typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk303 The trap is to betray others!

. Shi Lei just retrieved the SO plan from the enterprise-level fixed broiler and retrieved the local disk of the No. 1 server. He reassembled the overall SO plan file package and was about to open it when Endless Defense issued an alarm.

When he clicked on the log record of Endless Defense, Shi Lei's expression suddenly changed!

The document package of Project SO actually automatically recorded the IP address of Server No. 1 and attempted to transmit information to the International Intelligence Bureau of the Ministry of Foreign Affairs.

If there is no endless defense to prevent this information from being sent out, then JFS can know Shi Lei's real IP address in an instant.

And they knew Shi Lei's real IP address without Shi Lei's knowledge!

Knowing Shi Lei's real IP address, the International Intelligence Bureau of the Ministry of Foreign Affairs can do something, which will make Shi Lei a target. They will not directly invade this IP address, or even detect it.

They will only query this IP address and the corresponding actual geographical location.

There is no doubt that the actual specific address can really be found from the IP address. Although IP addresses are dynamically allocated, for example, the IP address used today and the IP address used tomorrow may be different.

But can’t dynamic allocation be found?

This idea is naive!

To use network services, you need to physically access the network, that is, have a network cable connection. With a network cable connection, records will be generated at the network service provider.

Network cables exist physically. No matter how advanced your hacking skills are, you can't hack all the network cables, right?

Physically existing lines will have number records on the network server. For example, if Shi Lei's network service in Jingyayuan accesses the service through a physical network cable, the network service provider will assign an IP address to this line. If someone

Once you know the IP address and have hacked into the network service provider, you can use the IP address to find out which line the IP address is assigned to.

From the line number, Shi Lei's real address can be found in the line number record!

Even if Shi Lei hacks into the network service provider and modifies this information, there will be no real insurance. Because the information on line installation is not only electronic records, but also written records.

When Jingyayuan introduces an Internet service provider, the Internet service provider will make a written record when allocating each line.

Therefore, Shi Lei hacked the record information of the Internet service provider. If someone really wants to investigate, as long as he has a relationship with the Internet service provider and can check the written records, then Shi Lei will be in tragedy!

As for wireless Internet access, it is even more unreliable. Wireless signals have positioning characteristics, and wireless Internet access is easier to track than wired Internet access!

Shi Lei was startled by the SO plan and broke into a cold sweat. Fortunately, he had endless defenses, otherwise he would have been caught by the International Intelligence Bureau of the Ministry of Foreign Affairs!

Fortunately, when Shi Lei just sent the SO plan back, he used disordered file splitting technology to randomly divide the SO plan into more than a hundred parts, and transferred them to multiple broilers respectively, and then retrieved the local server No. 1, and

The IP connection record has also been eliminated. Otherwise, in the point-to-point transmission just now, the IP address of server No. 1 might have been exposed!

'Damn the International Intelligence Bureau of the Ministry of Foreign Affairs, they are doing all these insidious setups! Fortunately, I am cautious, otherwise I would have been tricked by you again!' Shi Lei was secretly glad in his heart.

There is a problem with the SO plan document package, which confirms the previous suspicion that Shi Lei easily accessed the confidential information server within JFS.

It seems that there is no defense and it is easy to enter the confidential information server, but in fact, it has fallen into the trap of JFS.

JFS security experts designed a trick. They suspected that someone had entered the JFS internal network, so they created such a trap.

Shi Lei unfortunately fell into the trap!

The only good thing is that Shi Lei did not completely fall into the trap. Although he was tricked, his real IP address was not detected.

This is a blessing in misfortune!

After some analysis in his mind, Shi Lei was no longer in a hurry to open the SO plan document package. Something that he could easily take away was probably not a good thing.

There might even be follow-up measures.

In order to study the SO plan package, Shi Lei established a sandbox environment. Any changes in the sandbox environment will have no impact on the system itself.

Sandbox environments have been widely used in the security fields of anti-virus and anti-Trojan horses.

While setting up the sandbox environment, Shi Lei suddenly stopped. It must be very powerful to allow the International Intelligence Bureau of the Ministry of Foreign Affairs to be so confident and bold in this plan!

Stopping the establishment of the sandbox environment, Shi Lei divided the SO plan into more than a hundred parts and sent them to a fixed broiler. At the same time, Shi Lei also copied the endless defense on the fixed broiler.

On the fixed broiler server, Shi Lei began to establish a sandbox environment. If there were any major problems in the SO plan, the fixed broiler server could be borne by the fixed broiler server.

After establishing the sandbox environment, Shi Lei decompressed the SO plan file package. The SO plan file package was not password protected, which was what Shi Lei expected.

When the SO plan file package was being decompressed, through Endless Defense, Shi Lei immediately discovered that the CPU usage of the broiler server increased sharply.

