Chapter 216: Unintentional Willow Insertion (Part II)

After getting all this done, Zhang Yang quickly connected to the mobile satellite base station with his mobile phone number and directly connected to the No. 1 satellite. Some of Zhang Yang's software is distributed and hidden in the network, although the computer in his school is not turned on, Zhang Yang can still download a few of the software he needs to PDA.

In fact, Zhang Yang also needs not much software, his main thing is to strengthen the defense of the PDA in case something unexpected happens, after all, MAK is also a computer expert. After returning to the hotel, Zhang Yang went directly back to his room, there was a computer equipped in the luxury suite, but the surname was definitely not very good, Zhang Yang didn't bother to modify it, sitting on the sofa, Zhang Yang quickly started to use the PDA Black Hilton system.

The rooms in the hotel are equipped with network cables, but the network cables of ordinary rooms are not provided for free, you need to buy a network card, or you need to charge according to the day, the network of these rooms has to pass through the Hilton server, and then it will connect to the outside world to connect to the Internet, scan the Hilton server, Zhang Yang's heart is moved.

Naturally, the No. 1 satellite is responsible for scanning, and the PDA in Zhang Yang's hand is just a command transceiver and a monitor, and the main operation does not rely on it at all. Looking at the results of the scanner, Zhang Yang was immediately sure that Hilton's server had been tampered with, and the person who did it was definitely MAK.

If it weren't for Zhang Yang's sneaking into MAK's computer, he would never have discovered this well-hidden honeypot, this guy is very insidious. The reason why the honeypot is called a honey pot is because it is a trap, the function of the honeypot is different, and the position it is arranged is also different, most of the honey pots are so-called traps, when you touch the honey pot and activate it, you will think that you have successfully invaded other people's computers, but in fact, you are in the honey pot simulation system.

And when you touch the honeypot, it starts recording all your work and sending you messages. There are also honeypots encapsulated with inactive, destructive viruses that, once touched, infect your machine directly and start wreaking havoc, either destroying your computer or destroying what you want.

There is also the last honeypot with the surname of the alarm, it is different from the above two, it is more secretive, even if you trigger it, it will not make any changes that make you notice, but will send an alarm to the person who arranged it, telling him that an enemy has stepped on a trap.

And the honeypot that Zhang Yang found was this kind of alarm surname, it is obvious that MAK is very vigilant, it should be said that he is quite vigilant, just staying in the hotel, he has to do something in these aspects. However, the honeypot is like a trap, once it is discovered, there is no threat, and Zhang Yang has a way to bypass this honeypot.

Mak is also very smart, he didn't modify anything in the Hilton server system, he just secretly placed a few alarm honeypots in it, it seems that this behavior does not match his vigilance, in fact, this is the smartest choice.

A hotel's server, even if it is a five-star hotel server, will definitely not be more clever than the server of other large enterprises, because the hotel's server is just a transit, as well as the hotel's official website promotion, etc., although there is also an internal management system, but compared with other types of enterprises, the hotel's dependence on the network is not high, which causes most of the world's hotel servers to be safe and secure.

You know, if you want to improve the security level of your server, the associated security costs are not a small amount per year. Therefore, in the case that the general security of the hotel server is not high, if MAK secretly modifies the hotel's system, perhaps in this way, the hotel's system security surname is high, but it will also cause another result, that is, if someone really hits the idea of this hotel server, I am afraid that this server has been tampered with at a glance.

In that way, even an idiot knows what to do, and mak, a few honeypots that are quite cleverly placed, if it weren't for Zhang Yang's usual caution, and Zhang Yang had hacked into MAK's computer, knowing some of his habits, I'm afraid Zhang Yang would have a considerable chance of being yin by MAK.

Bypassing a few honeypots found, Zhang Yang took about ten minutes to successfully enter Hilton's server, Zhang Yang did not hesitate, directly placed the infected worm in, the infected worm is in hidden mode by default, the so-called concealed mode refers to infecting other computers as much as possible, but it will not affect any function of these computers, except for secretly opening a backdoor, the user of the computer will not find any problems.

This does not mean that the infective insect has no destructive power, on the contrary, the destructive power of the infective insect is absolutely incomparable to other computer viruses, the infective insect can not only destroy the computer data, but also directly destroy the hardware of the computer, but these functions are rarely activated.

The infect soon spread to all the networks of the Hilton hotel, and all computers that used the network in various rooms in the hotel could not escape the fate of being infected by the infected. Putting the PDA on the table, Zhang Yang directly opened the computer in his room, checked the intranet IP of his computer, and Zhang Yang quickly found the address of the next room.

However, there is no data exchange in the network cable in MAK's room, so no one should use it, and MAK probably hasn't come back. turned off his computer, Zhang Yang made the program in the PDA run in the background, and then called Li Yingjie and Li Keqing respectively, telling them that he couldn't go back today. After making the call, Zhang Yang also did not modify the system of the Hilton Hotel, but began to place honeypots like MAK, but before that, Zhang Yang used the simulation system function of the brood to block the system of MAK's honeypots to send alarms.

Then Zhang Yang quickly began to place his honeypot, Zhang Yang set up a small program, he set his honeypot under the mak honeypot, once someone checks the mak's honeypot, or touches it, not only mak will receive an alert, the program hidden under the mak honeypot will also send the alarm to Zhang Yang's mobile phone.

