Chapter 486: The Fisherman's Profit
During this time, the three Brian tried various methods to try to take back the administrator rights from chn_honker, but the other party seemed to know the methods they could use to deal with them so well that they became more and more desperate to regain the management of the server by their own efforts, and at this time, Frank's shouting gave them new hope.
"Mr. Frank, do you have a way to track down chn_honker?" Brian asked.
"Don't be noisy, it's going to take some time." Frank waved his hand, interrupting Brian's questioning, and after a short period of excitement, he calmed down again, because the tracking software prompted that after the first layer of protection logic, there is another protection logic, and according to common sense, the second layer of protection should be more complex and strict than the first layer of protection, so if you want to track down the real IP address of the chn_honker, you need to continue to work hard.
The three Brian didn't care too much about Frank's arrogance, as long as Frank could find chn_honker and help them solve this crisis, even if they scolded them, they would endure it.
Frank buried himself in front of the computer, and another series of commands were issued, and the analysis and extraction of information for the second layer of protection immediately began.
Originally, Frank thought that the second layer would definitely be more complicated than the first layer, and that it would definitely take more time to extract and analyze information, but the truth was a little different from what he thought, and after more than ten minutes, the information extraction and preliminary analysis were over.
"It's over so soon?" Frank was surprised, even a little hard to believe, so much so that he double-checked the results several times before he was sure of them.
"Isn't my prediction wrong, chn_honker put the most complex defense on the first layer, it should be like this, the first layer of protection logic is very ingenious, and it is the first time I have seen such a clever protection logic, if you crack it according to normal thinking, you will definitely be dragged into a dead loop, chn_honker should be very confident in your own protection, thinking that no one should be able to crack the first layer of protection, but unfortunately he forgot that they have a saying in Huaxia called "There are people outside people, And I'm the outsider? ”
Frank quickly found a reasonable-sounding reason and explained it to himself, and it has to be said that this guy is very conceited and has a very strong confidence in his own technology, so much so that he doesn't even think about it, and his tracking direction has been taken in another direction by the person sitting on the Internet who knows everything about him, and that person is sitting in front of the computer at the moment, staring at the computer screen, touching his chin and smiling.
After figuring it out, Frank entered the information he got into another analysis software and began to analyze the information twice, which was also much faster than the first layer of protection.
"Well, the logical structure of the second layer of protection is also very exquisite, and the tracking complexity will increase rapidly with the increase of nodes, but compared to the ring structure of the first layer, it is still a little simpler, and this kind of setting logic is enough for ordinary people, but unfortunately he met me, and he deserved to be unlucky." After the results of the secondary analysis came out, Frank secretly evaluated the logic of the second layer of protection, and sent the analysis results to the tracking software.
After the tracking software gets the set policy profile of the second layer of protection, the tracking continues, and this time the tracking is still faster than the anti-tracking of the first layer of protection, and the results are very fast.
"Brian, go find Old Man Thomson." After the results came out, Frank directly instructed Brian.
Brian was excited, because Frank asked him to go to Thomson, which meant that the tracking was likely to have results, and furthermore, it meant that the crisis was about to pass, so he left the server room almost trotting, and five minutes later, he almost half-dragged Thomson closer to the server room.
"Old man Thomson, the task you gave me is complete, the IP address of chn_honker is here, and I shouldn't be needed for the rest of the matter." Frank saw Thomson walk in, got up from his seat, walked over and patted the old man on the shoulder, and said with a smile.
"I know you guys won't let me down, Brian, immediately look up where this address is, and report to my office when you have the results, Frank, would you be interested in going to my office for a coffee." Thomson looked very pleased, and after giving Thomson a command, he smiled at Frank.
"It's an honor, you wait, I'll pack my things." Frank said with a slight smile.
…………
When Frank got the tracking results, Xiao Yuan also had to get the tracking results almost at the same time.
What he just did was to hang the ring logic lock outside the springboard of fly007, the purpose was to confuse the old friend, so that he mistakenly thought that his ring logic lock was the first layer of protection, and the springboard set up by fly007 was the second layer of protection, and then misled the old friend to let him locate the tracking target to fly007, so that he could take the opportunity to profit from it.
Based on the understanding of the old friend, Xiao Yuan also made some settings when grafting the ring logic lock to the springboard of fly007, such a setting will be when Frank extracts and analyzes the data from the network, and sends the data back to his computer, according to his understanding of this old friend, his old friend usually uses this special data packet to confirm whether the IP address obtained is the final result of tracking, if so, there is a flag bit in this packet that will be filled as 1, if not, This flag will be filled with zero.
After Xiao Yuan intercepted the packet, he only needed to see whether the specific bit in some packets was 1 to know whether the IP address contained in the packet was the final result traced by an old friend.
The old friend's superb anti-tracking technology really did not disappoint Xiao Yuan, he only waited for half an hour, and he waited for that special data packet, so when Frank got the real address of fly007, he also got this real address.
After Xiao Yuan got the IP address of fly007, he immediately checked the source of this address, but the results he got surprised him, because this address turned out to be from Berkeley.