All files decompressed from the SO plan file package start to run automatically, consuming the CPU resources of the broiler server, and at the same time continuously transmitting information to the outside.

Not only that, these automatically running files are replicating themselves in large numbers, flooding the sandbox environment, and trying to cause the sandbox environment to collapse.

Endless defense blocks these automatically running files from damaging the sandbox environment.

Shi Lei analyzed these files and found that most of the files were malicious computer viruses, a small number of files were system backdoors, and some record files scanned the computer for things like account numbers and passwords, and then passed them back to JFS.

In front of Server No. 1, Shi Lei snorted coldly.

"International Intelligence Bureau of the Ministry of Foreign Affairs, you are really insidious!" Shi Lei despised JFS in his heart, and then completely deleted the SO plan in the fixed broiler, and cleaned up the sandbox environment and endless defense.

The SO plan obtained from the International Intelligence Bureau of the Ministry of Foreign Affairs was obviously an empty shell trap. Shi Lei felt a little depressed. At the same time, he was even more curious about what the SO plan was.

Shi Lei, who was in a bad mood, came to the online world of Wosang Kingdom again, and was going to play a game of police chasing the thief with JFS. Of course, Shi Lei would play the role of an Internet thief, and JFS would play the role of an Internet policeman.

After arriving at the network of Wosang Country, Shi Lei first explored the system backdoor he had implanted in the JFS internal network. Shi Lei found that the system backdoor still existed, which made him very suspicious.

JFS security experts did not discover the system backdoor for the first time, so Shi Lei would not doubt it. But the SO plan had such insidious settings, Shi Lei was sure that the stationary broiler who received the SO plan must have been known by the International Intelligence Bureau of the Ministry of Foreign Affairs.

Since even the broiler server knew about it, Shi Lei really didn't believe it if he said he didn't know about the system backdoor.

Since the International Intelligence Bureau of the Ministry of Foreign Affairs already knows about the system backdoor implanted by Shi Lei, and they have not removed it, they obviously want to lure hackers in again, and then try to catch a turtle in a jar!

The guys from the Ministry of Foreign Affairs’ International Intelligence Bureau are really insidious!

After guessing JFS's sinister intentions, it was naturally impossible for Shi Lei to fall for the scam. As usual, Shi Lei logged on to the official website of NHK TV station to check if there was any latest news.

On the official website of NHK TV station, a red headline highlights a huge news headline.

"The International Intelligence Bureau of the Ministry of Foreign Affairs easily eliminated Mr. M's offensive and successfully rescued the Tokyo Metropolitan Police Department"

Looking at this title, Shi Lei was a little bit dumbfounded. NHK TV station likes to pull the strings as always. It is obvious that Shi Lei did not confront JFS and only left a small botnet to delay and stop the International Intelligence Agency of the Ministry of Foreign Affairs.

But in the words of NHK TV station, it turned out that JFS severely injured Mr. M and beat him to the ground. How shameless does this have to be to write a press release?

Shi Lei read the entire article and suppressed laughter. Suddenly, he found something strange at the end of the article.

‘…Looking for Mr. M, we need cooperation.’

This short paragraph of text was obviously not the original text of NHK TV station's press release, but should have been added by someone later. Shi Lei immediately hacked into the web server of NHK TV station's official website, searched for this text in the web server, and added the incoming IP record.

It took a few minutes to find the record. After clearing the record, Shi Lei controlled the broiler and tracked it according to the IP address.

After tracking it based on the IP address, Shi Lei just entered the other party's server and the other party immediately sent a message.

‘Hello, Mr. M!’

There is no signature or any mark, just a simple greeting, and it is in Xia language!

Shi Lei quickly investigated the server and found that there were more than ten connections in total. He thought secretly: 'Could it be the Dark Night Dynasty?'

'Who are you? What do you want from me?'

Shi Lei also uses the Xia language. Among the top hackers, which one does not know multiple languages?

It was Dark Night from the Dark Night Dynasty who came into contact with Shi Lei. He accepted the suggestion of codename D and sought the help of Mr. M.

‘Mr. M, do you have a grudge against JFS? We also have grudges against JFS! To use Xia Guo’s words, we have a common enemy and we can cooperate!’

Shi Lei was curious about what the guys from the Dark Night Dynasty wanted to do. They used the Xia Kingdom to test him. Shi Lei didn't want to be exposed, so he asked.

'How to cooperate? What do you want to do? I still have some good impressions of your Xia country.'

Seeing Shi Lei denying that he was from Xia country in the dark night, he felt a trace of regret in his heart.

‘Mr. M, do you have a system vulnerability that can enter the JFS internal network? We plan to enter the JFS internal network and cause trouble in the JFS internal network!’.

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next