Chapter 008 Ring Logic Lock (2)

Xiao Yuan's next job is to pick out some computers from this list, hack and implant Trojans, this process he decided to do manually, he selected some IP addresses abroad, and the running system is Windows98 computers, as for those running systems are Unix and Linux, he did not choose, because the backdoor program he wrote can only run on the Windows system.

Xiao Yuan chose a computer located in the United States, the running system is windows98 as the first target of intrusion, because the windows98 system has just been released not long ago, so the vulnerabilities on it are the most, and most of them have not been discovered, so Xiao Yuan did not spend much effort, he used a buffer overflow vulnerability of windows98 to invade this computer, and successfully implanted his own Trojan horse into it, so far, This machine succeeded in becoming the first broiler he mastered after his rebirth.

Xiao Yuan has been cautious when carrying out the invasion and implantation of this broiler chicken, because all his intrusion instructions are sent directly from his own computer, although he has disguised his real network address, but if he is unlucky and meets a master, this master is likely to crack his real address according to Xiao Yuan's intrusion instructions, and carry out anti-intrusion and even anti-control of Xiao Yuan's computer, you know, Xiao Yuan does not have any advanced hacking tools in his hands now, It was like he was facing a samurai who was probably heavily armed with his bare hands.

In fact, Xiao Yuan found that his luck was not so weak, and the owner of the first computer he invaded was not a master.

Next, when Xiao Yuan controlled the second broiler, he no longer sent it directly from his own computer, but used his first broiler as a springboard, and the instructions he sent were sent to the broiler first, and then the Trojan horse he implanted in the broiler was sent to the computer he wanted to hack, so that if his intrusion instructions were retarded, he could only track the broiler he used as a springboard, and at this time, if the other party continued to track Xiao Yuan's real address, It is necessary to know the encryption method of the Trojan and the network protocol used, which will undoubtedly make it much more difficult for the other party to prevent tracking.

After controlling the second broiler, Xiao Yuan set this broiler as his second-level springboard, and then began to try to invade and control the third broiler, and so on, until he controlled twelve broilers and set up the springboard, he stopped.

When Xiao Yuan sets up the springboard, he does not use the linear setting, because the number of linear springboard settings is more, theoretically speaking, once the other party cracks the first-level springboard, the other springboard can be cracked in the same way, so the real master has his own set of methods when setting the springboard, Xiao Yuan will generally use a way called ring logic lock invented by himself when setting the springboard, and the springboard set in this way will logically form many ring structures. The connection between the rings is a special encryption method, if a hacker finds Xiao Yuan's intrusion, and anti-tracking him, they will fall into those ring traps, if the anti-tracking hackers do not understand the connection between the logical rings set by Xiao Yuan, then they will fall into the trap, never get out, of course, it is impossible to trace Xiao Yuan's real network address.

Here, Xiao Yuan only controls twelve broilers, so he only sets up a logic lock, even so, he believes that the number of people in the world who can really crack his logic lock can't be used with a slap.

The master control program of this logic lock is the remote control program he wrote later, and all network commands are issued by this remote control program, and at the same time, through all levels of springboards, the information from the computer he invaded is also received by this control program and displayed.

After doing all this, Xiao Yuan began to shift his target to his final destination, the server of Jiangzhou University's artificial intelligence laboratory.

Xiao Yuan was very familiar with the IP address of the server of Jiangzhou University's artificial intelligence experiment in his previous life, so this address did not need to be scanned to get it, but Xiao Yuan noticed that during the early scanning process of the network scanner just now, it actually scanned several main servers of Jiangzhou University, and the addresses of several main servers of Jiangzhou University have been recorded by the scanner in the broiler list file.

Without much effort, Xiao Yuan took advantage of an undiscovered vulnerability in WindowsNT to obtain the administrator name and password of the server of the Artificial Intelligence Laboratory of Jiangzhou University, and then remotely logged in to the server through the springboard.

Logging in to this server, Xiao Yuan's purpose was to find out who had entered the server and stole his mother's research materials, and according to the memories of his previous life, all the important information in the intelligent laboratory was stored in a unified ftp directory, so he entered a few file retrieval commands, and it didn't take much effort, and the file list on the server side was transmitted back through the network.

Xiao Yuan looked through the list of files and found no ftp directory in it.

"Damn, who is so ruthless, deleted the ftp directory, it's this kind of hacker who destroys everywhere to smear hackers, what a bastard." Xiao Yuan scolded secretly, so he crackled and entered two commands, wanting to call up the system log to check it, the system log file is a bit large, and the network speed in Huaxia in ninety-eight is really not flattering, so it only took him nearly ten minutes to complete the transmission of the log file with a few trillion sizes.

Opening the log file, Xiao Yuan glanced at it and found that he seemed to have been fooled, and what he was now hacking was not the server of the artificial intelligence laboratory, but a honeypot system.

"Empiricism kills people, and the boat capsizes in the gutter." Xiao Yuan felt very depressed, he estimated that the intrusion operations he had just made had been recorded by the honeypot system, and his intrusion had been discovered, but he was not nervous, because the ring logic lock he had set was enough to protect him from being discovered by others.

As Xiao Yuan expected, just when he entered this honey pot as an administrator just now, in the computer room of the artificial intelligence laboratory of Jiangzhou University, a ticking alarm sounded, and a chubby young man who was napping suddenly woke up, staring at the computer screen with his eyes shining, and at the same time, the mouse in his hand clicked for a while, and a window recording the intruder's operation popped up, and there was information scrolling on it, if Xiao Yuan was here, he would find, The information scrolling in this window is exactly what he does every step in this honeypot.

When the fat man stared at the screen, he reached out and took the phone on the desktop, and quickly dialed a number to go out.

"Boss, there's a fish on the hook."

Soon, there was a rush of footsteps, and a tall beauty of twenty-four or five years old, wearing off-white slacks, a pale red bat shirt, and a devilish figure, walked in from outside and sat down in front of another computer.

"Anti-parsing the other party's address, don't let him slip away!"

ps: New book period, continue to ask for flowers, ask for collections, like this book, please give green tea support, thank you, your support is the driving force for green tea updates, if there are VIPs, green tea is inspired, there will be more outbreaks.