Chapter 448: Anti-Black Technology

Text [Rise of the Dragon] Chapter 448 Anti-black technology is very fast. The software finished analyzing the HakcTom.exe program, Li Hua couldn't wait to open the results to check, the judgment result of the program was really as Li Hua thought, it was a hacker program, he injected some key hooks into the system, and wanted to make a special killing tool for such a virus, it doesn't seem to be too realistic at all, because this virus has infected Ding Peng's computer files, even if it is killed, it will be restored.

Ding Peng saw that Li Hua was a little troubled, and he immediately said: "Brother Li, why don't you reinstall my system, I'll move all the data to Kingston's SSD, so it's okay, right?" ”

I originally thought that Li Hua would agree with his idea, but what I didn't expect was that as soon as he said it, he was strongly opposed by Li Hua, "It's useless, your computer has been infected with a virus, this virus is stronger than Panda Burning Incense and AV Terminator, and from the architecture point of view, it is a virus source that uses E-C source code as a transformation, even if you reinstall it, just like Panda Burning Incense, it will automatically associate all the executable files on your computer, Generate a lpk.dll hook that can't be cleared after reloading, unless you format the whole disk and reinstall it, otherwise the virus will still recur. Li Hua said.

"Then it's all overloaded, it's fine." Ding Peng just wanted to get those snoopers out of his computer as soon as possible.

Li Hua shook his head, "This is not the best way, a complete reinstallation is generally done only when you have to, but the main thing is that even if you remove the virus from your computer, what should those Chinese netizens do if they have lost their money due to the virus?" The only way to do this is to track down the hacker who distributed the virus and uproot their organization. Li Hua continued.

Ding Peng was stunned for a moment after hearing this, and then suddenly realized, "Brother Li, do you mean to fight against them?" (It's the equivalent of anti-tracking, a term in the hacking world.) Ding Peng was a little emotional when he said this, because Li Hua is also the boss of the Huaxia Red Ke Alliance after all, and basically everyone in the Huaxia hacker community knows it, and today Ding Peng can finally see a top hacker using anti-black technology, and he is so excited.

Li Hua nodded, "Wait a minute, I'll reconnect to the Internet, I'll use your laptop to go to another room, I'll send you a remote-controlled Trojan, I'll monitor your screen, and we'll have a fishing plan." Li Hua said.

"Fishing?" Ding Peng was a little puzzled.

Li Hua nodded, "That's right, it's fishing." First, I take your notebook to your room, second, you leave your computer, and third, the wisher takes the bait! Li Hua said with a smile.

When Ding Peng heard that this was the case, he immediately nodded, he was not stupid, he knew what Li Hua wanted to do, that is, Li Hua also put the remote control Trojan on his computer, so that Li Hua also got the permission to monitor his computer, and he could monitor everything on his screen remotely in other places, and when the "fish" voluntarily took the bait, he could immediately call the system log in the remote control, and then track its IP, because Huaxia's Internet Information Department has real-time details of 50 million IP addresses, It's actually quite easy to lock down an IP.

The next thing to do is to get Li Hua's remote control Trojan horse to Ding Peng's computer, although the network is disconnected, but it is very simple to transfer the Trojan horse to Ding Peng's computer, there can be many ways, it can be transmitted through the local area network, it can be transmitted through the command prompt, or you can let Ding Peng open a port on his computer and transmit it remotely, but these are not the best methods, because they have to be networked, so Li Hua directly ran his remote control software on the USB flash drive, and then directly generated the control, Although the Perfect Guard has a strong anti-virus ability, it still can't find the Trojan horse generated by Li Hua, and after generating the accused side, Li Hua immediately copied it to Ding Peng's computer, and then pulled out the USB flash drive.

"Brother Li, ready, the notebook is already on the bed, the Wi-Fi password is ***xx, you can connect to it." Ding Peng said to Li Hua.

Li Hua nodded, "Wait a minute, after you connect to the network, immediately run the Stup.exe on the desktop, and then you can leave." Li Hua said.

Ding Peng also snorted, at this time Li Hua plugged his USB flash drive into Ding Peng's laptop, and then connected to the Internet through the wireless network, he opened the USB flash drive and ran the remote control software from it, "Xiaopeng, Ok." Li Hua signaled that Ding Peng could be connected to the Internet.

