The Strongest Hacker

Chapter 420 Undercurrent Surge (7)

Four hundred and twentieth chapters undercurrent surging (seven)

Four hundred and twentieth chapters undercurrent surging (seven)

After thinking about the things he encountered in the past two days, Zhang Yang knew that there was a figure of nubi in it. He didn't expect that these bastards played very deeply, but Zhang Yang still couldn't figure it out. How could people from nubi know that Zhang Yang could Find those few pictures they deliberately deleted and then kept? Zhang Yang has already checked the email server where the picture is located, and it will take about three or four days to completely clear all spam emails. By then, even infected bugs will not be able to be found. ;

Xiang Tingwei definitely doesn't have that much money to buy this kind of server. The only possibility is that he is a member of the nubi organization, and nubi bought it for him, but this doesn't make sense. 7) If he is a member of the nubi organization, it is impossible for nubi to expose him so casually. At least so far in the world, no hacker has been heard of who was in the nubi organization and was caught.

If this is not the case, then there is only one explanation, Xiang Tingwei is just a bait thrown by the other party, that is to say, Xiang Tingwei himself may not know that he is the bait, he thought he was a member of nubi. If nubi is really allowed to handle this matter, it is impossible to leave so many loopholes.

Thinking of this, Zhang Yang's eyes narrowed slightly. After pondering for a long time in his mind, Zhang Yang quickly made a decision. He directly placed the mouse on the ye on the desktop, and then clicked the OK button! After clicking the OK button, Zhang Yang immediately disconnected himself from the infected worm, and at the same time, Zhang Yang started all the scanners and the brood firewall.

Zhang Yang, the id of l, might not be able to hide it, that is to say, Zhang Yang is the identity of l, and he is ready to be exposed one day, as long as his other idgd is not exposed. And now although Nubi has set up a trap Chapter 420 Undercurrent Surge (7), waiting for Zhang Yang to jump in, but even if Zhang Yang is tracked by the Nubi people to his real i, Zhang Yang has nothing to lose!

But if Zhang Yang didn't know that the other party had laid a trap, he might have exposed something unintentionally, but now that he knew, then this matter would be different. Now it depends on who can play with whom, since the nubi has set up a trap, then the opponent's attack this time is definitely the person with the highest strength, they have seen the strength of gd before, if they follow Zhang Yang as gd, It will not let ordinary ordinary hackers come.

Just in case, Zhang Yang deleted all the information and logs about the infected bug in his computer. Even if the other party tracked Zhang Yang's computer, they would not be able to find the infected bug. I don't want the child to be caught by a wolf. Zhang Yang has discovered this trap, but if he doesn't touch this trap, where are the nubi people?

Or how he will be investigated again, this is an unknown.

In this way, if the opponent is in the dark, Zhang Yang will be very passive in the open. But now, Zhang Yang has already figured it out. At worst, the identity of l will be exposed. If the other party finds out that he is l, then there will be no doubt that gd is also him. In this way, Zhang Yang seems to be in the light, but in fact his true identity is in the dark. However, if nubi wants to track Zhang Yang, it is impossible to do nothing, hurt the enemy a thousand, and hurt himself eight hundred.

Zhang Yang l's identity was discovered by the other party, so Zhang Yang must also make the other party peel off. With an idea in his mind, Zhang Yang acted very quickly. After clicking the trap, Zhang Yang immediately began to arrange honey pots on his broiler.

I used my own method to arrange a few honeypots, and then arranged a few more in the same way that a wretched superman arranged honeypots. On the outer layers of broilers, Zhang Yang did not place a brood firewall, but simply repaired the system, but Zhang Yang used all his scanning software to monitor these broilers all the time.

All this may seem cumbersome, but it didn't take Zhang Yang long, about twenty minutes or so. While doing this, Zhang Yang retrieved the broadband port information he had applied for from Tingwei from the telecom server. After just looking at it casually, Zhang Yang immediately knew that his suspicion was probably right, that is to say, there was indeed a trace of this supercomputer in Xiang Tingwei's place.

Now that he knew it, Zhang Yang stopped being polite. He looked at his scanner, but there was still no movement. It seems that regardless of whether the other party has received the news or not, anyway, Zhang Yang still has plenty of time. Or the other party is waiting for Zhang Yang to be less wary before making a move.

I scanned the port of this super server, and the system used by the other party is also the linu system. For Zhang Yang, linu is too easy to intrude. Although this system is obviously repaired by experts, there is no perfect system in this world. All systems have loopholes, but this loophole has not been discovered yet. The linu system of this supercomputer has been patched perfectly, and all the vulnerabilities that have been discovered so far have been patched.

And there are still several unannounced vulnerabilities that have been patched, but these are not important, for Zhang Yang, there are still a few vulnerabilities that still exist. Zhang Yang immediately started attacking this supercomputer. Having a loophole is not a panacea. This time without the assistance of the infection bug, Zhang Yang had to do everything by himself, so the speed of the intrusion was relatively slow.

Moreover, the other party's system also has a firewall with quite good protection capabilities. Just when Zhang Yang was about to invade into this system, the broiler he had been monitoring suddenly had a reaction. Zhang Yang immediately slowed down his speed and focused all his eyes. On top of your own broiler.

Zhang Yang has been monitoring the running of all the background programs on his broiler. Just when Zhang Yang was about to invade successfully, several requests appeared on his broiler. These requests were all feedback access requests from some websites. This kind of request will be encountered many times as long as the computer is connected to the Internet, but this kind of request will be automatically rejected by the system even if there is no firewall.

