Chapter 58: Hello, I'm ABC
Fortunately, the members of the alliance are still cautious about accessing the Internet. Even if you enter the chat room of your own alliance, you have to go through several layers of springboards. After the members withdrew, the mailboxes of the alliance reported that they were safe and sound, and they were not tracked by others. It's just that a few people sent emails, saying that the several meat machines they caught had all been broken by others, and their real IP addresses might have been exposed.
After the stationmaster Ice Soul learned the news, he immediately notified these members, saying that he wanted him to destroy all the computer data and move out immediately. It was only after a while that the members of the alliance sent a letter saying, "It's okay to destroy all the materials, but because of personal problems, I can't leave." ”
This is a personal question, just think about it. It must be that there are parents in the family, and there are wives and children, so how can they say that they will leave. Just when the ice soul persuaded him, saying that if he didn't leave, something would happen sooner or later. Now in times of great calamity, it is always good to come out first to avoid the limelight. Even if you are separated from your family, it is better than not dying.
"I'll figure it out."
Seeing that the ice soul was embarrassed to tell Chen Jiayi about this, Chen Jiayi was on the side, thinking of ideas from time to time.
"Ice Soul Boss, the security system of our chat room is already very good, how can it be so easy for others to plant a Trojan horse?"
Although the strength of the hacker alliance is not very good, however, the security settings for the chat room are still relatively strict. Moreover, after Chen Jiayi came to this chat room, he also specially patched this chat room. Anyway, he has also been in this chat room, and if he is attacked by others, he will be ashamed. But despite all the calculations, this chat room was still broken by others.
"This ......"
If Chen Jiayi hadn't informed the members of the alliance that the alliance chat room had been hit by a Trojan horse, no one might have found out about this Trojan horse. By the time it is actually discovered, perhaps all the members of the alliance have been exposed to the network. Chen Jia suddenly asked the Ice Soul, thinking about it, he was still in a daze.
Seeing that the ice soul was like this, Chen Jiayi didn't ask again. So, Chen Jiayi searched the entire chat room member records. I found that all the members were normal, and they did not do anything out of the ordinary. In this way, the situation of Trojan horses set up inside the alliance members is excluded. In fact, it is difficult for the members of the alliance to release the horses, not if they want to let them go. Chen Jiayi did this, but he just eliminated them one by one.
Since it is not the members of the alliance who put the horse inside, then this Trojan must come from the outside, that is, the intruder. It's just an intruder, in what way to invade, but Chen Jia can't figure it out.
It stands to reason that with the security of the Alliance Chat Room, it is impossible for an intruder to easily break in. It's just that in fact, the intruder has successfully completed the invasion, and the Trojan horse has been placed in the chat room. After thinking about it for a long time, Chen Jiayi thought that if there was nothing wrong with the chat room, then the way the intruder successfully invaded must have taken advantage of the system's vulnerability.
After thinking about it, Chen Jiayi grabbed a few meat machines and logged in to the Internet in the form of a few meat machines.
"I see."
Just when Chen Jiayi controlled the meat machine and entered the Internet. Chen Jiayi was surprised to find that almost all major domestic portals have planted web Trojans.
A web Trojan is a Trojan that exists only in a web page.
When users visit a web page, they will accidentally fall for these Trojans. If it is a small website, it is okay to say that these websites are unreliable, and everyone may have some precautions, but for domestic portals, it may not only be ordinary users who will not take any measures, but also professionals, and will not carry out special defenses.
Because of Chen Jiayi's own computer, it was created because of Ruojintang. The Trojans of those portals were only isolated by Chen Jiayi's system in an instant. Therefore, he really doesn't know about the hanging horses of various portals.
"Damn IE, damn Microsoft."
The principle of this web Trojan is very simple, in fact, it is a bug in the use of Microsoft Internet Explorer.
When a user accesses the Internet through Internet Explorer, IE downloads a certain amount of data in the background. Of course, in this download process, in order to prevent Trojans, Microsoft has also made certain settings. However, Microsoft still hasn't done it well, and there are still vulnerabilities in this Internet Explorer browser. The hacker, who knew about the vulnerability, implanted a piece of code into the HTML web page, and when the user browsed and watched, the background automatically downloaded the Trojan. ,
In this way, it takes almost no time for hackers to complete the invasion work.
Last time, Chen Jiayi extorted 10 million from Microsoft, and all the major bugs were reported to Microsoft, but I forgot about this IE browser BUG. Unexpectedly, there are so many wizards in the world, and a few months later, others also knew about the vulnerability of Microsoft IE. Thus, this vulnerability was exploited to implant a piece of code on major web portals in China. Moreover, this code is very hidden, even if the network administrator looks at it, it will only think that it is an ordinary piece of code, and will not think it is a Trojan horse at all.
"You have a good plan, I have a wall ladder, and I will fight with you today."
Chen Jiayi became interested, he wanted to know where this Trojan horse was implanted.
We know that since a Trojan horse has been planted by someone else, he must transmit the data to the terminal, that is, to transmit the stolen information back to the person who put the Trojan. Otherwise, the Trojan loses its meaning in stealing information. All Chen Jiayi has to do now is to find the service terminal. However, it is also possible that this service terminal is just a meat machine. A clever hacker will certainly not be stupid enough to set the receiving address as his real IP.
"Sure enough."
Chen Jiayi followed the IP address exposed in the Trojan horse and kept touching it, proving that his conjecture just now was correct, and the receiving terminal was just a meat machine of the intruder. But it doesn't matter, this meat machine still has a certain connection with the invaders. As long as you crack this meat machine and touch the melon again, you can go straight to Huanglong, and finally find out the real IP of the intruder.
"It's a hard character."
The intruder is very skilled, and the meat grabbed is not an ordinary meat machine, but a server or something. Moreover, the operating system used by these servers is not Microsoft WINDOWS, and two of the three meat machines use Unix. THIS OPERATING SYSTEM, WHICH IS DOMINATED BY GIANT MACHINES, IS UNDOUBTEDLY MUCH LOWER IN BUGS THAN MICROSOFT'S WINDOW. However, no matter what the system is, he has bugs, and no software or system can be perfect without a single vulnerability. Chen Jiayi, who has a lot of network information in later generations, just searched casually, and a lot of bugs about Unix have all been found.
"OK, it's all done."
finally broke the last meat machine, and the real IP address of the intruder was also exposed under Chen Jiayi's nose.
"Hello, I'm ABC."
Chen Jia smiled and sent a message to the other party very kindly.
);