The Strongest Hacker

Chapter 639 Fox Tail (1)

After sending Chen Xiaowei and the others away, Zhang Yang went back to the study. The retrieval information of Xingkong should have almost come out. Sitting in front of the desk, Zhang Yang moved the mouse, but he didn't check the information of Xingkong immediately. Sitting in a chair and meditating, Chen Xiaowei's words gave Zhang Yang a lot of reminders, making Zhang Yang suddenly understand that the direction of this world is completely different from what he imagined.

Especially the relationship between these countries, current affairs and politics, etc., these things are often magnified because of a small factor, and finally cause them to deviate further and further from the track in Zhang Yang's memory, until they are completely gone. Taking the two roads, I am afraid that except for those natural disasters and the like, most of the remaining events will be different from what Zhang Yang remembers. Chapter 639 Fox Tail (1).

After hesitating for a while, Zhang Yang took out his mobile phone after thinking for a while, and then entered a series of secrets in the mobile phone, and then broadcast the call. The phone rang for a long time before someone picked it up: "Hey, please talk to someone." A British woman with a strong and strange accent rang.

"I'm looking for Mr. Guriska." Zhang Yang said directly. There was a pause at the other end, and it took a long time before the accent continued to ask: "Is that Mr. Golo?" "No." Zhang Yang continued to say with a smile. "Uh, boss, hello." Anthony's familiar voice came from the other end of the phone. The previous conversation just now was just an appointment between Zhang Yang and Anthony. The two made an appointment in private and never told anyone.

"What? Have you finished what I asked you to do?" Zhang Yang asked softly.

"It's almost there. We have basically achieved a strategic goal. If we have another three years to consolidate, I guarantee that in this country, the boss will not have a second voice." Anthony said quickly.

"Well, that's good!" Zhang Yang agreed with satisfaction. Zhang Yang's idea of ​​Anthony is the most important part. Now that Anthony's progress has far exceeded Zhang Yang's expectations, Zhang Yang Chapter 639 Fox Tail (1) is naturally very happy. "Spent close to 500 million U.S. dollars and went in. If there is no further progress, I might as well kill myself. Boss, don't worry, now we have basically started to make profits here, and you don't need to invest in the rest, boss." .”

"Well, that's the column. I don't mean anything else by making this call. What I mean is that I may not contact you for a long time in the future, but you must achieve the goal I gave you as soon as possible." Goal, I will be of great use at that time." Zhang Yang said lightly.

"No problem." Anthony readily agreed, and after confirming that Zhang Yang was fine, Anthony hung up the phone. After hanging up Anthony's phone, Zhang Yang immediately felt relieved. After deleting all the relevant information in his mobile phone, Zhang Yang swung the mouse and turned on the computer to check the information retrieved from the starry sky.

Check out the comparison information of the starry sky,

Zhang Yang's eyes narrowed slightly. Sure enough, there was a big discrepancy between the Australian police reports and the media's own reports. Especially in some murder cases, the official police reports obviously concealed a lot of things, while the media's Although the report has more information, but because there is no evidence, it gives people a feeling of inaccuracy.

But what the truth is, I am afraid that only the people at that time knew clearly. Putting all this information aside, Zhang Yang checked all the information retrieved by Starry Sky about the company that the little hacker worked for. This company is located in an office building in a high-tech district in Sydney.

Looking at the address of the HG company, Zhang Yang suddenly thought for a while, and Zhang Yang quickly searched out the information he found in the starry sky. Many of these materials were searched by Xing Kong from the Internet, and there were basically materials related to HG company. Of course, they were all relatively important ones.

Zhang Yang couldn't help squinting his eyes after searching around inside, it's very good, very powerful!

Sure enough, there are tricks! The information that Zhang Yang saw was the companies that had business dealings with HG Company. This was nothing, because there were only six companies that had business dealings with HG Company! And HG, as a company that specializes in renting out servers, naturally has a cooperative relationship with other companies.

All these cooperation information was found by Xingkong from some clues on the Internet, but Zhang Yang of these six companies has just discovered that the business they operate is basically network, or system or even computer development. This is very unreasonable. You must know that as a company that rents out servers, it is impossible for all its clients to be companies in this area. Moreover, this does not make sense. Since they are companies in this area, their main business It must be a related business in this area, so more than 99% of these companies buy servers by themselves! Instead of renting!

The most important thing is that after Zhang Yang retrieved all the information of these six companies, he finally discovered an astonishing truth, the addresses of these six companies are actually in the same place! Although it is different at the end, it all proves that these six companies and HG Company are all located in the same office building.

This is so fake. Seeing this, as long as you are not an idiot, you will know that there is something tricky in it. Zhang Yang doesn't know if the Australian police have discovered it, and Zhang Yang doesn't know if COa has discovered it, but Zhang Yang knows that this discovery is unlikely. Neither the company nor the six companies have made an announcement. And when Xingkong is performing advanced searches, the program it releases to capture information is more powerful than Googee's!

In other words, you can use the starry sky search information program as a small super powerful Trojan horse, because it can search for information in some websites that are not open to the public, such as some information in a company's internal network. Another point is that these so-called cooperation news are only the results obtained based on the calculation and analysis of the starry sky, they are not divided, and there is no direct information indicating that there is a connection between them.

