The Strongest Hacker

Chapter 640 Fox Tail (2)

The Internet is a virtual reality society! This sentence may seem contradictory, but in fact, it is easy to understand. ;The network was born based on the real society. Similarly, it is a virtual society, but the so-called virtual real society refers to some real rules, which are also applicable in the network world!

For example, there is an old saying that a strong dragon does not overwhelm a local snake, which proves that the local snake is still very powerful in its territory, and the same is true in the Internet. The reason why Zhang Yang found this Australian hacker group was because of all the turmoil in the Australian Internet world, this hacker group was undoubtedly the most well-informed.

In fact, this is not difficult to understand, just like, if you are a hacker, you live in [China], and suddenly the US Internet world explodes. , but said that it would not be serious, and carefully understand the backside of these intrusions, because it has nothing to do with you. At best, you are just a crowd of onlookers who don't know the truth.

But after the same thing happens in [China], you will definitely seriously understand how it happened, the reason, etc., because you understand that once such a thing happens, the country’s violent agencies and law enforcement agencies will definitely intervene, and This is closely related to you. If this incident exposes your real identity, you will be waiting to go to jail. Once it is related to you, you will definitely pay attention to it.

Therefore, Zhang Yang sought out this hacker team from Australia, known as an ideal to the outside world, in order to obtain the resources in their hands. Of course, as for how to obtain it, there is a little trick in it. In fact, the overall strength of the hacker group Idealist can only be said to be average, similar to that of the Black League. Most of the members in it are King, Geno and their level, and there is still some distance from the real super hackers.

Zhang Yang didn't directly click on that link, it was a login port, which requires a specific account number and password to enter. Chapter 640 Fox Tail (2), and the core members of the Idealist are just a few people 1 so Such a login port must be monitored by software. Once Zhang Yang clicks, unless he has a specific account and password, or closes that page directly, otherwise, no matter whether he is trying to crack it or something, it will definitely be the first time. Was discovered by the other party.

After all, ordinary tourists who come to such a pornographic website will not look like an egg to help the website click on the advertisement? And it's an ad in such a remote location. Zhang Yang opened the analysis software and analyzed the entire * website. After finding its address, Zhang Yang directly started the invasion without even thinking about it. The result of the invasion surprised Zhang Yang. *The website was run by them, but these guys didn't do any defense against this *website at all, it was just a simple server, and then the website structure was built in it, and the firewall even used a cracked version on the market.

talent! Zhang Yang is full of black lines, these guys will hide it, but think about it, if the firewall of this junk* website is made super powerful,

As long as you are not a fool, you will think that there is a problem with this website. It's not even an intrusion at all, the system installed in the entire server is full of loopholes, and a few small tricks are used casually. Zhang Yang successfully entered the server.

However, Zhang Yang did not immediately obtain the highest management authority of the server, but rather a very small

Carefully scanned the entire server with a scanner. The scanning process was very fast. With the assistance of Starry Sky and supercomputers, it only took a few seconds to analyze these junk servers. After reaching the conclusion, Zhang Yang couldn't help laughing. These animals are insidious enough. The firewall and system of this server are extremely bad, but many places in this server system have placed many highly concealed honeypots.

After carefully bypassing these honeypots and confirming that no honeypots were touched, Zhang Yang directly copied the entire database of the same site to his computer. After copying, Zhang Yang quickly erased his traces and launched this *website.

After opening his own anti-compilation software, Zhang Yang directly began to let Xingkong start to decompile the entire website structure. He needed the source code of the entire website structure. The OP address and some information of their commonly used login ports must be hidden in the source code.

The speed of reverse editing is quite fast, that is, it only takes a few minutes. The current performance of Xingkong is too high, and it is simply overkill to do these things. After finding the information he used frequently in the source code, Zhang Yang immediately returned to Australia, and then searched for the OP address in the data filing of Australia's national telecommunications network server provider.

