Chapter 62: He Must Have Used a Supercomputer!
(Ask for collections, ask for recommendation votes, ask for clicks, and I implore everyone to support me, I am grateful!) )
After perceiving Liu Fang's actions, Zhizi's voice sounded in the unknown dark room: "The reaction speed is very fast, and the response method chosen is also very appropriate, I really can't imagine that there are still such masters among the Kuwaitis, anyway, it's still early, so let's play with you!" ”
After Zhizi finished speaking, he immediately turned around to block it, and soon, he came to a network node he had passed by, waiting for Liu Fang's arrival here. Pen, fun, and www.biquge.info
Liu Fang was following the network channel, looking very carefully for the traces left by Zhizi.
No matter who you are, as long as you enter the online world, you will leave your own traces inside. Hacker masters know how to clean traces, which is a necessary skill for masters, but no matter how they clean up, it is impossible to do it thoroughly, and there will always be some clues left.
Fahd and the others looked very seriously, and in their eyes, all that flashed on the computer screen was dazzling code, and several people felt dizzy after reading it for a long time.
Liu Fang is different, he has the skills of the real eye, all he sees is numbers, although more numbers will make people dazzled, but Liu Fang has long been used to it, for him, as long as he glances at it, he can see which program has a problem.
Therefore, Liu Fang's tracking speed was extremely fast, and in less than a minute, he tracked a network node. This network node is actually a network provider's database, Liu Fang quickly looked it up in the database, and soon he found the abnormality, "Who is this guy?" How could he be lurking here? ”
The lurker that Liu Fang discovered was Zhizi, who originally thought that it would take Liu Fang a while to find this place. If the other party's skills are not as good as he imagined, then he will spend more time, and if the other party's skills are a little better, he may not be able to find this place at all.
But what he didn't expect was that less than a minute after he entered this network node, the other party tracked him, and this terrifying speed made Zhizi stunned.
"How can this guy's speed be so fast! Isn't he the one I'm waiting for, but another hacker who stumbled in here? ”
Liu Fang's thoughts at the moment are: No matter who the other party is, I have to check it, and at this moment, I can't help but be negligent.
After Liu Fang made up his mind, he immediately walked around this network node. Soon, he found traces of the other party's invasion, and through the comparison of technical characteristics, Liu Fang finally affirmed the fact that this person lurking here is the guy I want to track!
Nothing is exactly the same in the world, everyone has their own unique personality and habits, and this theory is equally applicable to the field of computers. For example, hackers, each hacker has its own technical characteristics, no matter how similar these technical characteristics seem to other hackers, but as long as you analyze the subtleties, you will find that there are still some differences between the two sides.
Reflected in the actual operation, this characteristic is manifested in the following: when you send an intrusion command through the computer, the order in which you tap the keyboard will be displayed according to your own habits, which is reflected in the code, and the feature is more obvious.
The essential language of the computer is 0 and 1, and Liu Fang has the skill of the real eye, he only needs to restore the two instructions to the essential state, and then compare them to confirm whether the two instructions are sent by the same person.
Now that the identity of the other party has been confirmed, what Liu Fang needs to do next is of course to launch an attack, this is not his territory, no matter what kind of destruction he destroys here, it will not cause him any losses.
"This place is perfect for testing my computer skills, Mr. Hacker, let me practice with you!"
As soon as the words fell, Liu Fang took action, and the first thing he did was not to attack the other party directly, but to gain control of this data center.
If you want to gain control, the best way is to crack the password here, as long as you get the password, it is equivalent to having administrator privileges, and you can kick the other party out when the time comes, which is equivalent to winning in the hacker battle.
If it is an ordinary hacker, there are basically two ways to crack the password, the first is the brute force flow, through a violent flood attack - that is, a data flow attack, completely destroy the defenses here. Once the defenses are destroyed, it's the equivalent of no defenses, you can do whatever you want, and it's very easy to find the password when the time comes.
The second is the technical flow, such as writing a professional code-breaking software, and through the assistance of the software, deciphering the administrator password here.
In fact, there is a third way, and that is to guess the password. This method is very stupid, and even the slightest bit of shame hackers disdain to use it. Because in the hacking world, if anyone uses this method to get a password, they will laugh if they are known.
Which method did Liu Fang use? The answer is none of the above, he has the True Eye skill, and it is very easy for him to get the password - just analyze the plugins in the program and he can get the password by working backwards! This may sound a bit confusing, but it's not as complicated as you might think.
For example, as long as you apply for an email account, you will be asked to set a password, the password is equivalent to a pass, after you set the password, this email account belongs to you, when you log in, the password is the pass.
Any email program will record the password you entered when you apply, which means that your password is not only known to you, but also the email address you use, otherwise it cannot be authenticated at all.
Even if other hackers knew this, it would be impossible for them to extract the password directly from a program without the help of an external force, which is equivalent to a fantasy.
Liu Fang is an exception, he can see through the essence of any program, in the binary format, any program is like a newborn baby in front of him, as long as he observes carefully, he can find what he wants from this program.
For example, now, Liu Fang is looking at the plug-in program in the data center to find the location of the password. Based on his knowledge of the program, he felt that the password must be hidden in the plugin.
When Liu Fang was looking for the password, Zhizi was not idle, after the initial stunned, Zhizi quickly calmed down, the corners of his mouth unconsciously turned up, and let out a contemptuous laugh: "No matter who you are, since you have met me, even if you are unlucky!" ”
Then the sound of Tomoko tapping on the keyboard was heard in the darkness, and to his surprise, his eyes were fixed on the computer screen, not even looking at the keyboard, as if he was not worried that he would make a mistake.