanced technology, why would he be exposed so easily?" He grabbed his scalp and let the dandruff on his head fly around, and the disciple couldn't figure it out no matter how he thought about it.
A very, very clever hacker, who wrote a firewall with such defense capabilities, would he be a vegetarian? Will he make such a low-level mistake? The appearance of extreme contradictions makes his disciples so stunned that they are crazy.
Suddenly, the disciples were frightened and frightened. Since they had such confidence in people, there was no need to take a stepping stone, then... this is what the Chinese people said to lead a snake out of the hole.
The terrified disciple immediately operated on the computer, and then even more frightened to find that as he had guessed, the other party chased him along the springboard, and rushed through six servers in a row, almost chasing his real IP.
The disciple did not have such an extremely perverted firewall. Seeing that the other party was chasing him with fear, he was not even afraid of touching the traps in the server. Such violent invasion method made the disciple speechless in fear. When his brain was congested, he immediately gave up the springboard and unplugged the network cable that he connected to the network. He wanted to check it, so he asked him to check it. Without the network connection, he could only find the last IP. What can he track down?
The disciple closed the notebook and looked up at the blue sea water, guessing who the other party was? Is he a master invited by Xuan Qi? He had an unrivalled protective wall. The disciple recalled the cracking process. If he let him crack it, it would take at least six hours. He also had a strong invasion ability, but in the blink of an eye, he broke his six springboards. Fortunately, he was careful enough and used eight springboards, otherwise he would be caught...
Just as I thought of this, a trace of bitterness flashed across the disciple's face, as if his crawler program was still on the eighth springboard... Then it is very likely that it will become the other party's spoils now. Shame, shame
The disciple's eyes were red in shame, and he wanted to know who the other party was. At the same time, he looked at the next door next door, and there was a hint of gloating in his eyes. I wonder what would happen to DY? It seemed that the boy only liked to use three springboards. For a moment, the disciple's bad mood turned into great good.
Xuan Qi tracked down the eighth server and suddenly found that the IP address connected to the server was disconnected. This surprised Xuan Qi very much. When searching for the server, Xuan Qi suddenly found that there was a group of inconspicuous small things in the memory. After a closer look, he found that it was a crawler program that was still working. The last IP address of the crawler program was the one that disappeared.
According to the number segment search, Xuan Qi actually found that this IP came from the submarine optical cable of Pacific Rim Company. This time, the target cannot be locked at a certain point, but can only extend the target to a certain line.
After grasping the crawler program, Xuan Qi began to crack a series of cracks. When he was about to disassemble and unshell, Xuan Qi saw the familiar code, a double helix structure in the form of DNA. Xuan Qi once saw this structure once, when the mechanical bone command system was cracked last time. This was the first Tianmen system.
With such memory, the other party's identity has basically been locked. He is Dr. Hei's younger brother and disciple. After confirming the other party's identity, Xuan Qi remembered the Ip and gave up his interest in continuing to pursue the line from Tokyo.
The fox showed two tails in total. Since he had lost one, he had to quickly chase the other one. I hope his disciples were not entangled with DD, otherwise he would be alarmed.
Xuan Qi followed Seattle's Ip and found that DY would only use three springboards. Including California and Seattle, Xuan Qi is not far from the truth, not to mention that DY didn't know that he was about to be in trouble.
Seattle is also a server. Hackers can catch broilers, especially those who like to catch servers, especially those of large companies, school hospitals, or even some small network companies. Because the time period for hackers is not fixed, it cannot be caught at any time. So in this case, diligent hackers will catch a batch of broilers and can be used at any time.
But this involves another embarrassment. Too many stable broilers are not enough. Therefore, some hackers with superb skills will dominate some high-end broilers, while some hackers with low skills can only share a broiler with others. There is no way, anyone who makes your skills worse than others can only pinch your nose and recognize them. Everyone will use them together.
This server in Seattle is owned by an IT company, and it seems to be a small and unknown security company. The server of the security company was used as a broiler by hackers. This is a joke that looks like a black humor. Xuan Qi didn't think it was funny. He kept searching in the server, and Xuan Qi actually found another honeypot left by four hackers.
This place was actually shared by five hackers, and was shocked by Xuan Qi, and he despised DYR's heavy taste. He didn't feel crowded, it was too much of a bottom line.
Xuan Qi was slandering, and at the same time he started to choose one of seven, identifying one by one of the hackers who was D. Don’t look at himself alone, but look at the level he is in. The disciple’s skills are good, at least he is the only one of the servers he uses. For the sake of server security, he even helps the administrator to patch the system and prevent the entire system together, which is relatively beneficial.
After eliminating four in a row, Xuan Qi finally found DYR who had tracked D Jiadao that had a relationship with the mysterious Mask Island in the Pacific, and his disciples were also from Mask Island, so the IP address from the Pacific was very eye-catching. Xuan Qi directly narrowed the scope and then followed up based on this IP address.
As the port was constantly scanning, Xuan Qi's eyes were wide open, and he suddenly discovered that the computer's firewall was full of loopholes, as if it could be easily cracked.
The abnormal implementation is a monster. Xuan Qi originally wanted to invade, but when he saw such a loophole as the firewall, he did not dare to continue invading. After entering several commands and searching, Xuan Qi really discovered the problem.
It looks like a firewall like a broken fishing net, but it is indeed not a firewall, but a device like an alarm. As long as someone cracks this firewall, it will immediately attract the attention of users. Ordinary hackers can easily fall into this simple trap.
Think about it, when a skilled hunter went through hardships and finally caught up with the fox's nest, he was naturally happy and happy. When facing such a firewall, he would definitely be happy. He would definitely invade directly, as if he pulled out the last fig leaf from the saint's body, but he didn't expect that such an invasion would expose himself instead.
Xuan Qi already understood the insidiousness of this device, and naturally had a hint of cold light in his eyes. After his fingers like the wind typing a series of commands on the keyboard, a device similar to a shadow system appeared in the supercomputer. Xuan Qi planned to play a big game and completely copy the DYR computer program, and then slowly analyze and study it and then expose the true identity of DYR.
Chapter completed!