Chapter 88: Broiler Ecstasy Array [Asking for a Monthly Pass]
"Xiaofeng, what is the old man looking for you for?"
On the way back to school, Yang Cheng finally couldn't help but ask.
"If you want to know, ask him yourself. ”
Yang Cheng smiled bitterly: "If I dare to ask the old man, do I need to ask you?"
Han Feng shrugged: "Then there is no way, don't ask me, I definitely won't say it." ”
"Don't talk about it, it's not rare!" Yang Cheng pursed his lips, "But looking at your current virtue, you don't have to guess to know that your kid will definitely get benefits today." ”
Are there benefits?
Han Feng himself can't say clearly, if he has to work hard in exchange for four years of quiet college life is also a benefit, this is a bit too sad.
If Han Feng is a person, no matter how the old guys toss, it has nothing to do with him, and it will have no impact on him. But Han Feng still has parents, and with the usual practice of the old guys, if Han Feng doesn't cooperate, they will definitely hit his parents with their ideas, and then his parents' lives will not be very peaceful again.
In addition, Han Feng's super system doesn't know when it will be completely perfected, he hopes to try not to be disturbed by the outside world, so that he can upgrade and improve his super system with peace of mind, so when he heard Yang Xinglin make this request, he also made a request.
To be honest, even Han Feng himself didn't expect Yang Xinglin to agree to his request, after all, four years is not a long time, and it is not a short time, and no one can predict what will happen in it.
Unexpectedly, Yang Xinglin actually agreed, and said that he would persuade Shanghai. Give Han Feng four years.
Is it because the safety of the life of this American girl named Shirley has unusual significance to the Yang and Han families, or do they think that they can't make any waves in four years?
Or maybe both?
However, this is not what Han Feng cares about, he only knows that as long as he protects the girl named Shirley, he can at least confirm that he still has four years to serve as a buffer.
Yang Xinglin also said, give him four years, four years later. See if you have the ability to escape your predetermined destiny.
Four years?, Han Feng showed a hint of mockery on his face.
Enough is enough! My fate will be in my own hands!
Yang Cheng sent Han Feng back to school and left immediately without stopping.
This uncle. Han Feng still doesn't know what he's doing, and it seems that every day is idle enough.
Han Feng did not go back to the dormitory directly. Instead, he came to the stands on the open-air stage next to the school's artificial lake and sat down, and then took out the relevant materials that Yang Xinglin gave him from the file bag.
From the aesthetic point of view of Oriental people, this Shirley is also extremely good-looking, porcelain doll in general, if Han Feng is not wrong, she should be a mixed-race child, Han Feng saw the characteristics of Oriental women from her.
An American. I actually came to China to study Chinese. It's really interesting, it seems that her Chinese level should be good.
There is very little information about Shirley in the archives. There are only a few photos of her life, and then some of her main habits and hobbies.
The rest of the information is some bodyguard training materials. It's mainly about how to quickly identify the crisis, how to protect the safety of the employer as much as possible, and as a bodyguard, you should take the safety of the employer as the first priority, rather than fighting back and fighting with the other party...... And so on and so forth.
Now that he has accepted this task, Han Feng will not be perfunctory, not to mention, this matter also involves a series of Han Feng's life plans after that.
After reading all these materials, and then copying them into his own brain, Han Feng went back to the dormitory.
The other three are there, Xu Linhu is sweating profusely and seems to have just come back from playing, Li Wang is still reading the comics he just rented, and Chu Shuai has been actively preparing for the upcoming hacker competition. Boiling +++ Teng ++++ Wen +++ Learning members hand-played
"You're all here, just right, there's something to tell you. Han Feng said.
Li Wang: "What's the matter?"
"I decided not to live on campus anymore and moved out. "Han Feng is no longer in the Department of Computer Science now, it doesn't matter if he moves out or not, because in the Department of Neuroscience, with Li Zhongwen's special care, Han Feng is the most special existence in their department, and these little things can't affect him at all. In fact, Han Feng has long wanted to move out, and it is not convenient to do anything in the dormitory, so he has to go to the teaching building every time. It's just that he has already lived in the 301 dormitory, and he hasn't made up his mind for a while.
Xu Linhu asked, "Or have you decided to move out?"
"Yes, it's decided. Han Feng nodded.
