typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1148 Find out the identity and count it later in the fall!

There is a fatal hardware vulnerability in AMD's server CPU. Currently, there are only two hackers who have mastered this hardware vulnerability. One of them is Shi Lei, and the other is Maha Kamal, the original discoverer of the vulnerability.

The reason why Shi Lei knew about the hardware vulnerabilities of AMD's server CPUs was because in later generations, Maha Kamal disclosed the hardware-level vulnerabilities he discovered.

But in the current era of 2007, Maha Kamal has not disclosed this secret. In other words, in theory, only Maha Kamal knows this secret.

Therefore, Shi Lei is certain that the hacker who invaded the supercomputer Lightning is Maha Kamal!

Although Shi Lei knew it was Maha Kamal, 'Mahar Kamal' was just a hacker vest codename, and Shi Lei wanted to find out Maha Kamal's true identity.

Maha Kamal is a hacker from the Inca country. After the first martial arts competition in the Brave World, Shi Lei and Tao Wenxian happened to go to the Inca country to deal with an issue.

If Maha Kamal's true identity is found, Shi Lei would not mind killing this threat in its infancy.

Shi Lei entered the supercomputer Lightning through Server 1. Since the last invasion by Maha Kamal, Shi Lei not only repaired the hardware vulnerabilities of the server CPU, but also created a huge honeypot system.

This honeypot system uses a lightning mirror simulation of a supercomputer. The entire honeypot system is extremely real. Even though Maha Kamal has the strength of a world-class hacker, when faced with an unfamiliar supercomputer, he directly

I fell into the trap and fell into the honeypot system without realizing it.

Shi Lei checked Maha Kamal's intrusion information. Maha Kamal was in the honeypot system, searching for the status of the honeypot system. It seemed that he wanted to determine the details of the supercomputer lightning so as to further control the supercomputer.

Computer lightning.

Unfortunately, Maha Kamal didn't know at all that he had fallen into a trap carefully laid by Shi Lei, who was reversely investigating his real IP address!

'Hmph!' Shi Lei observed Maha Kamal's unscrupulous scanning behavior and snorted in his heart, 'Do you really think that knowing hardware-level vulnerabilities means you can be lawless?'

"Have the preparations for Yizuer.iwn secret network resources been completed?" Shi Lei asked Yizuer. Since Maha Kamal is currently inside the supercomputer Lightning, if the resources of the supercomputer Lightning are used, he may be alarmed. Let

He was evacuated from the supercomputer lightning and lost the target he was tracking.

"It's ready!" Yi Zuer opened the port for retrieving the computing resources of the iwn secret network to Shi Lei, so that Shi Lei could conveniently call it.

After obtaining the computing resources of the iwn secret network, Shi Lei immediately stepped up his efforts to counter-track Maha Kamal. He quickly and covertly processed the transit server used by Maha Kamal.

These relay servers provide Maha Kamal with hidden protection of his real IP address. If the anti-tracker is a little weak, it will be blocked by the defense of the relay server, thus providing cleanup for Maha Kamal.

Time of real IP address traces.

As an anti-tracker, is Shi Lei weak?

Shi Lei, as the world's top hacker. In the entire hacker world, he is also among the small group of people at the top. Tracking Maha Kamal's real IP address, Shi Lei will never make a mistake as long as time allows.

'There are actually twenty-seven transit servers, and each transit server has reached the standard of a first-class broiler. The computer industry in the Inca country is indeed very developed!' Shi Lei was dealing with the Maha Kamal issue.

Twenty-eight broilers.

After processing it for almost ten seconds, Shi Lei bypassed the twenty-eighth broiler and went to the next one without triggering the broiler server's defense mechanism.

The twenty-ninth broiler did not resist Shi Lei for more than ten seconds. Shi Lei easily broke through the server's defense. Just when Shi Lei was about to continue tracking, Shi Lei discovered something strange.

The thirtieth broiler turned out to be the transit server that he had broken open before. In other words, Maha Kamal used a circular transit broiler network protection system.

Shi Lei has encountered this kind of defense and protection scheme before, but the loop transfer broiler network protection system he encountered before was only a small loop composed of three broiler servers.

But this time, the cyclic relay broiler network protection system used by Maha Kamal used a total of twenty-nine relay servers!

Once upon a time, when Shi Lei's hacking skills were not yet fully developed, he also liked to use the loop broiler network protection system to protect his real IP address.

Although the circular relay broiler network protection system can effectively confuse anti-trackers, it is not without flaws. In this protection system, each additional relay broiler server requires more powerful technical strength.

