Chapter 269: Unexpected Results
"Enhanced CIH Virus Technical Analysis Report."
Xiao Yuan logged in to the Xuanni Forum through tel, and the first thing that caught his eye was this title, and the poster was the official ID of the Xuanni Forum.
"Enhanced CIH virus? What is it? Could it be that there is a new variant of the CIH virus? โ
Xiao Yuan's mind flashed a series of questions, he opened the post with his hand, glanced at it a few times, and immediately gasped, he didn't read the content below the technical report for the time being, but quit the post, quickly flipped through it in the forum, and soon had a general understanding of the incident.
"Who's doing this?"
"Did the Chinese do it, or did some foreign forces take the opportunity to make trouble on the day of the CIH virus outbreak?"
"Why didn't such a thing happen in the previous life, but it happened now, is it because of my rebirth that it changed some of the development trajectories of this world, which led to this incident?"
Xiao Yuan's brows tightened, thinking about these questions in his mind, especially the last question, and what was directly related to this matter was that he reminded Tang Xinyu and Gu Wolf and let them launch the CIH virus.
"Is that why?"
"Whatever the reason, it's best to find out the author of this virus, otherwise all speculation can only be speculation."
Xiao Yuan was no longer thinking nonsense, anyway, he couldn't sleep at this time, it was better to try to track down the source of this virus, after making this decision, he no longer hesitated, withdrew from the forum, and began to prepare for the upcoming tracking.
This matter is easy to say, but it is not easy to do, because since the author of the virus can write such a perverted virus, he is certainly not a mediocre person, and he will inevitably think that once the virus is put on the Internet, there will definitely be countless people tracking him on the Internet, so before the virus is released, he will definitely hide himself properly, which is one of them.
Second, six or seven hours have passed since the outbreak of the virus, so long is enough for the virus author to remove all traces of himself on the Internet, and even in order to prevent others from finding him, he is most likely to remove all traces related to himself, and then disconnect from the network, this situation is like a kite flyer, in a place where no one saw the kite out, and then cut off the string in his hand, the kite flew away, he also packed up his things and left, It is almost impossible to find someone who deliberately hides from the kite through a kite with a broken string.
Therefore, Xiao Yuan wants to track this person on the Internet, to a large extent, he is doing something that cannot be done.
Although Xiao Yuan thought that this matter might be an impossible thing to complete, he was unwilling to give up, and even said that he had to do it.
First, this person did this virus in just a few hours, almost ruined the efforts of the Genne Company for a period of time, and even had a considerable negative impact on the Genne Company.
Second, this matter was not in the previous life, but it appeared in this life, so Xiao Yuan wants to know, what is the purpose of this person to make a virus, is he like Chen Yinghao, the author of the original CIH version, who believes that he is a superhuman in technology, purely because he wants to challenge authority, or does he have another purpose?
After making a decision, Xiao Yuan no longer hesitated, if he wanted to track down the other party, he must get certain clues, these clues are naturally the virus information that is still spreading on the Internet, he needs to grab these poisonous data packets from the network, and then statistically analyze the network address information contained in these data packets, and find some clues from them.
Tools for grabbing bags from the Internet,Xiao Yuan's notebook has ready-made,Now the thinkpad600 in his hand,After continuous development and improvement some time ago,He already has a huge number of tools,Can complete a variety of network tasks,Some of these tools are collected by him from the network,Some of them are designed by himself,Some of these tools are under his careful design,The function is not inferior to the original snake toothใ
What he lacks now is the signature code of the virus, all kinds of data packets on the network, in order to find the packet containing the virus from so many packets, the signature code of the virus is indispensable, so he entered the Xuan Ni Forum again, opened the technical report he had read before, and found the section that recorded the virus signature code, copied the signature code from it, and stored it on the computer first.
Next, what he still has to do is to hide himself, this is the common sense that hackers operating on the network should have, he naturally will not forget, and it didn't take him too long to set up the springboard this time, because the broilers he had mastered before still have a lot to use, enough for him to form a ring logic lock on the network.
After setting up this step, he set up a packet grabbing gadget stored on his computer, and then released it through a ring logical lock, this gadget is actually a network worm, with the function of automatically finding a host through the network for infection, self-reproduction, but this tool is different from the enhanced CIH virus variant that is raging on the network, after it enters the host computer, it will not destroy the host computer, but only perform a function, That is to grab network packets that enter the host computer.
After grabbing the packet, the gadget will analyze the packet, and if it meets the conditions, it will send the packet to a high-performance UNIX server controlled by Xiao Yuan through a ring logic lock, and use the powerful computing power of the server to analyze and summarize the address information contained in the packet, and then send the final analysis results back to his notebook.
In the above process, when he releases the bag grabber tool, the other links will run automatically without his intervention.
The speed of reproduction of the packet capture tool is very slow at first, but its growth rate is exponential, that is, the infection rate will get faster and faster as time goes by, so after the tool is released, after three minutes, the first host is found, and after six minutes, the number of hosts has reached sixteen, and after another three minutes, the number of hosts has reached sixty-four, and after half an hour, the number of hosts has reached thousands, and the number of hosts is increasing at a higher and higher rate.
At this time, the master control software on Xiao Yuan's computer received the first statistical analysis information sent by the foreign server, which was obtained by analyzing more than 3,000 packets captured by the packet capture tool, and the source address of the virus packets shown by the analysis results was evenly distributed, and no address had a particularly high probability, so the results were not referenced.
For this result, Xiao Yuan had already expected, three thousand data packets seemed like a lot, but it was far from enough to count a certain pattern from it, so he put the notebook on the table, then leaned on the head of the bed, picked up a book and read it.
After reading the book for a while, Xiao Yuan got off the bed, came to the computer desk and looked at the statistical results received on the think600, at this time, thinkpad600 has received eleven statistical reports, and by the last two reports, the number of data packets analyzed has exceeded 100,000, and the analysis results are no longer evenly distributed, but show a very obvious normal distribution characteristics.
At this time, the remote server sent another analysis result, the number of analysis packets has reached as much as 200,000, and the normal characteristics of the source address distribution of these packets are more obvious, and one of the addresses with the highest probability of occurrence is particularly dazzling, and that address is actually from Xuanne Company!
PS: Today's update ends.
There are some probabilistic and statistical terms in this chapter, such as distribution, average distribution, normal distribution, as for what is distribution, average distribution and normal distribution, everyone Baidu by themselves, green tea is no longer explained, of course, these terms do not affect reading, can be ignored.