Chapter 130: Chen Feng makes a move
While the chat room was still speculating about how the Huaxia hackers would abuse the island country hackers under the leadership of Qin Hong, and quickly improved the ranking of this competition, the competition information on the public screen of the chat room was updated again. Pen, fun, and www.biquge.info
And this time, the latest news on the public screen although there is no real-time picture.
However, judging from the decreasing number of Chinese hackers and the sharp increase in the number of broilers in island countries, it can be judged that Chinese hackers seem to be in a desperate situation by island country hackers.
"Uh......"
Originally, many Huaxia hacker enthusiasts in the forum were still looking forward to Qin Hong's Jedi counterattack, but instead of waiting for Qin Hong's counterattack, they seemed to have fallen into the trap of the island country hackers, and for a while, the black fans who supported Huaxia hackers in the chat room couldn't say a word.
On the contrary, the lovers of hackers in the island country, who were still silent, saw the rapid rise in the number of broilers in the island country, and they chose to swipe the screen one after another, and kept issuing arrogant and provocative language on the public screen.
Meanwhile.
Situ Shengnan also began to explain again: "According to the latest news of the competition, Qin Hong, the leader of Huaxia hackers, led all Huaxia hackers to attack the fake 'base' established in advance by hackers in the island country because of a wrong judgment. ”
"Because of this erroneous attack, more than 95 percent of the computers of Huaxia hackers were implanted with Trojans by hackers from island countries, and even Qin Hong himself could not avoid it."
With Situ Shengnan's explanation, everyone in the chat room fell into a heated discussion again.
"Haha, is this Qin Hong, the new generation representative of your Huaxia hackers? It's just a group of engines, I think he should hurry back and wash and sleep. ”
"Yes, even if this kind of person is a skilled hacker, he is at most a general, and he has no potential to become a leader at all."
"Jiangcai, I don't think it's even as good as a fool, at this level, I still want to fight with Teng Mujian, the leader of our island country's hackers, I don't think he has this qualification at all."
For a while, the comments of hacker enthusiasts in the island country were the most arrogant, and most of them were mocking Qin Hong's leadership.
"As the leader, Qin Hong seems to be a little too impulsive, and he rashly dispatched all the Huaxia hackers without finding out the truth, and as a result, he fell into the trap of others."
"Yes, if he can send someone to investigate the situation first, and then make a conclusion, the result will not make the situation of Huaxia hackers so passive."
"This situation is no longer passive, do you look at the latest data on the public screen of the chat room, Huaxia hackers have basically been wiped out, and there are no more than a dozen hackers who can survive by luck, and these hackers can survive because they are not familiar with the attack and failed to launch an attack on the false 'base' of the island country in time, so they escaped the catastrophe."
"I can't even attack, these dozen hackers seem to be too poor, right? Do you expect them to lead the Huaxia hackers to turn the tables? ”
"Still turning the tables? Don't dream, the strongest Huaxia hacker in this competition is Qin Hong, and now even he has become someone else's broiler, what do you say has the ability to turn the tables? ”
And the neutral hacker enthusiasts in the chat room, although their speeches are not as sharp as those of the island country hackers, they are also very straightforward about the imminent failure of the Huaxia hackers.
"Hey, I didn't expect that this time the Huaxia hacker would be the first to be eliminated in the World Series."
"It's a shame to have this achievement, and in the remaining ten years, the island country hackers will weigh on our heads again."
"I really don't know how Qin Hong did it, within an hour of the start of the game, he was able to wipe out the world's top three Huaxia hackers."
As for the Huaxia hacker fan's speech at this time, it was much more obscure, but from the tone, he could also hear the disappointment with Qin Hong's command this time.
No matter how everyone spoke or questioned Qin Hong's leadership ability, in everyone's subconscious, Huaxia hackers would definitely be eliminated this time.
Moreover, it will be their sworn enemy, the island hackers, who will eliminate them!
……
At a time when everyone thought that Huaxia hackers were about to be eliminated, Chen Feng was isolated by Qin Hong, so he didn't know the current situation.
At this time, Chen Feng once again entered the previous island country movie website and found the IP address of the movie website.
Fill in the virtual IP address into the scanner that I wasted ten minutes writing, and instantly resolve a large number of disguised IP addresses.
And, over time, the number of disguised IP addresses continues to increase, and in less than a minute, the scanner resolves more than 10,000 virtual IPs.
"Heh, I haven't seen that the island country hackers are really cautious, but do you really think that if the real IP is hidden in so many fake IPs, I won't be able to distinguish the real from the fake?"
Chen Feng had a look of disdain on his face: "I want to see how much traffic these fake IPs can withstand." ”
While speaking, Chen Feng lit a cigarette and took a casual puff, and waited for the scanner to find all the virtual IPs of the other party.
In two minutes, the virtual IP in the scanner has increased to more than 70,000, and at this time, the scanning tool written by Chen Feng has also stopped working, which also proves that the scanning work has been completed.