According to the strength shown by Maha Kamal, twenty-nine relay broiler servers were built in the circulating relay broiler network protection system. He indeed has world-class strength.

When Shi Lei discovered that Maha Kamal was using the loop broiler network protection system, Shi Lei temporarily stopped tracking. The loop transfer broiler network protection system, as the name suggests, is a loop broiler network. The so-called

A cyclic network can be simply understood as a circular semi-closed network.

To give an vivid example, tracing the real IP address of the loop transfer broiler network protection system is described as finding the starting point and end point of a circular pattern. How should we find it? Obviously, if there are no strict restrictions, it will never be found.

of.

Shi Lei now needs to find the real IP address hidden by the loop broiler network protection system.

In addition to requiring strong technical strength, the loop transfer broiler network protection system also has a fatal flaw. It is precisely because of the existence of this flaw that real top hackers will never use this method to cover up the real IP address.

.

The fatal flaw of this loop relay broiler network protection system is that in order for the loop transfer broiler network protection system to protect the real IP address, the real IP address needs to be placed in the loop relay broiler network protection system.

In other words, the real IP address is hidden in the loop broiler network protection system used to protect the real IP address. This is like looking for the starting point of a circle. It is difficult to find under normal circumstances, but if the starting point of the circle is

What about the ones marked in red?

The current situation is like looking for a starting point marked in red in a circle. With Shi Lei's strength, he can really find it easily.

After confirming that it was a circulating broiler network protection system, Shi Lei changed the tracking plan. As an expert who had used the circulating broiler network protection system, Shi Lei was very aware of the flaws of the circulating broiler network protection system.

In less than thirty seconds, Shi Lei discovered the anomaly of the 21st relay server. Shi Lei searched carefully inside the 21st relay server. After a while, he discovered something suspicious.

"Aha, I caught you!" Shi Lei briefly analyzed the IP address of the transfer server and found that it was a disguised address. The real IP address was also hidden inside this broiler server.

After obtaining Maha Kamal's real IP address, Shi Lei immediately began to investigate the real IP address and the corresponding real-world address.

According to Shi Lei's speculation, Maha Kamal is very confident in the hardware vulnerabilities of the server CPU, and he will not worry about anyone tracking his real IP address. So, under such circumstances, Maha Kamal uses

It is very likely that no manipulation has been done to the real IP address. In other words, through the real IP address, the actual identity information of Maha Kamal can be investigated.

"Yizur, retrieve the line information!" Shi Lei ordered Yizuer to retrieve the network line information, and he himself invaded the network service provider in Uttar Pradesh, the Inca country.

Maha Kamal's real IP address, corresponding to the real-world location, is in Uttar Pradesh, the Inca country. For further detailed information, Shi Lei needs to invade the network service provider in Uttar Pradesh and combine it with the corresponding real IP address.

Ability to query results.

The network service provider in Uttar Pradesh did not have high defense strength. Shi Lei had already entered the data server of the network service provider in Uttar Pradesh without spending much effort.

Inside the data server, Shi Lei conducted a query and comparison based on Maha Kamal's real IP address. After a while, Shi Lei obtained the matching information.

Network service registration address: 1037 Siding Street, Lucknow, Uttar Pradesh; Registrant: Madsen Kamal.

Shi Lei looked at the obtained matching information with a smile on his face. He immediately invaded the network of the Bureau of Population Information and Statistics of Uttar Pradesh and extracted all the information of Madsen Kamal from the network of the Bureau of Population Information and Statistics.

After the joint analysis of these data by Yizuer and Shi Lei, a conclusion was drawn from the side: Madsen Kamal has superb computer technology, and he is the Maha Kamal that Shi Lei is looking for!

"So it's you!" Shi Lei said with a chuckle, but he did not immediately take action against Maha Kamal and allowed him to investigate around in the supercomputer Lightning's honeypot trap system.

Shi Lei has no time to deal with him now. Shi Lei needs to sit in Shuangqing City and personally protect the main server of Brave World to prevent the main server from being invaded by hackers.

The first martial arts competition in the Brave World has come to an end, and Shi Lei doesn't want any problems to arise. Because if any problem occurs, it will be a fatal problem!

As for Maha Kamal, Shi Lei has found out his true identity information and read human facial features. If he wants to deal with him, he can settle the accounts anytime and anywhere.

At this moment, Shi Lei is more concerned about the battle between Qiao Mo and Mu Feng!

.(To be continued, please search Piaotian Literature, the novels will be better and updated faster!


This chapter has been completed!
Previous Bookshelf directory Bookmark Next