I saw Ding Peng turn on the online neighbor and reload the wireless network, because the wireless network was banned by Li Hua before, he immediately activated it, and waited until the IP address was assigned. He immediately ran the Stup.exe program of Li Hua's controlled end on the desktop, as soon as Ding Peng ran it, he immediately loaded the command prompt of the system, fortunately Li Hua modified the compatible Windows7 system a while ago, otherwise he would definitely miss this opportunity, after Li Hua's controlled end executed the order, the remote control program on the notebook has shown that Ding Peng's computer has been successfully online.

Li Hua has this enviable 150,000 foreign broilers, and they are all long-lasting, generally for the internal attack of the Red Guest Alliance, the last time the attack on Japan understood that it was these 150,000 chickens that played a role, basically killing any website of the Japanese country in seconds, and the effect was invincible, but Li Hua monitored the 8888 port this time, that is, after changing the port, only Ding Peng's computer was monitored, which was also for convenience.

"Xiaopeng, it's online. You're ready to leave your computer. Li Hua whispered, and Ding Peng answered at this time, and then quickly came to Li Hua's location, observing the movement of the system with him.

At this time, Li Hua has turned on screen monitoring,After Ding Peng left,Li Hua tested the remote video,But it prompted that the camera was occupied by other programs,Needless to say,After reconnecting to the network,The other party also prompted Ding Peng"Online",It means that the other party has turned on monitoring。

One minute passed, and Ding Peng's computer did not move, while Li Hua and Ding Peng still watched quietly.

5 minutes have passed, and Ding Peng's computer will automatically load the energy-saving mode at 7 minutes, and at this time, the mouse on the screen suddenly moved, "Brother Li, there is a situation." Ding Peng said immediately, his voice very low.

Li Hua naturally also noticed that the mouse on the desktop moved, because he did not have the command to perform the operation, which meant that the other party had moved.

Sure enough, the mouse automatically clicked and opened the browser, only to see a quick line of URL entered from the browser.

"The backend address of the forum!" Ding Peng exclaimed.

"Okay." Li Hua said softly, and then quickly executed another tool in the USB flash drive, Li Hua immediately loaded the tool into the remote control, this tool is actually Li Hua's remote control plug-in, you can perform remote view of the system's operation logs, immediately entered a bunch of code, this is assembly language, at this time the remote control shows a progress bar, "Copying target system Logs!" ”

The screen monitoring Ding Peng suddenly successfully accessed the background, only to see that he opened the function of column management, and then clicked on the information, and he entered the del command in the custom code, that is, delete, "Brother Li, they want to delete the Trojan." "Even if Ding Peng doesn't understand hackers, he still understands the meaning of this English code.

At this time, the progress bar has reached 90%, and it seems that it is about to succeed, but the other party clicked the management page button to determine the execution of the code at this time, if the other party deletes it, it must be impossible to find a trace, sure enough, the other party successfully deleted the Trojan, and closed the browser page, and then the other party actually opened the computer management, system log, just when the mouse was pressed to delete the recent operation, Li Hua's progress bar has reached 100%, that is, the system operation log has been successfully copied, And the other party also deleted the recent log records, and then moved the mouse to its original position, and the mouse stopped moving, it seems that the other party's purpose has been achieved, and there is no need to continue to hang the horse, because this gang of hackers can at least earn millions from it today.

"Did it work?" Ding Peng asked.

At this time, Li Hua did not speak, he opened the log of the system, although it was a 16-base mask, but Li Hua still had a way to convert it into text, after some operations, Li Hua finally cracked an IP address, which is the location of this group of people.

Li Hua put the IP address on the Internet and checked, and it turned out to be somewhere in Tongzhou, not far from the location here.

"I see." Li Hua said thoughtfully, a sneer on the corner of his mouth.

Ding Peng was confused at this time, "What is it?" Brother Li, have you found it? Ding Peng asked.

"Okay, I'll go back first. You remember to reinstall your system and rebuild the C drive, and then run the software I now sent to your mailbox, know the principle of this Trojan, it is not very difficult to clear it, so you should pay attention to one point, after installing the system, immediately restart into the security maintenance mode without network antivirus! After Li Hua finished speaking, he opened his mailbox, successfully uploaded the successful copy of the "criminal evidence", and then sent a software called "Trojan Scavenger" to Ding Peng.

As soon as Ding Peng saw this software, "Eh, this is not..."

"It's different, this is our internal removal software, which can't be compared with the software on the market, I'm leaving, I have urgent things to do." After Li Hua finished speaking, he pulled out the USB flash drive, and then walked downstairs.

As soon as he arrived upstairs, Li Hua took out his mobile phone and made a call, "Hey, I, Li Hua." I need help, well, send a few people over, yes, to Tongzhou Xuming University..."