Generally speaking, 70,000 virtual IPs are just scanned and discovered, and it takes about half a day, but this scanner written by Chen Feng himself can be said to be a proud copy of the proud work of computer hacker Barnabai Jack, and the operation speed is hundreds of times faster than that of ordinary scanners.
This was one of Barnabay Jack's main attack tools back then, and his function was to quickly scan for the 'sub-links' of the opposing server and summarize them in time.
Originally, with the bizarre death of Barnabai Jack, this set of tools was completely silenced, but no one could have imagined that Chen Feng would pick up a bargain.
The main function of this software is to send a large amount of spam messages to the IP address filled in in a short period of time, causing the other party's network to be blocked.
Generally speaking, the price of the server that can be used as a 'base' for hackers in the island country will definitely not be lower than six figures, and a small amount of spam information from this high-defense server will not affect it at all.
But it's different for these fake IPs, because it's just to confuse them, so they're basically very ordinary home computers, once there is too much spam influx, it will immediately cause network congestion, and even temporarily unable to establish a connection with the network.
At this time, after the ping detection of the 'flood' attack software, it can basically be ruled out which is a fake IP.
Of course, to launch an attack on more than 70,000 fake IPs, the number of 'broilers' needed is definitely not a small number.
However, this is not a big problem for Chen Feng at all, and when he clicked on a window from the tool, a black file box popped up.
This is Chen Feng's broiler scanning software, as long as you fill in the corresponding IP segment, the software will automatically scan, and judge that the computer in the IP segment has a vulnerability, if there is a vulnerability, it will upload the Trojan horse software prepared by Chen Feng in advance.
Uploading Trojan software and running it basically means that the other party's computer has become its own broiler.
Just now, Chen Feng found the IP segment of the island country through the query, and filled it in to start scanning, after all, it was a hacker attack with the island country, so naturally he needed to use their country's broiler.
Glancing at the number of broilers in the lower left corner of the window, it was estimated that it was basically enough for this attack.
Everything was ready, and Chen Feng pressed the attack button on the 'Flood' attacker.
Hundreds of thousands of broilers, under the command of Chen Feng, sent spam messages to an IP address at almost the same time, and received such a large amount of spam that the system could not be processed at the same time, which would eventually lead to the collapse of the system.
As the system crashes, fake IP addresses are automatically filtered out by the Flood attack software.
At this time, the system had filtered about 20,000 pieces of meat and quantity, and Chen Feng continued to smoke and waited patiently.
But suddenly, Chen Feng found that the number of effective broilers attacked by remote control software was also drastically decreasing.
"I don't see it, the firewall of the island country still seems to have some effect." Snuffing out the cigarette casually, Chen Feng said to himself.
For the decrease in the number of broilers, Chen Feng naturally knows the reason, which is very simple, because the broilers keep accessing the same IP address and entering spam information, the firewall will automatically judge it as a malicious attack and block its IP address.
Because of this, the number of broilers that Chen Feng effectively attacked has dropped rapidly.
However, this is not a problem for Chen Feng at all, if you block one IP, can you block all the IP of the island country.
For Chen Feng, he was just catching some broilers, and with a sideways smile, Chen Feng opened the broiler scanning software again.
Immediately after that, Crackle entered a piece of code, and the broiler scan and the 'flood' attack began at the same time.
With the increase in the number of broilers, the speed of the 'flood' attack is getting faster and faster, and in less than ten minutes, the fake IP address has been eliminated by half, and the efficiency of the 'flood' attack is still increasing.
If you can maintain this speed, it will take up to five minutes to find out that the other party's real IP address is real.
After waiting patiently, the other party's fake IP addresses became fewer and fewer, and there were less than 10,000 fake IPs left.
Looking at the fewer and fewer IPs, Chen Feng's slightly narrowed eyes instantly flashed with a glimmer of light.
"More than 90,000 fake IP addresses were cleaned up in less than half an hour, isn't this a bit too fast?"
In other words, Chen Feng entered a piece of malicious code into the computer and synthesized an executable file with the suffix exe through the code.
As long as the real IP address of the other party is found and the Trojan file synthesized by himself can be uploaded, then the real 'base' of the hackers in the island country will become Chen Feng's broiler.
Chen Feng has also been prepared for the method of uploading Trojan horses for a long time, compared to Qin Hong's low-end overflow attack, Chen Feng's method is more clever.
Because Barnabai Jack is in possession of 0day (there is no official patch vulnerability yet.) )
Naturally, Chen Feng copied the other party's abilities and memories, and must also have 0day, this kind of vulnerability has no way to defend at all, as long as you have an Internet connection, then your computer will not be able to avoid becoming Chen Feng's broiler.
And when the time comes, as long as Chen Feng is happy, everyone in the chat room, including Teng Mujian, can be controlled by himself!
Looking at the IP address that slowly appeared, a smile appeared on Chen Feng's face.
For him, the World Hack has just begun.
Good play, good to come! (To be continued.) )