Transformation of Qin Yuniang

Chapter 54 The Battle Between Hackers

Li Xiujie's proud self-esteem was also provoked.In front of girls, no boy would choose to shrink back!Even though he is still skeptical about whether this guy named Qin Yuniang is a man or not!

"Okay!" There was a smile on his face, rubbing his white and fat hands together, and then made a gesture of please.

The others were all very depressed and speechless, so they had to start up all the spare computers and servers they had prepared.

Qin Yunniang stared excitedly at the constantly beating letters and symbols on the screen interface, and her excited eyes narrowed.The hair on the top of the head is silent and automatic, which shows that the owner is very happy and excited at the moment!

hum!

There was a buzzing sound, and not far away, more than 60 computers connected to the local area network were also activated.Opened the host in front of him, saw the system desktop come out, then inserted a memory card taken out of the wallet into the back of the host.

As a hacker, even if he is an amateur, if he does not have one or two background vulnerabilities to control the system software, as well as something he designed, then he is ashamed to call himself a hacker.It just so happened that several secret weapons compiled by myself were burned in this memory.

Qin Yuniang pursed her lips, her eyes were shining brightly.She stared at the screen closely. After entering the system through the background program, she saw the code flow jumping rapidly, so she inserted various commands into it.

His fingers were like fluttering butterflies, crackling and tapping on the keyboard.In the entire computer room, only the hum of the chassis and the sound of the keyboard remained.

Li Xiujie was still unhurriedly sorting out the computer memory in his hand.Trace erasure, vulnerability inspection, firewall installation... As a veteran, he is not worried about his failure. The only thing he needs to consider is how ugly he should make this guy lose!Should he directly hack into his computer within 10 minutes, or wait for fifteen minutes to declare the game over?After all, it's about your face!

As a technical geek, you may be able to insult his personality, or trample on his self-esteem.But in his professional field, he must not be insulted!Because, every technical nerd has a proud heart of professional ethics!And Li Xiujie was no exception. It took him half a year to compile the software, but he didn't expect that in the eyes of this person, he gave an answer that could be easily deciphered.That being the case, then I don't need to show mercy to you!

With a cold snort in his heart, Li Xiujie opened his programming software, and then entered a series of commands!

Drop drop!

At this moment, the more than 50 computers kept ringing alarms.This is an alarm issued by the firewall installed inside the system after being attacked by a malicious virus.Li Xiujie was stunned, but he didn't expect that this guy would use such a brutal intrusion method as soon as he got started!

Broiler!

A very representative word came to mind!

The so-called broiler actually refers to a remote computer with administrative rights, or a computer that can be controlled.By controlling these broilers, and then issuing various orders, the hacker's ultimate goal is achieved.

"Hehe, interesting!" Li Xiujie had a look of surprise on his face, but the enthusiasm in his eyes became even crazier.

Qin Yunniang changed all the IP addresses, administrators and passwords of these more than 50 computers, and set herself as the only super administrator!Then, by duplicating their own resources and jumping in a wide area, they frantically impacted the data in their respective computer memory!

Her tactic is very simple, that is, through these more than 50 computers, constantly refresh and copy resources, and then attack all IPs with the same submask segment in the WAN.Finally, as long as one of the computers is found not to automatically copy resources, and then quickly locks its IP address, it is possible to control Li Xiujie's computer interface!

The IP address is not only the ID card of a computer, but also a key for the owner to open the computer!Therefore, protecting the virtual IP address from being discovered is the core security barrier when hackers are attacked!

And all of Qin Yunniang's methods are centered on obtaining the other party's IP address!

In fact, this is easy to understand.All hosts here are connected to the WAN through several switches with the same submask segment.And if the switch is compared to a big pot, then these computers are a bunch of sweet potatoes in the pot, and they are being cooked together.In addition, these sweet potatoes are not only the same shape and size, but even the color and taste are exactly the same.The only thing that changes is the different IP end numbers.

However, in order to prevent his IP from being discovered by the WAN, Li Xiujie will definitely use special means to cover up his address.However, no matter how he modifies and conceals it, he will not be able to escape from this cauldron.And Qin Yunniang controls all the computers in the cauldron, frantically copying resources by herself, resulting in resource redundancy, which leads to high virtual memory, system crashes and inoperability!

At this time, even if Li Xiujie has great abilities, after the system crashes, all the protective walls will be in vain, and the IP address is even easier to obtain by himself!Therefore, the only thing he can do is to delete redundant resources.And once this is done, its IP address will also inevitably be exposed!

The corner of Li Xiujie's mouth twitched slightly, and his eyes gleamed. This method was not only crude and simple, but also extremely deceptive.In the field of hacking, he has encountered many such virus attacks.

"But," then, he frowned slightly, with a disdainful smile on his face, "For me, this virus attack mechanism is exactly what I'm best at!" That's right!In the hacker peak forum, his attack methods have always been known for being simple and rude!Even the forum offensive and defensive battle became a classic template for his attacking style.

Playing this kind of trick in front of him is like playing big swords in front of Guan Gong!

Without hesitation, Li Xiujie opened the software - the source code injection formula, that is, the virus software that Qin Yunniang said in a very relaxed tone: the principle has been mastered.After entering various codes and instructions, he covered up his virtual IP address, and then modified the virtual memory in his computer.

Immediately, a strange look flashed in his eyes, and he saw that on the computer, in another console that was cut out, all icons and files were automatically detected uncontrollably.This is the signal of being invaded by others!However, this signal came and went quickly, and it seemed that no abnormalities were detected.

Li Xiujie couldn't help showing a smug look on his face, and couldn't help but look up at the opposite side. Although she was covered by the baffle on the table and couldn't see her face clearly at the moment, she can definitely guess that she must be puzzled now expression.I have searched the wide area network for several times, but I can't find the abnormal computer, it's a hell!

"Hey!" He really wanted to laugh out loud, the method he used was actually very simple.It is the system memory camouflage!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like