Chapter 55: Picking the Feet of the Dish?
The physical memory of his computer is simulated and hung up, showing exactly the same system symptoms as other broilers, so that he can hide under the noses of hackers. Pen @ fun @ pavilion wWw. ļ½ļ½ļ½Uļ½Eć infoOf course, this requires a lot of skill, after all, this kind of simulated hanging is not a real memory self-consumption, but a very hidden trick of deception.
Through IP detection, Li Xiujie stared at the screen very leisurely, watching the more than 50 IP address bars displayed inside flashing, and then sending out a prompt document after being hacked into the internal system, feeling very happy!
Hidden in the online world, you can take control of everything with the code typed out under your fingers. This kind of God-like power over the life, death, and wealth of all living beings produces a sense of satisfaction and excitement that will surely indulge anyone. The most important thing is that as a hacker, you can also do whatever you want with your own technology, and let yourself modify the world, and this is the highest level that all hackers yearn for and pursue all their lives!
Therefore, when looking at Qin Yunniang like a pitiful worm, still burying her head in the search for her own IP, and burying her head in the search for her own IP, Li Xiujie once again felt a strong sense of pride and pride in her heart, as well as the excitement and excitement of being able to control others at will!
"Hey, hey! I'm not playing with you anymore! After about six minutes, Li Xiujie felt bored. This kind of technical gap can't raise his desire to fight at all. I thought that this Qin Yunniang still had two more hits, but he didn't expect that he was just a rookie who could operate two broilers, this kind of low-level thing, he was tired of playing it when he was a child.
"Tsk, it seems that the so-called top students of Biyang School are nothing more than that." He pursed his lips, secretly disdainful in his heart. Thinking about it, his hands tapped again, and another program was opened.
IP Tracking Vulnerability Compilation System! This is a sub-feature of the source code injection equation.
Through the traces left by the other computer host on other broilers, and then, anti-tracking, and finally enter its system to achieve the purpose of modifying management permissions.
However, there is no need to track it.
The advantage of controlling a large number of broilers is that you can't make the enemy lock your IP address in a short period of time. And it has extremely destructive power. In general, the greater the number of broilers, the greater the instantaneous destructive capacity.
But the disadvantages are also very obvious. Due to the large number of broiler chickens controlled, it is more complicated and cumbersome to clean up the IP traces in the broilers. Once the opponent has recovered and resisted the first wave of attacks, then your IP address information will be easily cracked by the opponent! The IP address represents the computer key controlled by the hacker, once it is breached, at that time, there is basically no place to hide it.
And Qin Yunniang's movements are too obvious. I don't know if she is deliberate, or she doesn't have this awareness at all, IP information is basically in every broiler, and she doesn't even bother to erase it, so she lets her IP address information be stored in the system.
Li Xiujie quickly cracked an IP address segment, but for the sake of insurance, he cracked several computers in a row, and found that all the traces of the IP address segment were exactly the same, and a satisfied smile appeared on his face.
obtained the opponent's IP address, unless he cut off the power and disconnected the gateway machine, he could only obediently wait for himself to hack into the computer.
So, after a smug laugh, he typed that small piece of IP address into his compilation software.
Access to the opponent's computer was very smooth, and there was not even the slightest obstacle or interception. Her backstage port door seemed to be unguarded, allowing others to enter. Li Xiujie was stunned, and always felt that something was wrong. After all, Qin Yunniang is also a half-hacker, no matter how bad the technology is, at least she must know the importance of IP addresses. Now he has opened the firewall and put on a posture of letting you go in and out, which has to make him wonder if it is a trap.
Li Xiujie once encountered this situation a few times when he was fighting other hackers in the network, and he almost fell into it. After spending a lot of thought, I finally locked the IP of the opponent's computer, and then, when I entered the system and planned to modify the administrator permissions, I found that the system in the so-called computer was actually an extremely deceptive fully enclosed honeypot! If he hadn't reacted fast enough, he would have already caught the traces of his computer getting in and out. Once the other party parses out their own traces, they can achieve anti-tracking, and even finally find their own IP address.
"Could it be that this guy really has two brushes?" He muttered to himself. Cautiously, he re-scanned the system of Qin Yunniang's computer, but found that there was still no abnormality, only a few abnormal software were always open.
Li Xiujie frowned, then shook his head, and couldn't help laughing at himself: "It seems that my hacker is going back more and more, and even with a lot of courage, he has become so cautious when he encounters a rookie." So, without the slightest hesitation, after typing a line of code command on the keyboard with his fingers, he directly launched an attack on Qin Yunniang's system and began to steal administrator privileges.
However, if he saw the smile on Qin Yunniang's face at this time, he didn't know how he would feel.
On the screen, three areas are divided. Qin Yunniang was squinting her eyes, carefully staring at the area in the middle. I saw that there was a mouse in it that was constantly shaking, and with each movement, a large number of data streams were swept from time to time.
"Humph! The fish has finally taken the bait! A beautiful smile curled into the corner of her mouth, and she hurriedly typed down a few characters, and immediately the data stream that was constantly swept in the middle seemed to be blocked, and suddenly stopped! The mouse arrow disappears directly!
"Huh?" Li Xiujie was stunned, and there was a ghostly expression on his face. He wiped his eyes with his hand and looked incredulous!
On the screen, it is Qin Yunniang's backstage, but what makes him feel cheated is that this backstage has been invaded!
"It's... It's impossible! "Li Xiujie has a confused brain, and there are only the two of them in the game, could it be that there is still a hacker who is idle and hurts, and he can't sneak in? He couldn't help but glance around, everyone was staring at the two large screens above him. And those two screens correspond to the content on Qin Yunniang and Li Xiujie's respective computer screens.
Scratching his hair, he always felt that something was wrong. And the idea that there might be a third-party hacker that came out just now was directly left behind by him. Eton University is one of the most prestigious schools in the country, and the network defense system is also deployed by many national-level hacker elites. He didn't believe that any hacker could have such an awesome ability to hack into the network of Eton School without making a sound, and even participate in this relatively low-level competition.