Chu Shuai said suddenly: "Crazy, it doesn't matter if you want to go out to live, keep this bed, just come and get together with your brothers when you have nothing to do in the future." ”
Li Wang echoed and said, "Yes, anyway, this year's accommodation fee has already been paid." ”
Han Feng agreed to this plan.
He cleaned up a bit, then went back to his rented place with his computer in his arms.
Turning on the computer and connecting to the Internet, Han Feng began to investigate the American girl "Sydney". Seprano".
The information provided by Yang Xinglin was too limited, and it hardly helped Han Feng, and Han Feng was interested in why this girl could bother Yang Xinglin to worry about it personally, and what kind of status the family she belonged to was in the United States.
Everything was as if it had been rehearsed thousands of times, and Han Feng easily found more than a dozen broilers around the world, which was a springboard for him to use for invasion, in order to make himself safer, he first spent a lot of effort to strengthen the security of several of the key broilers and patch some loopholes.
Then, Han Feng used these broilers to form a multi-springboard defense network.
This is an anti-invasion tracking method created by Han Feng, he forms a mesh topology of these broilers, and then selects a broiler from one of them to access, and then starts from another broiler to connect with the invasion target.
The advantage of this is that if the invasion is discovered by the other party and the other party conducts anti-invasion tracking, he will fall into the "broiler ecstasy array" arranged by Han Feng, and he will be faced with hundreds of possible tracking routes. This greatly delayed his tracking progress.
In fact, the principle of broiler ecstasy position can be abstracted as the "shortest path problem" of the "cycle graph" in graph theory, these broilers are connected to each other, which is equivalent to forming a "cycle graph", and the nodes in this cycle graph, some are two-way, and some are one-way.
If the anti-intruder wants to track down Han Feng, he has to go from one node (the target of the invasion) to another node (Han Feng's computer), and if he wants to find Han Feng in the shortest time, he has to find the shortest path between these two nodes.
But. Is this shortest path so easy to find? The answer is clearly no.
Among the hundred people who tracked the earth, there were probably only ten people who were able to continuously break through the broiler that had been reinforced by Han Feng's own hands, and among the ten people. Faced with so many possible routes, there are probably only three people who choose to continue tracking. Two of them will be dizzy by Han Feng's "Broiler Ecstasy Array", and the remaining one may be able to find an effective path to another node, but at this time, Han Feng has already disappeared without a trace.
Han Feng's "broiler ecstasy array" principle seems very simple to say, but it is almost impossible to reverse this principle through those broilers, because the other party can't see the whole picture at the beginning. It's just a blind man touching an elephant. Peeping leopards in the tube, one by one broilers tracked away. After breaking through several broilers in a row, he may find himself back in the same place, boiling...... Rise...... Wen...... Even if he became interested in this way of confusing the enemy. wanted to study further, but Han Feng wouldn't give him a chance, because before he could find out all the broilers, Han Feng must have already wiped out the traces on those broilers, and all that was left was a few scattered broilers that seemed to have no connection.
Since the invention of Han Fengdi's broiler ecstasy array, all invasion actions have been simply invincible, greatly reducing the chance of being discovered by the other party.
After the preparations were made, Han Feng logged in to a mailbox in his place and pulled out a list of broiler chickens from it, and the broilers on this list were all computers that Han Feng found that were connected to the announcement network and the U.S. military network, and these computers were the bridges for Han Feng to enter the internal military network of the United States.
There is quite a lot of broiler data in this list, and it is not difficult to find it, as long as you find one of them, it is possible to find another large list, because many of these computers have some kind of connection with each other, and Han Feng can find a large list as long as he touches the vine.
After 20 years, many of the broilers in it have failed, but in the end, Han Feng still found a few that are still alive.
After the preparations were made, Han Feng successfully hacked into a computer in Arlington, Florida, that could be connected to the US military's private network, which was not on Han Feng's broiler list, but was in the same network segment as one of the broilers on that list.
After a lapse of 20 years, Han Feng once again saw the familiar login interface of the US defense database.
This interface has not changed much for decades, and Han Feng still clearly remembers that he was found by the FBI because of the hacking of this database, and was finally secretly extradited back to China six months later.
This national defense database, which holds the information of all legal citizens of the United States, is very familiar to Han Feng, because he used to visit it almost every once in a while. It is believed that this database is also a place that other hackers around the world like to visit, so every once in a while, the security performance of this database will be improved to a certain extent, but this still cannot avoid the fate of being hacked in the end.
