The old man was very angry.

"LittleBoy, where does he get the confidence to challenge the big companies?" The man with black-framed glasses wondered.

Behind the five major video websites are Internet giants such as Tencent, Cat Factory, and Blue Factory. LittleBoy's challenge to the five major video websites is also a challenge to these Internet giants.

"This guy is just making a gimmick." The young man with a few pimples on his face said, "Don't look at him with the eyes of a hacker. Treat him as an Internet celebrity, and all his actions will be reasonable."

"Yes, Internet celebrities can do anything to become famous."

In order to attract attention and traffic, Internet celebrities can do anything.

The long-faced man and several others all thought that LittleBoy was just an internet celebrity who wanted to be famous.

It was not wrong to think so.

Su Yang was indeed trying to attract attention and take advantage of the popularity of big companies, but he was not doing it for fame or money, he was just trying to get points.

"This guy has some strength, I admit that. But I don't believe that he can challenge the security teams of several big companies alone." The long-faced man said with a contemptuous expression again, "Who does he think he is? Does he think he is the first hacker clown in Longguo?"

The long-faced man despised LittleBoy's behavior of being famous and having no bottom line.

He believed that LittleBoy's challenge to the five major video websites was overestimating his own ability, just for fame, and hype, without any bottom line.

If it was the clown, he could understand it.

Although there is no official ranking in the hacker circle, everyone tacitly agrees that the clown is currently the first hacker in Longguo.

The reason is very simple. The clown successfully invaded the Japanese military exercise and killed a Japanese helicopter.

Military, banking, aviation, nuclear power plants... these fields have the highest level of network security, and the military field represents the highest level of network security in a country.

If a hacker can break through the network security system of military products, then civilian products are even easier for him.

"This guy is so arrogant. The strength behind the big companies is not something a hacker can shake. If we want to break through the system of one of the video websites, we can't succeed without half a year of collecting various information and vulnerabilities. He only has a few days, is it possible?" The man with black-framed glasses complained.

They themselves are the security team of a big company, and their strength is definitely among the best. By analogy, it is impossible for LittleBoy to break through the systems of the five major mainstream video websites in a few days.

While they were discussing, a netizen in Su Yang's live broadcast room applied for a connection.

"Boss, hello, I have an encrypted file. I forgot the password after a long time. I want to ask you to help crack it." The netizen said.

"Forgot the password? It's a piece of cake. Leave it to me." Su Yang readily agreed.

The netizen sent the encrypted file to Su Yang.

Su Yang first opened the firewall, scanned the file, and checked whether it contained a Trojan or virus.

After confirming that the file was safe, he called up a password cracking software and began to try to crack the password of the file.

Seeing this scene, the black-framed glasses man's eyes lit up, and he suddenly came up with an idea, and said to the bearded man:

"Boss, I have an idea! We can also pretend to be netizens, connect to LittleBoy, make up a reason of 'lost file password', and then implant the Trojan we wrote into the file. Once he cracks the password, the Trojan will run automatically. In this way, can't we get his real IP address without any effort?"

"Hey, this is a good idea!" The long-faced man's eyes lit up when he heard it.

"Boss, I think this method is feasible!" The acne man agreed.

Several people cast their eyes on the bearded man.

Their boss, the bearded one, was thinking, "It's not as easy as you think. I watched LittleBoy's video and found that he was very cautious. If it was so easy for us to get the IP address, his true identity would have been exposed long ago."

That's right

It makes sense. LittleBoy is not stupid. Before receiving the files sent by netizens, he will definitely use the firewall to scan them to see if there are any Trojans or viruses in the files.

Therefore, the method of the man with glasses should not work.

However, just when the methods of several people did not work, the bearded man spoke again: "But we can try it."

"Boss, do you think we can try it?"

The bearded man smiled and said, "People always have times of negligence. LittleBoy is now live streaming. While live streaming, he is cracking passwords. His attention will definitely be distracted, and he is prone to negligence."

After that, the bearded man sat in front of the computer and wrote the Trojan program.

He personally went into battle.

After more than 20 minutes, the Trojan program was completed.

"Monkey, you are best at shelling, I'll leave it to you." The bearded man uploaded the Trojan program to the work group.

The so-called shelling is to encrypt the Trojan program to avoid firewall detection.

Monkey is the long-faced man. He downloaded the Trojan program. After seeing the size of the program, he gave a thumbs up to the bearded boss and said:

"Boss, your Trojan is only 920K in size, awesome!"

The smaller the size of the Trojan program, the lower the probability of being discovered by antivirus software and firewalls.

"Crackle!" The long-faced man's fingers quickly tapped on the keyboard, adding a shell to the Trojan program.

Soon, the shell was completed.

"Awei, come and test it." The bearded man said.

"Okay." The glasses man responded.

The hacker team has their own strengths. The bearded man is the boss who is good at writing Trojans and viruses, Monkey is good at encryption and decryption, and Awei is good at various security tests.

Ten minutes later...

"Boss, no problem, I tested more than a dozen mainstream firewalls, including our company's own firewall, and did not find this Trojan." Awei reported.

The tools are ready, and next, it's their performance.

Several people came to the office next door.

The bearded man sat in front of the computer and thought for a moment, "Awei, go get an ordinary laptop. My computer is not good. It is easy for LittleBoy to detect it."

In the past day, the bearded man watched several live slice videos of LittleBoy and learned about Su Yang's behavior habits. He knew that when Su Yang connected with netizens, he would first implant a Trojan on the other party's mobile phone or computer.

His laptop was installed with a professional-level firewall, and LittleBoy would notice something was wrong.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like