But the difference between these requests is that when the system refused, it cleverly sent another data access request, and at the same time a small feedback message also started to access the broiler. Originally, there were almost no protective measures on this broiler. Seeing these two signals, Zhang Yang understood that the nubi people should do something.

If this kind of intrusion method is not monitored in real time, it will basically not be discovered. So Zhang Yang didn't do anything, just let the other party start to invade his broiler, Zhang Yang didn't stop his actions, but quickly invaded the system of this supercomputer, and directly began to crack the management authority of the system.

After starting to crack it, Zhang Yang couldn't help but smiled wryly, damn it, no wonder everyone wants their own preparation to be high, high preparation is good! To crack the management program, if it is an ordinary server, the cracking process is not complicated, because its server needs to be responsible for many things, and the response efficiency of the system is not so fast. Even if the system rejects some illegal access requests you deliberately generate, the system will still have A certain reaction time, and during this time, you can do a lot of tricks.

But now, the management authority of the supercomputer that Zhang Yang cracked, just relying on the super computing speed, the difficulty of Zhang Yang's cracking has increased several steps, mlgbd, watching the usual tried-and-tested method was rejected by the server and came back , Zhang Yang couldn't help but swear.

The other party has powerful computing power, but the chickens in Zhang Yang's hands are all ordinary servers, and the computing power cannot keep up with the computing speed of this supercomputer. your sister! If it wasn't for Zhang Yang not wanting to expose his ability in virus, Zhang Yang would like to directly copy a virus with powerful destructive ability to completely kill the system of this supercomputer.

When there was no progress on Zhang Yang's side, the other party had successfully hacked into Zhang Yang's first broiler, and started scanning to find the second i connected to Zhang Yang, but Zhang Yang still did not move, and if it was too early, it would be easy for the other party to Exposure, although Zhang Yang has not obtained the super administrator authority of this supercomputer, he has already checked the operation status of this supercomputer, and Xiang Tingwei should not be at home at this time.

If you want to track the opponent for a while, this thing is a sharp weapon! This $400 million supercomputer is more powerful than the combined performance of several satellites including Satellite 1 and Satellite 2 where the bug is currently infected. With the invasion of the other party, Zhang Yang finally made progress. After all, a supercomputer without human intervention is nothing more than a computer with a faster calculation speed.

Unless the system is infected with bugs, Zhang Yang might not be able to invade it, but now, this supercomputer is not difficult for Zhang Yang. After obtaining the management authority of this supercomputer, Zhang Yang ignored the person over there who was cracking his fourth broiler, but quickly started scanning the system.

The scanning progress is very fast. Although there are many files in it, the huge computing power makes it equivalent to doing a self-test in just a few tens of seconds. Looking at the results of the scan, Zhang Yang immediately removed several garbage honeypots, then Zhang Yang put his own firewall in, and Zhang Yang began to patch the remaining vulnerabilities in the entire Linux system.

When Zhang Yang finished all this, the people at nubi finally got access to Zhang Yang's first level 1 broiler, which was the server of a domestic enterprise, and Zhang Yang also placed the brood firewall here. Several tentative visits from the other party were quickly rejected by the brood, but visits of this level would not cause the brood to call the police, and Zhang Yang did not continue to take care of it.

He just quietly "watched" the other party's movements, waiting for the best opportunity to make a move. After a short trial, he fell into a long silence. Suddenly, Zhang Yang discovered that the entire server had been directly injected with a large amount of junk viruses. The other party did not directly attack the mother nest firewall, but first used the virus to infiltrate the original firewall of the server, and then began to expand. Because this server is someone else's server, it is impossible for the brood that Zhang Yang copied in to activate all the functions. If so, the security technicians of the server will find out immediately, and Zhang Yang will be kicked out immediately.

The brood was only placed in the most critical position by Zhang Yang, and Zhang Yang didn't care about the peripheral system at all. While Zhang Yang was waiting for the other party to successfully invade, suddenly an alert prompt box popped up in the lower right corner of Zhang Yang's system. Zhang Yang immediately accepted the alert prompt box and switched out. Seeing this prompt box, Zhang Yang couldn't help laughing. With a smile, his hands immediately tapped on the keyboard quickly.

This alert box was sent out by a honeypot arranged by Zhang Yang. It seems that although the other party found most of the honeypots, but this honeypot was arranged by Zhang Yang according to the method of the wretched Superman. Sure enough, the other party was unprepared and directly Hired. Now that the honey pot has been guessed by the other party, it would be too fake if Zhang Yang didn't make any moves.

So Zhang Yang started to move immediately. At the same time as Zhang Yang started, the system of the whole broiler server became extremely slow in an instant. The other party obviously realized that he had encountered a honeypot, and started to forcibly crack and track without hiding his figure.

Zhang Yang quickly began to shrink his defenses, and directly detonated several virus bombs buried in the systems of the broilers that had been invaded by the opponent, and then crashed the entire system. Zhang Yang logged into his super administrator account and kicked out all the logged-in administrators of this server.

At the same time, Zhang Yang immediately opened all the brood functions on his next broiler chicken. When Zhang Yang finished all this, his computer screen suddenly went black, and he was also kicked out of the system. Obtained the management authority of the broiler, and Zhang Yang noticed that a stream of data followed the computer he was connected to almost immediately.

The moment he was kicked out, Zhang Yang directly turned on the remote control command of the broiler's nest, and deleted the broiler's nest in the broiler that had lost management rights. No matter what, the brood cannot fall into the hands of the opponent. In less than thirty seconds, the opponent had already tracked down Zhang Yang's latest broiler, and launched a swift attack.

Judging from the intensity of the attack, Zhang Yang was immediately sure that this was not done artificially, but that the opponent had activated a powerful tracking Trojan horse. RO! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like