To put it simply, Zhang Yang made another trap under the trap placed by MAK, MAK's trap was against the enemy who tried to enter the system, and Zhang Yang's trap was aimed at MAK. After doing all this, Zhang Yang quickly removed the iron leggings tied to his calves, and then went to bed to catch up on sleep.

Anyway, if MAK comes back, Zhang Yang will get the information, and he is not in a hurry. Lying on the bed, Zhang Yang quickly fell asleep, and I don't know how long it took, Zhang Yang was awakened by the sound of PDA vibration in his hand. Quickly sat up from the bed, Zhang Yang went into the bathroom to wash his face, and then picked up the PDA to check it.

It was already dark in the house, and it was obviously night, and when checking the news, Zhang Yang looked at the PDA time prompt by the way, and it was more than 9 o'clock in the evening. Open the PDA prompt message, the message is from the honey pots, someone has just checked and scanned those honey pots, needless to say, it must be MAK back.

And there is also a feedback message sent by the infected worm, open it and see, Zhang Yang waved his fist, MAK's previous computer was not turned on, so Zhang Yang had no choice, but now, the infected worm has successfully infected MAK's computer.

With the help of the infected worm, Zhang Yang immediately sneaked into MAK's computer through the back door, MAK's strength is quite strong, even if it is a little worse than Zhang Yang, but the comprehensive strength may not be able to find anything, but Zhang Yang has too many artifacts, so he is not an opponent at all.

After entering MAK's system, Zhang Yang didn't do anything, just quietly monitored MAK's desktop. Apparently Mak had just returned, and he was constantly logging into his springboard, scanning the information of each springboard, and resetting the honeypots and traps in each springboard.

The extremely cautious Mak would not have thought that no matter how careful he was, it was useless, and a pair of eyes had already entered his computer, quietly watching all his actions. Zhang Yang is not worried about being discovered by MAK, when the infected worm enters MAK's system, it means that he is going to be a tragedy.

The infected insect has been thoroughly simulated as the key file of the MAK computer system, and the infected insect will conceal all the login information, and the information fed back to MAK by the system is not real at all.

Soon, Mak made a big circle around the world under the watchful eye of the fanfare, and only then did he log in to a small program, which was supposed to be a contact tool, even if it was not known who Mak was contacting. After logging into the app, Mak quickly sent a message to a guy named Gold among his few friends asking for a message.

Gold: "How are you?" ”

Mak: "I'm okay here, what did you say about the last incident?" ”

Gold: "The person sent over has sent back the news, the clue has been completely broken, from the mouth of the last Chinese who died, I learned that the damage and loss of things may be more than 95%, China's waste recycling market is too chaotic, it is impossible to find any useful information, there are tens of thousands of large and small waste recycling stations in the entire H city, and many waste hard disks will be directly dismantled after being recycled." ”

Seeing this, Zhang Yang's heart jumped violently, although they were talking about hard disks, but I don't know why, Zhang Yang thought of his server, and the important partition hidden in the server. The encryption software that came out of that server, Zhang Yang unlocked a program in the laboratory system under the Pan Asia Group, so there must be an inevitable connection between the two.

And the words of this gold coin made Zhang Yang's heart beat wildly, and when it was connected to the two, then it was obvious that the murderer of Liu Liping's death was also sent by these people.

MAK: "How's the GSCSD investigation?" ”

Gold: "No result, very mysterious, but the above analysis is seriously inconsistent with our opponents, or those who defected from us, the strength of GSCSD is very strong, but these are not the most important, no matter how strong the network is, it is useless, but the loss of the number nine data makes us lose the opportunity to become the world hegemon!" It was an unexpected invention across the ages! ”

MAK: "What the hell?" ”

Gold: "If we knew, it wouldn't be so mysterious. After more than a decade of investment, hundreds of billions of dollars in the lab came to naught, and we wouldn't even know what was going on in the lab if it weren't for the backup system we set up to prove that there was data leaving. ”

Mak: "Do I still need to stay here?" The C.I.A. and the intelligence bureau were strongholds, as well as more than a dozen important agents, and they did not have access to the latest Chinese stealth aircraft. ”

Gold: "I asked F for this, and besides, we are not suitable to meddle in the affairs of the American political axe, you can go back to work again tomorrow, if F has the latest instructions, I will inform you, I will start sending documents now, you can start accepting it, has the environment confirmed?" ”

mak: "Confirmed, I'm safe here. ”

This is the end of the conversation, and MAK begins to accept a file that is more than 200 meters in size. And Zhang Yang is frightened to watch, Zhang Yang has heard it from the mouths of these two people, these people are not only powerful in the network, but their forces in reality are probably even more terrifying, and the investment in a laboratory is as high as hundreds of billions of dollars!

What's that concept? How many people in the world can come up with hundreds of billions of dollars? Although this investment is not a one-time investment, apart from the national power, Zhang Yang really can't think of anyone who can get so much money before and after. But these people are obviously not state forces, nor are they the US political axe that has been speculated about.

The Hilton's broadband is 100 Gigabit fiber, which is very fast to receive documents, and MAK quickly accepts them. Then Mak began to clean his traces, it was obvious that his business was done, and when Mak cleaned his traces and exited from the various broilers, Zhang Yang quickly began to copy the files in his computer.

Because of the help of infected insects, Zhang Yang is hidden, so the alarm measures in the MAK system have become decorations, which are useless to Zhang Yang. In less than five minutes, Zhang Yang copied all the files that MAK had just obtained to Satellite 1, and then Zhang Yang quietly left MAK's computer.

(To be continued)