Chapter 141: Catching the "Traitor" (I)
Compared with other departments in various countries, the department responsible for network security is actually very depressed, the real masters of the network are always in the private sector, and the civil servants of other departments do not know how many people want to squeeze into it every year, but in the area of network technology, it is the opposite.
Only a small part of them are caught by the state departments, and the remaining part is in various large high-tech enterprises in the country, and a group of people with real strength are hidden in the people. These people are often subject to all kinds of restrictions in reality, so they yearn for freedom more, and the Internet provides this platform, so they will not join these disciplined departments at all.
What is attractive to people in the state sector is not its treatment, but its rights. And the people who are engaged in technology are not strong about rights, they admire those who are more technologically awesome, and these people are what they admire more.
If it's money or whatever, some of the big companies are more tempting than these departments. Therefore, the network security departments of various political axes are more tragic, but the whole country uses these talents to network them, plus their own training, so the masters in the country should not be underestimated, and there are so many master hackers on the Internet, you don't know which one works for the country.
After the Black Hawk left, God quickly said in the chat room: "GscSD should have contact with those little guys in the Black Alliance Forum, I'll go and talk to them, just kicked out Gscsd directly, don't let him have any other ideas." The others didn't say anything, and they all agreed.
When God went to find the people of King and their gang, Zhang Yang couldn't help but go offline, he was too sleepy, and when he just invaded, he was in high spirits, but at this time everything was over, and the gang also shrank up like turtles with shrunken heads, I don't know where they went, and they didn't even pay attention to the provocative announcement that Zhang Yang sent in the Defense Department, which made Zhang Yang very depressed.
This group of grandsons, after messing around, ran away, damn. Although Zhang Yang didn't track down these people just now, Zhang Yang had already roughly guessed that these hackers should be in an organization, just like God's small circle, and they may not be in a country, I'm afraid there are all over the world.
Zhang Yang had no place to vent his anger if he wanted to, and when he was in the car from the website of the Defense Agency just now, Zhang Yang was so angry that he simply killed the entire database server of the Defense Agency! At this time, the official website of the Defense Agency just hung an ordinary announcement, saying that it had just been attacked by hackers and was maintaining the website at the moment.
mlgbd, sleep, Zhang Yang scolded, and then he was ready to go by them, the enemy is dark and I am clear, and Zhang Yang has no good way. Just about to turn off the computer, Zhang Yang suddenly found a prompt for a new email in the lower right corner, Zhang Yang was stunned for a moment, his mailbox did not contact anyone, this mailbox is only used to feedback the tracking information of the tracking virus.
Once an email comes back, it means that a tracking virus has tracked down the target and sent the target's information back, but all the targets that were just publicized for tracking have been gotten rid of? And Zhang Yang has completely eliminated the tracking virus. Why is there an email feedback at this time?
Zhang Yang quickly opened the mailbox, and when he saw the message sent back, Zhang Yang's face became extremely strange! Accidents, definitely accidents within accidents! The reply email is not a tracking virus, but an infected worm! Quickly and carefully read the information on the side, Zhang Yang understood by the way why there were infected worms sending this email back!
The Assassin Killer Virus is adapted from the infected insect, and when Zhang Yang fully activated the infective insect, the source code of the two was exchanged on the Internet, which gave the infected insect part of the ability to track the Assassin virus and mutate itself! And just now the gang used the Assassin virus, and their use of the Assassin virus was the same as Zhang Yang's use of infected insects, through the backdoor opened by the Assassin virus, to achieve the purpose of rapid invasion.
Needless to say, it is obvious that there are assassin viruses in the places where these people pass, and the virus that specializes in killing assassin viruses restricts self-deletion, and it will clear itself after 2 hours, but there is no time limit in the infected worms, so the infected worms with this function immediately bite along the assassin virus.
It is estimated that this person is also unlucky, when he retreated, after getting rid of Zhang Yang's tracking, he didn't realize that there was actually a virus that could follow another virus to the door, plus the mutated infected insect virus is not the same as tracking the virus, he is analyzing the virus to track, not tracking the data flow, in this way, its terrifying hidden surname is fully exerted.
In the end, all kinds of coincidences made the tracking virus specially placed by Zhang Yang ineffective, but this infected insect virus gave Zhang Yang a big surprise! This typical intentionally planted flowers do not sprout, and unintentionally planted willows and willows become shady. Zhang Yang almost didn't get excited about the convulsions.
