Chapter 660: Despised
Glancing at the tracking results on the notebook, Xiao Yuan decided to help Ning Lan turn on the shadow copy function first, and then pay attention to it, because it would not take long to turn on the shadow copy function.
After entering the startup command of the control terminal and entering the account and password, Xiao Yuan entered the control terminal smoothly and found the shadow agent copy function, Xiao Yuan opened it and withdrew from the control terminal.
"This function is so magical and fun, Ning Lan, thank you, big brother." Ning Lan sent a message to Xiao Yuan.
"Don't thank me, this is your own function, big brother just opened it for you." Xiao Yuan replied.
"Big brother, go get busy, Ning Lan is going to study her shadow function, goodbye." As if she had got a new toy, Ning Lan said hello to Xiao Yuan and stopped talking.
Xiao Yuan smiled and turned his head to look at the other notebook, where the tracking results were still waiting for him to deal with.
The result returned by spyadre is a socket, the so-called socket refers to a binary group composed of an IP address and a port, the port in the socket is 80, which is the default port number of the HTTP protocol, this port is not of great value to Xiao Yuan, most of the computers connected to the Internet will be open, because of this, no matter what operating system, there are very few vulnerabilities on this port, so, hackers invade a computer, generally rarely use this port.
However, with the other party's IP address, Xiao Yuan can use some tools to scan the other party's host, and then obtain the other party's computer operating system, as well as other ports open on the system, and enter the other party's computer from these ports.
Before trying to scan the opponent's computer, Xiao Yuan made some preparations, set up a few springboards for himself, and habitually composed them into a ring logic lock, but after the ring logic lock was formed, he hesitated for a moment, adjusted the strategy of the ring lock, and then began to scan the opponent's computer.
The scan was very smooth, and the smooth greatly exceeded Xiao Yuan's expectations, and the result returned was that the other party was using the Windows system, which is not the point, because the windows98 system is in the hands of the masters, and it can also be sorted out as solid, Unix and Linux may also be full of vulnerabilities in the hands of Yong hands, and the key point that surprised Xiao Yuan is that this windows98 system is almost full of vulnerabilities, and Xiao Yuan hardly uses any tools, I just used the tel tool that came with the system, sent a few commands, and successfully logged in to this computer.
"How so, is this a honeypot?
"Or is it a springboard for the other side?"
“……”
Xiao Yuan quickly retreated from the remote system, and instantly thought of some possibilities based on his own experience, of course, it was not unreasonable for him to think so, because the hacker who could silently hack into his computer, pretend to be an intelligent body, and even steal his data and files, even if the system used was windows98, it would never be what it is now.
"It's also possible that the other party has led Spyadre's tracking to a fork in the road, and if this is the case, the other party is really not simple." Xiao Yuan finally thought of another possibility.
What was the truth, Xiao Yuan felt that he still needed to go into the computer again and take a closer look to see if he could find any clues from it.
So Xiao Yuan logged in to the remote windows98 through tel again, and began to carefully check the system, but the inspection results made him a little disappointed, because he did not find any valuable information from this computer, and even did not install a monitoring software, once he deduced that this computer is not a honeypot.
"If it's not a honeypot, there are only two possibilities left, is this computer a springboard on the way that the other party must pass, or a fork in the road that the other party has guided?"
Xiao Yuan didn't give up, he put the bridge terminal of spyadre on that computer, and then bridged spyadre to that computer, and then started spyadre's automatic discovery function, and let the software track the other party's computer by itself to see what it could track.
Although spyadre has an automatic search function, Xiao Yuan has not used it, but has been using a more accurate and efficient manual tracking exit, and the reason why he used the automatic function this time is because he did not find any abnormal data from the other party's computer, so he wanted to see if there would be any new discoveries when spyadre was automatically executed.
After the software was running, Xiao Yuan didn't wait long, and spyadre returned the initial execution results: suspicious data links were found, did they trace back?
Xiao Yuan's spirit was shocked, this is what he was waiting for, of course he had to choose yes, so Spyadre started the anti-tracking process, and the return result of this tracking was also very smooth, Xiao Yuan scanned the host of that IP address again after getting the result, and the result was still a windows98 system full of vulnerabilities.
"It's most likely a trap on the other side."
After getting such a result again, Xiao Yuan subconsciously made this judgment, because before he invented the ring logic lock, he had also used this method to mislead others, but at that time, in order to confuse the other party, he would deliberately improve the security of these nodes used to confuse the other party, and he believed that the vast majority of hackers would do this if possible when they were anti-tracking, but now this guy left him with some nodes full of loopholes, making him feel the other party's undisguised contempt for himself.
Xiao Yuan didn't feel angry because of the other party's contempt, on the contrary, he was still a little lucky, always paying attention to the opponent and being vigilant is the basic quality that a hacker should have, contempt means underestimating the enemy, and the example of a master losing his halberd in the hands of a script kid because of the light enemy is not uncommon, not to mention that he is not a script kid.
Of course, because he couldn't find the other party, Xiao Yuan felt more disappointed, so he used spyadre to track it down a few times, and when the results were similar to the previous two again, he was ready to give up.
However, just as he was about to undo the springboard by removing the spyadre bridge terminal at the far end, the springboard monitoring terminal on his computer emitted an alarm and someone was trying to crack his springboard.