Chapter 421: The Internet is Broken
The sound of the alarm attracted Jiang Hua and Kapaski, who was doing nothing.
"What's going on?" Jiang Hua asked.
"Fell into a honeypot." Xiao Yuan replied, called up the monitoring software from the background, took a look, and found that the IP of his own anti-tracking was actually sent from the second AIX server, and the other party's anti-tracking had just begun, and it was still hovering outside the ring logic lock at this time, and it did not even enter the loop of ring logic lock settings.
Out of confidence in the ring logic lock, Xiao Yuan didn't immediately pay attention to the other party's anti-tracking, but threw the monitoring software back to the background, leaving only a status bar at the bottom of the screen, and then began to continue to analyze the information file he had just obtained.
"What is a honeypot?" Jiang Hua asked curiously.
"A honeypot is a pre-set trap." Kapaski took Jiang Hua's words and replied.
"Xiao Yuan, so you fell into a trap?" Jiang Hua asked.
"Yes, I found two identical AIX servers, and the preliminary judgment is that one should be disguised by a honeypot system." Xiao Yuan said.
"How did you tell if it fell into the honey pot, could it be these annoying alarms?" Jiang Hua asked again.
"The police are the other party is anti-tracking me, trying to find our current location, if the other party just records my behavior in the honey pot, and does not reverse tracking, it will not call the police, and I will not find out that I fell into the honey pot so easily." Xiao Yuan explained.
"Why was it so careless?" Jiang Hua said.
"The reason why the honeypot is called a honeypot is because of its camouflage, especially some clever honeypots, and even the mirror image of the real system, if you don't enter it, you can't find out that it's a honeypot at all, not to mention that now we have no goal at all, and it's impossible to judge whether the other side is a honeypot or not." Xiao Yuan said.
"This is a bit like a soldier's battle, in the case of a complete understanding of the enemy's situation, in order to find out the truth, sometimes you know that it may be a trap, and you can't escape it, you can only step in and think of other ways to deal with it." Xiao Yuan explained again.
"Xiao Yuan, you don't seem to be worried, can I think that you are confident in the springboard strategy you set?" Kapathsky asked.
"You can think so." Xiao Yuan said.
Kapatsky didn't ask anymore, Jiang Hua didn't speak again, there was no other sound in the room except for the alarm sound from Xiao Yuan's computer from time to time, Tiff seemed to be in a state of complete forgetfulness, quickly writing on the paper in front of her, and the alarm sound from Xiao Yuan's computer did not affect her in any way.
Xiao Yuan's attention was not completely focused on the other party's anti-tracking, but when he was doing further work, he occasionally paid attention to the monitoring software status bar at the bottom of the screen, controlling the other party's anti-tracking situation, when the other party's tracking entered the first cycle of the ring logic lock and struggled, he directly executed a command through VI, turned off the alarm sound of the monitoring software, and the room was quiet again.
Although he is not worried about the other party's anti-tracking, Xiao Yuan has another worry, since the other party is anti-tracking himself, it means that his intrusion has been exposed, and the other party will not sit idly by and ignore his own intrusion, and will definitely take certain precautions, and the difficulty of obtaining satellite data from the other party's server will inevitably increase a lot, and if the other party takes some extreme measures in order to prevent himself from stealing data, such as cutting off the network connection of the server, Then you really can't do anything about it.
Therefore, he must seize the time and take other measures before the other party makes the next reaction, preferably so that the other party does not dare to disconnect the network without authorization.
So after he threw the information file he just got to the analysis software for analysis, he switched it to the background, and then began to write another program in vi, he is now going to do something that even in his previous life he only imagined in his brain, but never did, if this was just an ordinary invasion, he would not do it at all, but this time it is not an ordinary invasion, the success of this invasion is related to whether Wang Junpeng can be found, so, failure for him, will be very unwilling, Even anger.
In order to hurry up, Xiao Yuan didn't pay attention to the analysis results of the information analysis software, and at the same time, in order to reduce interference, he even threw the status bar of the monitoring software showing the other party's anti-tracking to the background, leaving only the black interface of VI and the code he typed out on the entire screen.
"Capa, come here."
At this time, Tiff suddenly shouted and called back Kapaski, who was watching Xiao Yuan write a program, so that Jiang Hua was the only idler left in the room.
Xiao Yuan's program took half an hour, when he wrote the program, Tiff and Karpassie were still busy, he compiled the program into an executable binary, temporarily put it again, and then opened the monitoring software, took a look, and found that the other party was still trying to break through the ring logic lock, although there was a breakthrough, but it was still far from being able to break through the ring logic lock.
He entered a series of commands into the master controller of the ring logic lock to test whether the two IPs were still connected to the network, and the return result made him breathe a sigh of relief that the two IP addresses were not disconnected from the network.
Putting the ring logic lock control program back into the background, Xiao Yuan cut the information analysis software to the foreground, saw that the analysis had ended, and gave a few strings.
Xiao Yuan copied these strings from the analysis results, embedded them in a script file, and then wrote the address of the program he had just written into the script file.
After doing all this, Xiao Yuan called up the control program of the ring logic lock again, and entered a command into it, which will parse the script file, and finally synthesize it with the script file to form a more powerful network command to send to the remote AIX server, and also send the software that Xiao Yuan just wrote.
In fact, invasion has a lot to do with luck a lot, and at this moment, Xiao Yuan is also gambling on his luck, betting that although the other party found his invasion attempt from the honeypot, he did not plug the loopholes in the AIX system he mastered, or take other measures.
The server he chose to send was a different AIX server than the IP that was being de-tracked to him, and when he sent this command, all he could do was wait, wait for the feedback from the other computer, and then make the next move.
"Wow!" While waiting for the news from the other party's server to return, Xiao Yuan heard Kapaski's exclamation, turned his head to look, and saw that Tiff was also excited, so he asked, "How is it, what are you doing over there?" ”
"It's just a preliminary result, and there are still some key parameters missing, and without these parameters, it's still not possible." Tiffie said.
"Keep it up." Xiao Yuan said.
Tiff smiled at him rarely, obviously because she had made a big breakthrough, and she was in a good mood at this moment.
"You also have to come on, those key parameters may only be available from the satellite design data." Tiffie said.
Xiao Yuan also smiled, turned his gaze back to the computer screen, and the result returned by the control software showed that the command and file delivery had been successful, just waiting for the return information.
After another five or six minutes, some return messages appeared in the information receiving window of the master control software of the ring logic lock, but these messages quickly stopped, and then the master control program returned a red prompt message: "The target connection failed." ”
Xiao Yuan's worst fear appeared: the other party disconnected the AIX server from the network.
"I hope that program will work!" Xiao Yuan stared at the prompt information on the screen, his eyes narrowed slightly, and he thought silently in his heart.