After hesitating for a while, Zhang Yang turned off all these materials. After thinking about it, Zhang Yang began to open his own springboard all over the world. Zhang Yang’s springboard has been useless for a long time. Many of these springboards can still be used, and some of them have disappeared. , Either discovered by the other party or the other party's upgrade system destroyed these hidden back doors.

The more secretive the backdoor, the higher its camouflage, and the higher the camouflage, the more vulnerable it is to be affected. For example, upgrading the system, etc., will passively destroy these backdoors. Because the camouflage programs of these backdoors are normal system services, so even if these backdoors are checked out, they will not suspect that it is man-made. This is the highest state of placing backdoors.

Like those backdoors that are hidden and not easy to be found, although they are hidden enough, and they are not easy to find, at least those backdoors cannot be discovered if the technology does not reach a certain level, but these backdoors have an obvious shortcoming , that is, once someone finds out, others will immediately know that this is man-made. Someone left a back door in the system, unlike the back door used by Zhang Yang. System services or other things are not optimized, not handled well, or it is regarded as a loophole. And don't think it's man-made.

This kind of back door can ensure your own safety to the greatest extent, because you can’t use broiler all the time, once someone discovers the back door you left when you are not using it, and concludes that the back door is man-made Afterwards, the other party can easily place various honeypots in the system to detect your backdoor. Once you enter the system illegally through this back door, your whereabouts may have already been discovered by the other party's honeypot.

Then you fell directly into a passive position. If the opponent is a master whose strength is almost the same as yours, it is impossible for you to run away. In fact, despite the fact that hackers seem to be very secretive, even if they do bad things on the Internet, no one can find out, but the war between hackers is actually very cruel. As long as one party makes a small mistake, under today's technical conditions, you will be very vulnerable. It is difficult to get rid of each other, unless there is a big gap in strength between you.

After connecting all the broilers at the back door that you can still use. Zhang Yang directly began to illegally invade Australia's official telecommunication system. Zhang Yang did not access Australia's network through normal channels, such as opening Australia's website, and then accessing the information of these websites, etc. Through such means, there is no useful information at all. information.

What Zhang Yang is now invading is the entire Australian telecommunications network. It seems vague to say this, but to put it another way, for example, compare a country to a huge wide-area LAN, and all users are members of this wide-area LAN. Users, and our users visit these websites normally, as if everyone is walking on the street openly and going to another community to see our friends and neighbors.

But what Zhang Yang is doing now is to investigate these communities from another aspect, the information of these neighbors, such as the record information of this community in the city, its resident information, geographical location, what equipment is attached, and so on. And these things are another network system stored in the entire country that can be said to be hidden under the normal network. It is not open to the public, and ordinary people will never know that such a place exists.

In fact, to put it bluntly, this hidden network system is the filing of all these websites, and seeing some digital things in it, which is very boring. And basically no one will check such things. Although each country maintains the operation of such a network, these data and the like are all computer data, and it is too huge. Except for those fixed filings, other temporary data, The number generated every day is enough to crash the world's largest supercomputer, including the star field.

The reason why Zhang Yang entered this system does not mean that he is a god, he can get what he wants from here, but that Zhang Yang wants to see what the current network environment in Australia is like. Undoubtedly, this method is simplest.

After finding Australia's National Telecom server, Zhang Yang sneaked in. For Zhang Yang, almost all the current firewalls known in the world are outdated products for him, and he can enter silently without much effort.

After entering this server, Zhang Yang immediately began to quickly enter a few commands in Xingkong's command input box, which is actually very simple. Zhang Yang wanted Xingkong to count the illegal accesses that occurred in the entire network in the recent period of time. How is the data different from usual.

This kind of data-based stuff is easy to count. In about ten minutes, Zhang Yang got the information he wanted. Looking at the data that appeared on the computer screen, Zhang Yang immediately whistled, very good, it looks like Australia is indeed in turmoil at the moment.

Judging from the reality of the data, although Zhang Yang has no way of knowing how many hackers there are, or which hackers they are, and it is even more impossible to know which websites have been attacked, or which networks have been hacked, but Zhang Yang does not need to know these, Zhang Yang only needs to It is enough to know that the number of hackers active in the entire Australian network system has at least tripled at the moment.

However, these data were produced by one person, a team, or dozens of people, but these data all prove that there are indeed experts here in Australia!

I didn't expect that I would inadvertently plant a willow instead of Liu Chengyin. Originally, I just wanted to divert COa's attention casually, but now it seems that I found this cunning fox by mistake.

It is whether the fox's tail is real, whether it grows on the fox's body, or the tail that has been broken and discarded by the fox. After exiting this system, Zhang Yang erased all traces of himself. Apart from this little effect, there is no other use here. Thinking of getting other information, Zhang Yang has to do it himself.

After thinking about it, Zhang Yang pondered for a while, and quickly entered a URL in the address bar. This is a very common pornographic website, and it is also a very old-fashioned trick. The unobtrusive spam link is a server login port that a famous Australian hacker team usually contacts.

Zhang Yang knew it in his head, and he knew quite a few hackers. Although he basically had no contact with these hackers in his life, Zhang Yang in his previous life was well-known among hackers all over the world. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like