Chapter 272: Video

Looking at the Class A address on the computer screen that is not available in China, Xiao Yuan's brows were deeply locked, and he also realized the seriousness of the matter.

"Is that all?"

Xiao Yuan was extremely unwilling in his heart, so he decided to go to the place where this IP was located to see who was making trouble.

Hacking into other people's computers, no matter how clever the means are, the steps are almost the same, probe the other party's operating system, scan ports and vulnerabilities, and then take corresponding measures according to the specific situation, the difference between the master and the low hand is that the master is more concealed when doing these things, and the means are more diverse and flexible.

In order to achieve the purpose of hiding himself and not being discovered by the other party, Xiao Yuan's scanning of that IP is carried out through the Xuan Ne server, because the other party has been maintaining a connection with the Xuan Ne server, and at a fixed time, a service request will be sent to the Xuan Ne server, and the service request packet contains a short script code fragment, and the code fragment contained in the four service request packets will form a script code with complete functions, and this code is executed on the Xuan Ne server. This is to obtain the system logs of the Genne server.

And Xiao Yuan also based on this, judging that the other party must be an intruder, so he counter-tracked the other party, but it turned out to be tracked abroad.

Now, Xiao Yuan is ready to attack the shield of the son with the spear of the son, since the other party will embed the script code in the instruction, then he can also do the same, and he does it more secretively, because he embeds the code in the system log packet obtained by the other party, and this code will return a series of information from the other party's computer after the system log packet reaches the other party's machine.

Because the other party is likely to be a master, when the conventional script is executed, it is very likely that the other party will find out, in order to avoid this, Xiao Yuan also took a lot of effort to design this script, and added a judgment code to the script, which will first detect the operating system type of the other party's computer, and after getting the type of operating system, the later code will perform different operations for different operating systems according to the results obtained by the previous judgment code.

After writing this code, Xiao Yuan placed a hook program on the Xuanne server, the function of this program is to intercept the log data packets sent by the server to that IP from the bottom of the system, and after intercepting the data packets, embed the script code written by Xiao Yuan into the data packets, and then release the processed data packets.

After doing all this, Xiao Yuan stopped for a while, waiting for his script to return the basic information of the other party's computer, and while waiting, he called Xuanne Company again, and told Tang Xinyu the results he had just discovered, asking him to prepare for the worst and find a way to deal with it in advance.

After making a phone call, Xiao Yuan had already obtained the relevant information of the other party's operating system on his computer, and the other party was the same as him, using the operating system of windows98.

This result made Xiao Yuan stunned for a moment, because Xiao Yuan thought that since the other party could bypass the Xuannese firewall and enter the Xuannese server silently, then he must be a master, and when the master carried out network invasion, it was rare to use the windows9x system, although Xiao Yuan had also used windows98 to invade before, but at that time it was a condition, once he had the conditions, he never used the system with windows98 to do the invasion, That computer was only used by Xiao Yuan when he wanted to write some Windows-based programs, and the rest of the time it had been idle.

Of course, the other party is using the windows98 system, which is a good thing for Xiao Yuan, because this system is congenitally limited, plus it has just been launched for a year, and there are still many vulnerabilities that have not been discovered, and these will provide Xiao Yuan with great convenience.

After confirming that the other party was using the windows98 system, Xiao Yuan wrote a script again and sent it to the other party's computer through the Xuanne server, this time he directly exploited a vulnerability in windows98, and the approach was a little bolder than before.

Through this code, Xiao Yuan easily logged in to the other party's computer remotely, began to explore the other party's computer, and soon made a new discovery, he found a piece of assembly code on this computer, and after transmitting it back to his own computer, he read it briefly and found that this code was the assembly code of the CIH virus that raged in the Huaxia network a few hours ago.

Xiao Yuan looked at the code on his computer, and was stunned for a moment, things went unexpectedly smoothly, so smooth that he couldn't believe it.

"Is it really that simple?" Xiao Yuan muttered to himself, and then relieved, no matter what, he found the source code of the virus from this computer, which means that the other party should be the culprit.

Knowing that the other party was the culprit, Xiao Yuan did not feel relaxed because of this, because he knew that the information obtained by his own anti-tracking and the virus source code obtained from the other party's computer might not play a big role.

Even if Xuan Ne takes Xiao Yuan's discovery as evidence, it doesn't explain any fundamental problems, and since the other party wants to pour dirty water on Xuan Ne, he can find many ways to fight back against this evidence, and if he insists that these evidence are forged by Xuan Ni, I'm afraid that many people will believe it, and even the other party may turn the virus source code taken out by Xuan Ne as evidence that Xuan Ne is the mastermind behind the whole incident.

Therefore, Xiao Yuan had to look for further evidence, he executed a few network commands on his computer, waited for a while, and the script implanted in the other party's computer returned a list of processes, he wanted to find some further evidence from the other party's computer process.

In the list of processes, there is a process that caught Xiao Yuan's attention, and the name of that process has the word camera, camera, which means camera, camera.

"The other party should have a camera on their computer." Xiao Yuan quickly made a judgment, and at the same time, his heart moved, thinking that if he could steal the video data collected by the other party's camera, it might be a breakthrough.

It is not difficult to intercept the video data of the other party, you only need to write a hook program, you can do it, but the amount of video data is very large, and now the bandwidth used by Xiao Yuan to surf the Internet is not enough to support such a large amount of data transmission, it seems that the only way to transmit these videos back to the company is that the company's bandwidth is enough.

Thinking of this, Xiao Yuan acted quickly, and after making preparations, he picked up the phone and called out, gave Tang Xinyu such and such instructions, put down the phone, and started further work.

…………

At the headquarters of Xuanne Company, after Tang Xinyu put down the phone, he quickly left the office, went to the network department, found Gu Wolf, who was monitoring every move on the server, and conveyed Xiao Yuan's instructions to him.

Xiao Yuan asked Gu Wolf to allocate enough bandwidth to a computer, and then prepared to receive the video data uploaded back by Xiao Yuan from the other party's computer, this job was very simple, and soon Gu Wolf was ready, and then called Xiao Yuan and told Xiao Yuan the IP of the computer he had prepared.

After hanging up the phone, Gu Wolf opened the video receiving software, and together with Tang Xinyu and other employees of the network department, waiting for the arrival of the video data, they were a little curious at the moment, but more nervous, because the video sent back by Xiao Yuan would not appear the evidence they wanted, before the video arrived, no one could be sure, Xiao Yuan himself couldn't, Gu Wolf and Tang Xinyu couldn't either.

After waiting for a few minutes, the playback window on the video receiving software flashed, the video data stream arrived, everyone raised their hearts to their throats at this time, and the network department was quiet only the sound of people's breathing, and the occasional sound of swallowing saliva because of nervousness.

“oh…… ah……,eon…… myjesus,damn……”

A burst of heavy breathing and a man's roar rang out in the computer speakers, breaking the silence and tension of the network department.

Everyone's eyes widened instantly, and the visual and auditory stimulation brought to them by the two men who were interacting fiercely in the playback window was so great that everyone, including Gu Wolf and Tang Xinyu, instantly forgot what they were waiting for.

ps: It's time for the sentiment, do you have a ticket, haha......