"nnd, can you stop playing like this in the future, it will surprise people's little hearts." Talking to himself, the sleepy insect also ran away, Zhang Yang was excited again, carefully checked the detailed records sent back, Zhang Yang sighed, these animals, real TM perverts, Zhang Yang thinks that he has enough springboards for broilers, but there are more springboards for these grandchildren!
This TM is simply a springboard emperor, judging from the records of infected insects, this grandson's springboard has actually turned around the world, what the United States, Europe, South America, and even Africa have gone around, and in the end its destination makes Zhang Yang's face look weird, TMD, this grandson is actually in H City! Right in the country! Tracing here, Zhang Yang knew that this must be the real IP of the other party.
After thinking about it, Zhang Yang quickly wrote an order for the infected insect, in addition to the information of this target, the other infected insects Zhang Yang let them self-delete, although at present Zhang Yang does not know if anyone has found the existence of the infected insect, but be careful, the infection ability is more terrifying than the assassin virus, such a virus may cause large-scale panic around the world, in case it causes an economic crisis or something like that, it will be a tragedy.
After writing the command, the number of infected insects displayed on the computer decreased rapidly, and in just ten minutes, all the infected insects circulating on the network had been self-deleted, leaving only the virus that had been traced to the enemy, and the infected insect had infected the opponent's computer. This person is obviously very confident in their own technology, and they didn't check it carefully at all, otherwise, no matter how good the hidden surname of the infected insect is, it will still be easy to find when they enter the other party's computer.
Once the insect is lurking inside the other person's computer, it is a little difficult to find it. After thinking about it, Zhang Yang felt that it was better to touch the other party's computer while it was hot. Just after such a series of battles, it is a huge loss of energy for both sides, especially these attackers, in the early stage, they have made so many springboards around the world, and they consume more energy than publicity.
Just after the end, Zhang Yang almost fell asleep directly from exhaustion, you can imagine the energy of these people, don't think that invading other people's computers does not consume energy, in fact, although it is just both hands tapping on the keyboard, one by one commands do not seem to be serious consumption of physical strength, but at the time of the invasion, whether it is Zhang Yang, or any hacker, the brain is in a high-speed operation, and a high degree of concentration, this state has been in a long time, and the consumption of energy is very huge.
Not to mention, the physical fitness of many otaku is a little worse than that of ordinary people. If you want to quietly hack into the computer used by the master, it is more difficult than hacking into the servers of some companies! After all, the server is a business name, and the numerous network accesses and various requests make it have a lot of vulnerabilities, and the personal use is different.
After connecting various springboards from the new, Zhang Yang even logged in to Satellite 1 through a mobile satellite base station, and then drilled out of NASA and went around the United States before he began to hack the computer. With the infective worm as the internal response, Zhang Yang only needed one scan to get the general situation of this computer.
It's not entirely correct to say that it's a computer, it's completely server-level, and it's even faster than Zhang Yang's cheap server, and when he sees this computer, Zhang Yang knows that this person is probably not ordinary rich. If you buy such a good server in reality, it will cost at least about 1 million, and it's still in dollars!
A scan of the entire computer,Zhang Yang is a bit of a dog bites a hedgehog,I can't say the feeling,This grandson's computer uses a Linux system,There are also vulnerabilities,But this TM is no different from a hedgehog,The whole system is easy to go wrong where countless honeypots are placed,These honeypots have no way to detour,But once the invasion will immediately sound the alarm。
Although there is a backdoor opened by an infected insect, this person is very insidious, there is a hidden applet inside his system, what special role does this applet have, but once there is illegal access to the computer, or the data traffic flowing out of the computer is large to a point, then it will immediately launch an alarm.
Grass! After a long time, Zhang Yang couldn't help but scream, how should I get this TM? For the first time, Zhang Yang felt that it was so difficult to quietly invade a person's computer, and it seemed that he still underestimated the heroes of the world. Because the other party is not using the computer at all, and there is no junk program running in the computer, the normal network traffic is pitiful.
This network traffic monitoring program will send an alarm as soon as the upper and lower traffic exceeds 5kb per second. After thinking for a long time, Zhang Yang stayed on the brood, wanting to prevent the program from sending alarms, the brood is a good choice, the membrane function of the brood can give this program an illusion, deceive the program, as long as Zhang Yang enters the computer, the rest is easy to say.
The problem is that although the size of the brood is not large, it is also about 14m in size, and the transmission speed is 5kb per second.
(To be continued)