Chapter 54: The Battle Between Hackers

Li Xiujie's arrogant self-esteem was also provoked. Pen, fun, pavilion www. biquge。 infoIn front of girls, no boy will choose to back down! Although he is still skeptical about whether this guy named Qin Yunniang is a man or not!

"Good!" A smile appeared on his face, and his white and fat hands rubbed together, and then made a gesture of please.

The others, all depressed, were speechless, so they had to start up all the spare computers and servers that had been prepared.

Qin Yunniang excitedly stared at the constantly beating letter symbols on the screen interface, and her excited eyes narrowed. The hair on the top of the head is windless and automatic, showing that the owner is very happy and excited at the moment!

Airplanes!

There was a buzzing sound, and not far away, more than sixty computers linked to the LAN were also activated. When I opened the host in front of me, I saw that the system desktop came out, so I inserted a memory card taken out of the wallet behind the host.

As a hacker, even if you are an amateur, if you don't have one or two background vulnerabilities in your hands to control the system software, as well as things you have designed yourself, you are embarrassed to say that you are a hacker. It just so happened that in this memory, several secret weapons compiled by himself were burned.

Qin Yunniang pursed her lips, and her eyes shone brightly. She stared at the screen, and when she entered the system through the background program, she saw the rapid flow of code and inserted various commands into it.

Fingers like flying butterflies, crackling on the keyboard. In the entire machine room, only the hum of the chassis and the sound of the keyboard remained.

Li Xiujie still unhurriedly sorted out the computer memory in his hand. Trace wiping, vulnerability checking, firewall installation...... As a veteran, he wasn't worried about failing, the only thing he had to think about was how ugly he should let this guy lose! Will you hack directly into his computer in ten minutes, or will you wait fifteen minutes to announce the end of the game? It's about your face after all!

As a tech nerd, you can insult his personality or trample on his pride. But in his field of expertise, there is absolutely no disgrace! Because, every technical nerd has a proud professional ethics! And Li Xiujie is no exception, he worked hard for more than half a year to complete the compilation software, but he didn't expect that in the eyes of this person, he said an answer that was easy to crack. In that case, then I don't need to show you mercy!

With a cold snort in his heart, Li Xiujie opened his programming software and entered a series of commands!

Drip, drip!

At this moment, the more than 50 computers kept ringing alarms. This is an alert sent by the firewall installed inside the system when it is attacked by a malicious virus. Li Xiujie was stunned, but he didn't expect this guy to use such a rough invasion method as soon as he got started!

Broiler!

A very representative word comes to mind!

The so-called broiler actually refers to a remote computer with management rights, or a computer that can be controlled. By controlling these broilers, and then issuing various commands, the ultimate goal of the hacker is achieved.

"Hehe, interesting!" Li Xiujie showed a look of surprise on his face, but the frenzy in his eyes became even more crazy.

Qin Yunniang changed the IP addresses, administrators and passwords of more than 50 computers, and set herself as the only super administrator! Then, through the replication of their own resources, as well as wide-area jumps, they frantically impact the data in the memory of their respective computers!

Her tactic is very simple, that is, through these more than 50 computers, constantly refresh and copy resources, and then attack all IPs in the WAN with the same submask segment. Finally, as long as you find that one of the computers does not automatically copy resources, and then quickly lock its IP address, you can control Li Xiujie's computer interface!

The IP address is not only the ID card of a computer, but also a key for the owner to open the computer! Therefore, protecting the virtual IP address from detection is the core security threshold when hackers are attacked!

And all Qin Yunniang's means are to obtain the other party's IP address as the core!

Actually, it's easy to understand. All hosts are connected to the WAN through several switches in the same submask segment. And if the switch is compared to a big cauldron, then these computers are a bunch of sweet potatoes in the pot, and they are steamed together. In addition, these sweet potatoes are not only the same size and size, but even the color and taste are exactly the same. The only thing that has changed is the different IP end number.

However, in order to prevent his IP from being discovered by the WAN, Li Xiujie will definitely cover up his address through special means. However, no matter how he modifies and covers up, he can't escape from this cauldron after all. And Qin Yunniang controls all the computers in the cauldron, frantically self-replicating resources, resulting in the redundancy of resources, which leads to the virtual memory hanging high, and the system crashes and cannot be operated!

At this time, even if Li Xiujie has great ability, after encountering a system crash, all the protective walls will be as if they are false, and the IP address will be easy to obtain by himself! Therefore, the only thing he can do is remove redundant resources. And once you do this, your IP address will inevitably be exposed!

The corners of Li Xiujie's mouth twitched slightly, and his eyes flashed with fine light, this method was not only crude and simple, but also extremely deceptive. In the field of hacking, he has encountered many such virus attacks.

"But," then, his eyebrows furrowed slightly, and a disdainful smile appeared on his face, "For me, this virus attack mechanism is what I am best at!" "That's right! In the Hacker Summit Forum, his attack methods have always been known for being simple and rude! Even the forum offensive and defensive battles have become a classic template for his offensive style.

Playing this kind of trick in front of him, this is simply playing a big knife in front of Guan Gong!

Without hesitation, Li Xiujie opened the software-source code injection equation, that is, Qin Yunniang said in a very relaxed tone: virus software that has mastered the principle. After entering various codes and instructions, he masked his virtual IP address, and then modified the virtual memory on his computer.

Immediately, a hint of discoloration flashed in his eyes, and he saw that on the computer, in another control console that was cut out, all the icons and files were automatically detected uncontrollably. This is a sign that someone else has invaded! It's just that this signal comes and goes quickly, and it doesn't seem to detect any anomalies.

Li Xiujie couldn't help but show a smug look on her face, and couldn't help but look up at the other side, although it was covered by the baffle on the table, she couldn't see her face clearly at the moment, but she could definitely guess that she must have a puzzled expression now. I walked around the WAN several times, but I couldn't find the computer with the abnormality, which is hell!

"Hey, hey!" He wanted to laugh out loud, but the method he used was actually very simple. It's system memory camouflage!