Even if you don't search for this OP address, Zhang Yang knows that this thing can't be the four-adjacent address of any member of the Idealist. It is probably the address of the server they use for contact. It is naturally very simple to find such a server. Find a server rental company to rent such a server, and there is no need for the parties to come forward. Now the server rental company, as long as it is a regular company, can sign the lease contract and pay on the Internet.

It's just that although Zhang Yang thought that this OPa address would be the address of a server rental company, what Zhang Yang didn't expect was that this address would be this. coincide? Looking at the address searched on the screen, Zhang Yang was stunned for a while. This address was found by Zhang Yang just before. Technology company!

Damn, it's not easy! Zhang Yang was a little speechless. If he wanted to invade this company, Zhang Yang would have already invaded. The reason why Zhang Yang didn't do anything was because he didn't want to scare the snake. Although Zhang Yang has confidence in his own strength, the world is not afraid of anything but 10,000. No one is a god, and no one can guarantee that they will not make mistakes all the time, especially now that the other party may be Zhang Yang who has always been afraid, and even when the starry sky is a snubio made by someone else, Zhang Yang cannot be small

Heart.

But now this link is coming back, your sister! It took a long time for Zhang Yang to roll his eyes. Now he has no good solution. After thinking about it, Zhang Yang decided to do something. It's not a problem if it goes on like this, who knows that I will come back after going around in a circle. Turning on his own scanner, Zhang Yang did not scan the OP address, but scanned the official website of HG High-tech Company.

The result of the scan was very fast. To Zhang Yang's slight surprise, this HG company has some strength. Their company's firewall is very good, and the entire system does not have any flaws. Although some loopholes that have not been announced yet still exist, But these few loopholes are not too fatal loopholes, it can be seen from this that the technical strength of this company is really good.

But this still can't stop Zhang Yang, their company's strength is not bad, but there is still a big gap from the world's top firewall. After about twenty minutes, Zhang Yang successfully entered the company's internal network, quickly scanned the inside of the system, it was normal, except for the firewall, anti-virus software and some security policies, Zhang Yang did not find any other The honeypot, which proves that there is no problem with the normal operation of this company.

Is this really just a coincidence? Zhang Yang touched his chin. Originally, Zhang Yang thought that there must be something wrong with this company, but now it seems that the facts are not what Zhang Yang thought. On the surface, there is no problem with this company, and the official website of the whole company is also Very clean, no mess. Looking at the scan results, Zhang Yang thought for a while, and finally turned off the scanner. Zhang Yang didn't want to care about the situation of this company for the time being. Now he first invaded the ideal person's server and got the OPs addresses of their members. the most important.

From these people, Zhang Yang may be able to get some information that he does not know. He has already entered the company's system, and it is not a problem to invade a separate server next. For servers leased by this kind of rental server company, whether it is a group of servers or a thousand groups of servers, the external OP address of each server leased to the same company must be separate, and it is impossible to have two companies The situation of sharing a static , unless the two companies have negotiated, this may be possible, otherwise, according to the regulations of each country, this situation is impossible.

And this server is a server rented by the idealists for interest, so the number of servers does not need to be large, there are only two sets of servers. Server leasing companies are only responsible for renting out servers and maintaining the server hardware to ensure that there are no problems with the server hardware. As for what the server is used for, is it used as a website, a game server, or a game private server? , The server rental company doesn't care at all.

In other words, among these servers, the firewalls of the companies renting these servers are also different. Zhang Yang re-scanned the firewall of his target server.

Sure enough, the firewall of this server is quite advanced, which is in line with the strength of the ideal organization.

Zhang Yang analyzed this firewall. It is not any firewall that appeared on the market. It should be written by their internal members. Its operation method is not the same as the firewall on the market. After scanning this firewall, almost all All external ports are closed, and no external data transmission is accepted at all. Only one point-to-point port is left open, which should be the login port connected to the * website. ! ! ! \u003c/p\u003e;

;

-------------

-------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like