Chapter 009: Anti-Tracking (Third Update, Seeking Flowers and Collections)

"Understand, he must not be able to run."

As the company's ace network security engineer, the fat man is very confident, and in his opinion, the hacker who has entered the honeypot he has set up is like fish on the chopping board.

His eyes did not take off the computer screen, the information in the window on the screen was still scrolling, and Xiao Yuan's operations in the honey pot were clear at a glance.

The software that records Xiao Yuan's operation in the honeypot is a component of a very powerful network anti-intrusion software developed by their company - Hunter Network Shield, which not only has the function of recording network operations, but also has a very powerful network information analysis and address anti-resolution ability, so when the software finds that there is a hacker intrusion and sends an alarm to the little fat technician, the address anti-resolution has begun.

Soon, Hunter Netshield got the network address of the nearest springboard, but the next analysis stopped because the data flow he got from this springboard did not match the data format of any existing network protocol.

Xiao Yuan, who was sitting on the other side of the computer, stared at the information returned on the computer screen, touched his chin and laughed, he just had the idea of trying it, and used a loophole in WindowsNT that was not open to attack and test this honeypot system, and it turned out that this honeypot system turned out to be a software built on the server of my mother's artificial intelligence laboratory, so Xiao Yuan easily bypassed this honeypot system, leaving an illusion that the honeypot system was still logged in, and easily entered the real server, Got real administrator access to the server.

In this case, he can see all the operations on the network server at the remote end, because the honeypot system is just a software running on the server, so he can also see all the behaviors in this software, and of course, the other party's attempt to track his real address along the springboard is also clear.

Because it is necessary to ensure that the honeypot system can recognize its own instructions, the network protocol that enters the honeypot system from the last springboard can only use the existing network protocol, so the other party can easily get the network address of the last springboard, but from this springboard and then trace back, it is necessary to analyze the data flow transmitted between the springboard and the springboard.

The data stream transmitted between the springboards uses the network protocol that Xiao Yuan has built into the Trojan horse program he wrote, and the other party tries to compare the existing data stream with the data format of the existing network protocol, and tries to find out the address of the previous springboard from it, which naturally does not work.

"Holy." The fat technician blew a big word just now, and immediately encountered an unsolvable problem, and felt a little unbearable on his face, so he couldn't help but scold.

"Li Daming, you are civilized, what happened?" The beautiful boss heard the fat technician Li Daming burst into foul language, and her brows couldn't help frowning, and reminded him.

"Boss, the other party is either a master, or the intrusion tool used is written by a master, and it is a bit difficult to reverse analyze the real address of the other party!" Li Daming said honestly.

"What's going on?"

The beautiful boss knows the character of her subordinate very well, and it is really rare for something like this to happen to him.

"The network protocol used for information transmission between the other party's springboards is self-created, and our network shield can't parse it, which is too damn good." Li Daming explained.

"Think of another way, don't back down at the slightest difficulty." The beautiful boss gave a word of encouragement.

"Okay." Li Daming nodded, and after speaking, he opened the command line window, typed a command into it: spyadre, and then gritted his teeth and said, "I don't believe that he is more powerful than the snake tooth god." After saying that, he hit the enter key as if venting.

With the sound of the enter key, a large amount of analysis data scrolls quickly through the command line window.

Li Daming ran the software that he bought for $10,000 from a big bull named Snaketeeth on a foreign hacker forum.

In addition to the functions of general anti-tracking software, Spyadre also has a certain intelligence, which can intelligently analyze some unconventional custom network protocols.

For this software, Li Daming is very confident, because he thinks that no matter how strong the other party's ability is, I am afraid that it is not as strong as the author of the software, Snake Tooth, you must know that Snake Tooth is one of the top hackers in the world, and its strength is compared to the world's first hacker Kevin on the surface? Mitnick, too, is the case, in a sense, Snake Fang is more powerful than Kevin, because Kevin was caught, and Snake Fang is still alive and easy.

After five or six minutes of running spyadre, a green line of English information appeared on the command line: "After the network protocol is parsing, do you want to continue the network address de-parsing?" (y/n)”

"Boss, it worked." Li Daming saw this line of information and shouted excitedly.

"Okay, good job, go on." The beautiful boss's voice also seemed a little excited, in fact, she knew that Li Daming had such an artifact-level tool in his hand, so when spyadre was running, she was also looking at this side intently, and she also saw the prompt in the command line window.

Li Daming executed the order to continue parsing, and then stared at the computer screen with bright eyes with the beautiful boss, waiting for the real address of the hacker to be resolved.

