Transformation of Qin Yuniang

Chapter 55 Picking the Feet of the Vegetables?

Simulate the physical memory of your own computer and hang it high, showing exactly the same system symptoms as other broilers, so that you can hide under the eyes of hackers.Of course, this requires high operating skills. After all, this kind of simulated high hanging is not a real self-consumption of memory, but a very concealed deception.

After passing the IP detection, Li Xiujie stared at the screen very leisurely, watching the more than 50 IP address bars displayed in it flashing non-stop, and then issued a reminder document after someone invaded the internal system, feeling very happy in his heart!

Hiding in the online world, you can control everything with the code you type under your fingers.This kind of god-like, high above and in control of the life, death and wealth of all living beings, the satisfaction and stimulation it produces can definitely make anyone addicted to it.The most important thing is that as a hacker, you can use your own technology to do whatever you want, and allow yourself to modify the world, and this is the highest state that all hackers yearn for and pursue throughout their lives!

So, seeing Qin Yuniang looking like a pitiful bug, still digging hard like a fly in order to find her own IP, Li Xiujie once again felt a strong sense of pride and pride, as well as the excitement and excitement of being able to control others at will. excited!

"Hey! I won't play with you anymore!" After about 6 minutes, Li Xiujie felt dull.This technical gap did not arouse his desire to fight at all.I thought that this Qin Yuniang still had a lot of talent, but I didn't expect that she was just a rookie who could operate two broilers. He was tired of this kind of low-level stuff when he was a child.

"Tsk tsk, it seems that the so-called high-achieving students in Biyang School are nothing more than that." He curled his lips, secretly contemptuous in his heart.Thinking about it, he tapped his hands again and opened another program.

IP tracking vulnerability compilation system!This is a subfeature that comes with the source code injection equation.

Through the traces left by the host computer of the other party on other broilers, and then conduct anti-tracking, and finally enter its system to achieve the purpose of modifying management rights.

However, there is actually no need for tracking.

The advantage of controlling a large number of broilers is that the enemy cannot lock their IP address in a short period of time.And has a very strong destructive power.Generally, the larger the number of broilers, the greater the instantaneous destructive ability caused.

But the shortcomings are also very obvious.Due to the large number of broilers under control, cleaning up the IP traces in the broilers is more complicated and cumbersome.Once the opponent has calmed down and resisted the first wave of attacks, then his own IP address information can be easily cracked by the opponent!The IP address represents the computer key controlled by the hacker. Once it is compromised, there is basically no place to hide it at that time.

But Qin Yuniang's actions were too obvious.I don't know if she was deliberate, or she didn't have the awareness of this at all. The IP information is basically in every broiler, and she doesn't even bother to erase it, allowing the IP address information to be stored in the system.

Li Xiujie quickly cracked an IP address segment, but to be on the safe side, he cracked several computers in succession, and found that all the traces of the IP address segment were exactly the same, with a satisfied smile on his face.

After obtaining the IP address of the opponent, unless he cuts off the power and the gateway, he can only wait obediently to invade the computer.

So, after a burst of smug laughter, he typed that short IP address into his compiling software.

Entering the other party's computer was very smooth, without even encountering the slightest obstacle or interception.Her backport door seemed to be undefended at all, allowing others to enter.Li Xiujie was stunned, feeling something was wrong.After all, Qin Yunniang is also a half-baked hacker, no matter how poor her skills are, at least she knows the importance of IP addresses.Now the firewall is wide open, assuming a posture of letting you in and out, which has to make him wonder if it is a trap.

Li Xiujie had encountered this situation several times when fighting other hackers on the Internet, and almost fell into it.After spending a lot of thought and finally locking the IP of the opponent's computer, and then entering the system and intending to modify the administrator's rights, I found that the so-called system in the computer was actually an extremely deceptive fully enclosed honeypot !If he hadn't reacted fast enough, he would have already caught the traces of his computer entering and leaving.And once the other party analyzes their own traces, they can realize anti-tracking, and even finally find their own IP address.

"Could it be that this guy really has two brushes?" He muttered in his heart.Cautiously, he scanned the system of Qin Yuniang's computer again, but found that there was still nothing abnormal, only a few abnormal software were always open.

Li Xiujie frowned, then shook his head, and couldn't help laughing at himself: "It seems that my hacker is getting more and more back, and I have become less courageous, and I have become so cautious when I meet a rookie. "So, without the slightest hesitation, after typing a line of code commands on the keyboard, he directly attacked Qin Yuniang's system and began to steal administrator privileges.

However, if he saw the smile on Qin Yuniang's face at this time, he didn't know how he would feel.

On the screen, three areas were divided.Qin Yuniang was squinting her eyes, carefully staring at the middle area.I saw a mouse inside that was shaking non-stop, and with each movement, it scanned a large amount of data stream from time to time.

"Hmph! The fish finally took the bait!" A beautiful smile curled up on the corner of her mouth, and she hurriedly typed a few characters. Immediately, the data stream in the middle, which was constantly being scanned, suddenly stopped abruptly as if it had encountered an obstacle!The mouse arrow just disappeared!

"Huh?" Li Xiujie was stunned for a while, with a look of hell on his face.He wiped his eyes with his hands, his face full of disbelief!

On the screen, it was Qin Yuniang's backstage, but what made him feel cheated was that this backstage had been invaded by someone!

"This...that's impossible!" Li Xiujie was confused. There were only the two of them in the competition. Could it be that some hacker was too busy to sneak in?He couldn't help but glanced around, everyone was staring at the two large screens above their heads.And those two screens corresponded exactly to the contents on Qin Yuniang's and Li Xiujie's respective computer screens.

Scratching his hair, he always felt that something was wrong.And the idea that there might be a third-party hacker that came up just now was directly thrown out of his mind.Eaton University is a well-known school in the country, and the network defense system is also deployed by bringing together many national-level hacker elites.He didn't believe that any hacker could have such a powerful ability to intrude into the Eton School's network without making a sound, and even take part in this relatively low-level competition.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like