The U.S. military network has its own set of network communication and data transmission protocols, because this set of protocols is strictly confidential, and protocols such as TCP/IP are very different, and also use encryption and coding technology with fairly advanced security performance, hackers who are only familiar with public network protocols, in the face of this kind of network, the possibility of successful intrusion is zero.
However, vulnerabilities on the Internet cannot be prevented, because the biggest vulnerabilities exist in people. No matter how secure your network is, if the people who use it don't have a high level of security awareness, from this point of view, the network is equivalent to being open.
For example, the computer that Han Feng is now hacking into, the owner of the computer is obviously a member of a certain department of the US military, and the authority is quite large, and it can directly log in to the national defense database to query information.
Instead of spending time looking for vulnerabilities in the defense database system, Han Feng focused on cracking the password of the computer's owner.
In order to obtain a person's password, in addition to analyzing its password characteristics from the perspective of cryptopsychology, so as to derive its possible password combinations. In addition to using brute-force crackers to get out, there are many other methods, such as social engineering, and monitoring and so on.
It is the daytime in the United States now, the golden time for work, and the owner of this computer is working the computer at the moment, and his every move is under the monitoring of Han Feng.
Han Feng found that his job required frequent searches of various databases in the United States, and what triggered him to do so was an email sent from the outside.
Email?
Han Feng was a little strange about this discovery. Is this guy working like a data intermediary, providing data to others?
In order to validate their ideas. Han Feng checked the security configuration of this computer to make sure that there was no security protection software that could be very perverted. According to the type of system in other places, upload a data sniffer that you want to match, this sniffer can sniff out the specified data exchange content in this computer, and then send it to the mailbox designated by Han Feng.
Intercepted a few emails that entered the computer and a few emails that were sent out, Han Feng entered the mailbox and checked it, and suddenly understood the content of this guy's work.
It turns out that he is an informant who provides basic data queries for other spies and intelligence officers!
He works. It's about providing intelligence officers who need information with all the data they need. Of course. This information is very basic, such as the location of the owner of a car. All accommodation records of a hostel, etc., etc., etc.
Han Feng once again uploaded a small piece of software written by himself - a keylogger. This little thing is able to run in the background, and under normal circumstances, it is impossible to find out if it is running or not. It's also very simple: it automatically records all the keyboard characters of the computer user, and then quietly sends those records to somewhere in the network.
After running the software, Han Feng began to wait, waiting for the keylogger to automatically send his password to one of his mailboxes.
But after waiting for about ten minutes, he found that the other party still had no intention of logging in to the national defense database.
Han Feng decided not to wait any longer, but took the initiative to let the other party log in.
So, according to a keyword, he found the emails related to the national defense database, and then downloaded a few letters, and the information required by these emails must be logged into the national defense database, but this has already happened.
Han Feng imitated the format of one of the emails, imitated an email asking for information, and was about to send it to the owner of the broiler, but stopped again.
"Not true. ”
Han Feng looked at the strings of codes at the end of those emails that seemed meaningless, and at first he thought it was garbled or something, but now he suddenly remembered that this might be a special code similar to authentication.
Han Feng randomly picked a string of codes from it and attached it to the end. Then I sent my own email.
In this email, he asked the intelligence agent to find him Joseph, the "godfather" of the American mafia in the last century. All Bonanno materials and then send them to the designated location.
The email sent by Han Feng did not have a sending address, only the email address to be sent was indicated in the content of the letter.
Han Feng detected that his mail had successfully reached the intelligence officer's mailbox, and after waiting for a while, he began to log in to the national database to find Joseph. Bonano's profile.
"There it is!"
Han Feng received the recording information from the keylogger as soon as possible.
In this way, Han Feng obtained his login and password.
He removed the keylogger and deleted the system entirely.
After the other party logs out, Han Feng opens the login interface of the U.S. defense database, enters the username and password, and the login is successful!
Entered Shirley in the search box. Seprano's name, found that there were many records with the same name and surname, and then Han Feng added an age condition, filtered these records to only a dozen or so, and then entered the location to filter, and only three records remained.
Han Feng found what he was looking for, and in order to save time, he immediately downloaded all the materials related to Shirley, and then retreated.