Xiao Yuan is using remote control software,Looking for traces left by hackers who stole his mother's research materials on the server,But he didn't want to control a warning message popping up in the software window,It turned out that his first layer of springboard has been broken,The other party has been tracked into his circular logic lock,Soon,A series of prompt messages are displayed,The other party has turned around in the logic lock he set,Start to turn the second circle。

"The other party is not simple!"

Xiao Yuan couldn't look for traces of hacker intrusion, and his attention shifted to the other party's anti-tracking, he was interested in whether the other party could analyze his custom network protocol, so whether he could break through the ring logic lock he set, you know, it was more than one level more difficult to break through the ring logic lock than the previous analysis of the network protocol.

In order to break through the ring logic lock, you need to do two steps, first you need to understand the setting strategy of the ring logic, which alone is much more complicated than analyzing an unencrypted network protocol.

Assuming that the other party can speculate on the setting strategy of the ring logic lock, then there is a bigger challenge waiting for the other party, that is, after each loop of the ring logic lock, the Trojan horse program built in Xiao Yuan detects such a result, and will automatically run an encryption algorithm built into the Trojan horse to automatically encrypt the transmission data stream.

This kind of encryption algorithm is also not available in the current world, and the most important thing is that this encryption algorithm will disguise the encrypted data stream as an unencrypted normal data stream, so as to mislead the other party to get the wrong network address, and then fall into a loop of logic locks, and the cycle will go on forever.

Xiao Yuan saw the other party spinning in a circle in his ring logic lock, but when he thought that the other party would keep spinning, he didn't want the other party to turn a few times, so he stopped, obviously found that he had entered a dead loop, so he began to try to crack the ring logic lock, this result surprised him, and at the same time he had a strong curiosity about the other party's anti-tracking software.

…………

Li Daming and the beautiful boss stared at the computer screen, and saw that the anti-parsing information that had been scrolling stopped and showed a message, so they widened their eyes to see the content of the message: anti-parsing encountered a logical lock without solution, and the address parsing failed!

"Damn, there's no logic lock!" Li Daming's eyes were bigger than a cow all of a sudden, and he was extremely surprised, and screamed as loudly as a popping chrysanthemum, it was against the sky to be called a non-solution logic lock by the software of the snake tooth bull, but he didn't know that this software could judge that it had entered the logic lock so quickly, and tried to crack it, which was not simple.

"No unsolved logical locks?" The beautiful boss turned her head, glanced at the eye-catching red English on Li Daming's computer screen, and said with a frown.

"Boss, we've met a master." Li Daming said with a depressed expression, even spyadre couldn't crack the other party's logic lock, although he boasted of extraordinary strength, but he couldn't compare to snake teeth, so he simply gave up.

The beautiful boss did not blame Li Daming, although she is not a hacker, but her company is the one who deals with hackers the most, so she knows that in the field of network security, intrusion and anti-invasion, there has never been a shortage of geniuses, nor has there been a lack of miracles, even if it is the world's top hacker, she does not dare to say that she is invincible, not to mention, although Li Daming has good technology, there is still a great distance from the top hacker.

"Don't be discouraged, think of another way?" The beautiful boss encouraged Li Daming, and she gave up like this, she was a little unwilling.

"The logic lock set by the other party is too powerful, and the software of the snake tooth has been used, and there is still no solution, I really can't do anything." Li Daming scratched his head and said, then added, "Maybe it is only possible to crack it if the snake tooth comes in person." ”。

"So, we can only watch each other come and go freely, as if they were in a no-man's land?" The beautiful boss asked.

"Boss, I'm sorry, it's me who is incompetent." Li Daming apologized to his boss in frustration.

"Isn't that man gone yet?" The beautiful boss asked.

"Yes, I don't know what he wants to do, after logging into our honeypot system, he just looked through the file directory, and then he kept hanging like this, and didn't leave." Li Daming replied that he still didn't know that Xiao Yuan was just hanging in the honey pot to confuse them.

"Can you get in touch with him?" The beautiful boss asked, she had developed a strong curiosity about the other party.

"Without the other party's real address, I don't think there is much hope, because I can only send a message to his springboard to try, and I don't know if the other party will receive it." Li Daming explained, and at the same time, his fingers crackled and tapped on the keyboard, and a greeting was sent.

After the greeting was sent, Li Daming and the beautiful boss both stared at the computer screen, expecting each other to respond, and after five or six seconds passed, a message really came, but the content made Li Daming and the beautiful boss look at each other and smile bitterly.