Rebel Demon King

Chapter 27 Anti-Tracking

Chapter 27 Anti-Tracking

When Cheng Mo walked to the school, in the student dormitory of the special students in Building A2 of Changya Middle School, Song Xizhe, who had slightly curly hair, big and round eyes, and a very handsome appearance, was staring at Cheng Mo's IP address in a daze. According to IP It shows that this person was in the "Blue Love" Internet cafe in the middle of the degenerate street just now, and he also hacked into the management system of the Internet cafe and looked at the other party's ID number.

Most of the Internet cafes in Star City use the Vientiane management system. For him, it is a system full of loopholes. According to the ID card, he judges that the other party is about 20 years old, and he is a boy named Hu Xin. Song Xizhe thought that this person should be Yuelu Academy or Normal University. of college students.

Under normal circumstances, Song Xizhe would not scan the client's IP address, but when he tried to enter the website given by the other party yesterday, Song Xizhe was really scared, so he deliberately checked who the other party was today, but unfortunately the other party was very cautious , covered the camera with clothes, and he even suspected that the other party's ID number was fake.

In fact, when Song Xizhe tried to enter the URL given by the other party last night, he was not completely successful. At first, he tried to ping the server using conventional means and was able to find the IP address, but the webpage was still unable to enter.

So he chose to directly invade the server and find clues from the server. Generally speaking, there will be multiple sites on a server, and only large sites will have several servers or even computer rooms.

But strangely this is the only site on this server.

Then everything went fine, he started looking up the DNS records, the type of the website server, the type of scripts running on the website, the type of OS of the server, the ports the server opened to the outside world
Then he discovered that the site requires a very strange browser - Netscape Navigator to log in, which is an extremely old browser, even older than Internet Explorer, with poor security.

Not only that, but it also requires the Netsc ape Navigator to be retrofitted to a specific model to be able to access this site.

This made Song Xizhe extremely curious about what kind of website the client gave him. Without even thinking about it, he spent Bitcoin to download a specific version of Netscape Navigator on a foreign hacker forum to his computer. The security system is very confident.

However, after he downloaded and typed in the URL, he could only enter the login page, and registration required an activation code. Of course, Song Xizhe couldn't be bothered. He directly started to review the elements, saw the data statement through the debugging console, parsed it, and looked for loopholes. .

But after he bypassed the activation system and successfully registered directly, he could only stay on the surface of the website and could not access the data at all. In short, a system can be divided into five levels: external service area - management area - internal service area - Office area - Core area.

From left to right, the nature of the area is increasingly hidden.As a hacker, the attack sequence should also be like this, enter from a room in the external service area, and then rely on the information found, try to jump to other machines, strive to enter the internal service area, and then enter the core area through the office area.

So Song Xizhe is just staying in the external service area at the moment and can't enter the room in the external service area. At this time, he needs to find a way to enter the room (post), and then he can do more things, so Song Xizhe starts to brush the code again, but in When he tried to enter a post, a red banner suddenly popped up on the webpage, which read in English: Please stop your hacking, we have detected your exact location, please leave this website immediately, otherwise there will be consequences conceited.

Then a red "5" flashed on the webpage, and the countdown started. Song Xizhe had never encountered such a situation since he became a hacker. He was stunned for two seconds, but he still made the most correct response and immediately I pulled out the power supply, and when I turned it on again, I found that my computer could not enter the interface of the operating system at all, and the blue screen directly
Helpless, Song Xizhe could only reinstall the system. After entering the computer, he found that almost all his data and software had been deleted. The other party broke through the protection of the virtual machine and attacked the host computer. Song Xizhe felt incredible.

However, Song Xizhe did not realize the seriousness of the matter at this time. He thought that the data could be restored after being deleted. However, he was restoring the data overnight, but only half of it was restored. Some data were completely overwritten when they were restored. This means that the data can never be recovered.

Including a lot of information that should be handed over to customers, which made Song Xizhe's losses very heavy.
Fortunately, the screenshots of entering the forum yesterday are still there, so all these losses naturally fell on Cheng Mo's head. Song Xizhe looked at Cheng Mo's IP address and thought: "Folks see fellows, I lied to you that we didn't discuss.buddy!You've hurt me a lot this time. I've been working overtime all night, and I have to lose so much income. It's not too much for me to ask you for [-].
-----------------------

When Cheng Mo returned to the class, it was still early before class. Some people in the classroom were sleeping on their stomachs, some were listening to music with headphones, some were playing with their mobile phones, and some suspected couples were sitting and whispering together. The classmates who lived close to Changya They all go back to rest. Those who are not in Star City can go to the dormitory. As for someone like Cheng Mo, they either go to the library or stay in the class.
Cheng Mo naturally wouldn't agree to the invitation of the school doctor Gao Yuemei to go to the school doctor's office every noon. If you take the initiative to accept someone's kindness, you must give it. This is the principle of Cheng Mo.

His arrival did not cause any waves, only Sun Dayong, who was sitting on the seat playing "Glory of the King", looked up at him, Cheng silently walked through the mottled aisle, beside him, beige The colored desks glowed brightly, and some of the blue curtains were pulled with only a golden gap left, while others were bundled into a bundle and slowly drifted by the cool wind.

Cheng Mo thought to himself: What is my youth?One person's quiz?A one-person classroom?life of one person?
Life is so boring!

No, don't think about it so much, I have to live first.

Cheng Mo sat in his seat and looked at the watch again. If this watch is really worth [-] million, then if he sells it, he may be able to perform a heart transplant. At present, the heart transplant is very mature. , the difficulty is not in the operation.

It's just that the source of donors is seriously insufficient, but this is nothing to the rich. A large part of darknet transactions are organ transactions.

The second is that even if the surgery is successful, you have to take anti-rejection drugs for life to suppress your own immune system, and it can only last for ten years.

However, as long as it lasts for more than ten years, there is hope that he will wait until his own cells are cultured to print the heart and solve the problem of donor and rejection. Originally, what he was most looking forward to was that this watch could provide such data to medical institutions, but according to Spicy Brain Pickings From the screenshots of the forum, it is far from the same thing.

Cheng Mo presses his curiosity about the content of those posts, such as those inexplicable team invitations, such as whether the "inactive Ouroboros" mentioned in the trading posts is the watch on his wrist
But to solve this problem, you must log in to that website. Since Laji Brain Twitch is so sure that you can’t find a way to log in on the Internet, then you have to get a way to log in to this website from him, 5000 yuan He doesn't have the money, but he must learn the method.

He began to recall the process of communicating with Laji Nao Tuo. If he could find out the real identity of La Ji Nao Tuo, he would be able to use him as a hacker to steal website information and threaten him, but the question is what should he do? Found a spicy brain pump?
Ordinary people may be helpless and feel that they are not hackers and have no way to track them back, but Cheng Mo doesn't think about how to chase the hot dogs from a technical point of view, but thinks from the logic of people's behavior.

Cheng Mo began to recall some information on Lai Ji Nao Suo QQ. There was actually no information on it. The age was [-] years old and the address was filled in Los Angeles, USA, but some of his data screenshots were basically from the space of this QQ number, so he said Although this number is not his personal number, it must be his usual work number.

And almost all hackers want to go to forums to communicate with others, including Cheng Mo’s search for Lai Ji Nao Su on the “No Taboo” forum, so Cheng Mo took out his mobile phone and searched the largest hacker forums in China, “Hong Ke Alliance”, “Dark Group Technology Forum”, “Hegou.com”, etc. After finding these forums, Cheng Mo began to test his endurance and willpower. One by one, he went to find posts and QQ about the ID of La Ji Nao Pumping. Number
(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like