Desperate Hacker

Chapter 235 Action Begins

Chapter 235 Action Begins

Generally speaking, if you want to sneak into someone else's computer, the best way is to find the person's social account, and then use various Trojan software or other means to implant the virus into the other person's computer through social engineering. Once successful, you can Get the other party’s information!

But of course you can do this process if you have enough time!
But if you don’t have enough time!Then it is better to use the simple and crude direct method!
This is what Chen Qingfeng is using now!
He directly found the address where the target he wanted to attack lived, and then cracked the switch in the automatic apartment!
Now he can do whatever he wants!
Chen Qingfeng tried to spy on all the data from that woman's room!
Soon his packet capture software captured some information.

However, this information is encrypted and needs to be cracked!
That's not what Chen Qingfeng wanted. He found the other party's MAC address first!

Then he found a way to implant the flame virus into the other party's computer!
Soon, line after line of information appeared on the screen!

Chen Qingfeng looked at the content on the screen, all in Japanese!
So he could only call Zhao Changan over, send this information to Zhao Changan, and ask him to use translation software to translate it line by line!

"What is he doing?"

“It seems like I’m replying to a colleague’s work email!”

"tomorrow……"

"At 9 p.m., the company's internal management system will be upgraded, please come in advance..."

"Is their company going to upgrade tomorrow?"

Zhao Changan told Chen Qingfeng the result of the translation!
Chen Qingfeng immediately started operating on the screen!

He needs to find the other party's mail server, because since this email is sent to all colleagues in the company, the receiving end must be the company's mail server!Now you just need to control this server!

Soon, the address of an email service was displayed on the command line!

Chen Qingfeng tried to log in to this server remotely!

Not surprisingly, he successfully obtained administrator rights!
Some companies are used to using off-the-shelf email services!

But for those companies that pay attention to security, they prefer to build their own email servers!
This is especially true for companies involved in financial services!

However, many companies don't realize that they build email servers.This is not a problem at all for organizations with state-level hacking skills.

There were no street lights in the alley. Zhao Changan watched Chen Qingfeng busy and walked around the alley!
There are many shops around here, but there are no cameras at all on the road!
This made Zhao Changan feel relieved a lot!

After Chen Qingfeng obtained the administrator rights, he immediately unplugged the connected debugging data cable!

He packed up his things and left with Zhao Changan, gently closing the iron door of the equipment room before leaving!

Chen Qingfeng has done everything he needs to do, and now he has the management rights for MX Company's email service.

After returning to the hotel!

Chen Qingfeng first took a hot shower, and then started browsing on the mail server!

Large companies have the habit of using email!

Because when a company reaches a certain level, there will inevitably be some more bureaucratic things!
To put it simply, for example, if you hand over something to the other party, it is useless to just say it. You usually need to send an email. After the other party confirms receipt of the email, the responsibility is transferred to the other party!
As an office worker, Chen Qingfeng still has this awareness!
So the mailbox of mx company basically covers everything!
As long as you sort through these emails, you can learn many confidential things about this company!
Chen Qingfeng went through several months of emails!
Finally confirmed what tomorrow’s upgrade will be!
Mx company will upgrade the company's internal OA system tomorrow!

Simply put, it is an office system!
However, Chen Qingfeng also discovered a name that was mentioned frequently in the email - "Asset Management Technology Department!"

"Old Chen! What should we do now?"

"Tomorrow is a good opportunity for them to upgrade their system. I will cause them some trouble, such as making them inaccessible remotely!"

"and then?"

"Listen! The next thing is the most important thing. The core asset technology department they care about most will definitely try to log in carefully! This is our opportunity! Have you seen these MAC addresses?" What's wrong?"

"These addresses receive emails frequently. I looked at the contents of the emails and found that many of them are applications for access permissions! In other words, these MAC addresses are responsible for opening permissions, and they may belong to the helpDesk department!"

"What should I do now!"

"Your matter has nothing to do with gaining access to the vault. We appeared in that company today, but the surveillance system of that building should belong to the property management company. You have to find a way to erase the records of our presence in the surveillance system. !”

"what?"

"Anyway, you still have to go to that building tomorrow, but you have to change your outfit! You'll have to play it by ear then!"

Chen Qingfeng did not directly explain Zhao Changan's mission!

Because he was busy sending these microphone addresses to his collaborators in the United States!
……

It was early morning in New York, yet Jerry and Matt had been up almost all night!

The two of them would sit in front of the computer from time to time, checking to see if the other party had sent messages!

After a long time, Jerry was tired and snored on the sofa!

Just then, the computer suddenly rang!
Just a gentle message reminder!
Jerry immediately jumped up from the sofa, and then he patted Matt who was half asleep!
"Matt! Wake up!"

"Oh my god!"

Matt woke up quickly and sat in front of the computer. Then he saw the message from the other party!

"How about it?"

"MAC address! We need to use these MAC addresses to forge access qualifications! Wow, we also have control over the mail server!"

"what?"

"That guy is so efficient! He invaded the company's office network and gained control of the mail server!"

"Wait a moment!"

A line of messages quickly appeared on the screen. Jerry read it and immediately understood the meaning of the messages sent by the other party!

"He asked us to help sort out the emails and see if there is any valuable information in the server! He will hand over the servers of other systems to us in a while!"

"What is this guy doing?"

"He's looking for access to the bank! I really don't know how he did it. Such a company actually has no secrets in front of him!"

Matt soon learned what he was told!Immediately afterwards, Jerry also received instructions from the peaker.

"This message is sent to you. He asks you if you have enough trading methods. He needs to know your plan in advance!"

"What do you mean?"

"Oh! He said he wants to make sure your financial plan is foolproof, so now he wants you to tell him your subsequent trading plan!"

"This guy also understands finance? Forget it, in order to continue our cooperation, I will send him the following content now!"

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like