Chapter 45 Backdoors on Hacking Software

PS: Look at the exclusive story behind "Genius City", listen to more of your suggestions for the novel, pay attention to the official account of Biquge www.biquge.info Chinese (add friends on WeChat - add an official account - enter ddxiaoshuo), and quietly tell me!

(Thank you for the support of the book friend "Crazy Fifth Brother" and "Tears in the Wind"!) Take a bow! Today's three watches! In the new week, Weiyu Xiaoxiao urgently needs everyone's support, and those who have recommended votes must vote for this book! I bow to you with a smile! οΌ‰

Li Ranzhu frowned and looked at the message sent by Chen Mo, and after reading it for a while, she typed: "Don't mention this first, let's come to class." ”

After thinking about it, Li Ranzhu decided to observe the situation first, although she had said that she wanted to cheat Chen Mo of his money, but when the real thing came to an end, Li Ranzhu suddenly hesitated again, she felt that anyway, the money had already arrived, and she at least had to make a show, after all, it was not so good to really be a liar.

Chen Mo couldn't help but breathe a sigh of relief when he saw the message she sent, only to see him type: "Please ask the beautiful master to speak, the apprentice must study carefully." ”

Immediately after that, Li Ranzhu began to talk about some relatively simple hacking techniques, Chen Mo had seen a lot of posts about hackers before, and he basically had an impression of these aspects, at this moment Li Ranzhu came one by one, and suddenly Chen Mo had a feeling of enlightenment, the more he watched, the more fascinated he became, and many of the questions that puzzled him before were all solved.

Li Ranzhu seems to have a great talent for being a teacher, her teaching is orderly, meticulous, logical and rigorous, and her thinking is meticulous, which shows that her hacking skills are still very solid.

Chen Mo studied very hard, and from time to time he would ask some questions that he didn't know much about, Li Ranzhu knew everything, and the two formed a very wonderful tacit understanding, and the teaching process was very smooth.

After two hours, Li Ranzhu stopped, only to see her typing: "It's already eleven o'clock, today's teaching is over, let's start again at nine o'clock tomorrow night, I'll send you a few links, you download the above hacking software, and you can use it directly in the future." ”

Although Chen Mo has a feeling of unfinished, but it is indeed late now, even if his spirit is very good, the beautiful master will not be able to bear it, after seeing the news sent by Li Ranzhu, Chen Mo replied: "Okay, then let's see you at nine o'clock tomorrow night, I wish the beautiful master a good dream." ”

Li Ranzhu closed the dialog box, and then she frowned and said: "The liar apprentice is still quite serious about learning, it seems that he really doesn't know much about hacking techniques, but why was he able to resist my attack for half an hour when he was testing before?" Odd...... It's weird......"

Li Ranzhu naturally didn't know that Chen Mo only knew how to defend, his basic computer knowledge was very solid, it was precisely because of this that he could withstand Li Ranzhu's attack, if Li Ranzhu let Chen Mo take the initiative to attack at that time, maybe she wouldn't think Chen Mo was a master.

Chen Mo clicked on the link sent by the beautiful master, and then began to download the hacking software. The Internet speed of this villa is still quite fast, at least more than 20 times faster than the Internet speed in Brother Li's computer store, Chen Mo only took five minutes to download several hacking software, and then he began to happily try to use these hacking software to make some small things, wanting to see how effective these software are.

As a result, Chen Mo found a small problem when he was doing the real yΓ n, which came from a Trojan horse program. Chen Mo found that when he was using this Trojan program, a small icon would automatically be generated in the folder where the Trojan program was stored, which showed the delivery time and delivery address of the Trojan program.

If it's just these contents, Chen Mo naturally won't find any problems, the key to the problem is that he didn't turn off the URL that downloaded this Trojan program, and when the small icon is generated in the result, the URL that provides the Trojan program will be automatically buffered, in this case, Chen Mo can know at a glance: There is an abnormal situation on his computer.

This discovery was very accidental, Chen Mo was using hacker software for the first time, so his attention was very focused, he wanted to see what hacker software really worked, so that he could see any changes on the computer screen. After discovering this extremely subtle change, Chen Mo did not ignore it, but immediately began to study it.

The beautiful master told him before that the most basic element of hacking is not to let go of any suspicious point, especially when you use hacking technology to invade other people's computers, even if it is just a little carelessness, it will cause very strict consequences.

Chen Mo feels that this sentence is very reasonable, hackers can't see the light in the first place, what you do is not allowed by the law, if you are not careful enough, you may be bitten by the other party, and your real IP is very likely to be leaked at that time. For a hacker, once the real address is known, it means that bad luck can befall you at any time, which is not a good feeling!

Chen Mo was based on the teachings of the beautiful master, so he did not ignore the handling of this very subtle anomaly, Chen Mo checked it, and soon found that his computer sent a number of jΓΉ streams to this website, he frowned and whispered: "I obviously didn't do this operation just now, but the computer automatically visited this website, can it be said that my computer has been hacked?" ”

Something you didn't do happens if you're not a fool to understand that there's something wrong with it, and for hackers, there's only one explanation for it: your computer isn't secure anymore!

Chen Mo quickly understood, he immediately stopped the release of the Trojan virus, and clicked on the Trojan virus to check it carefully.

Chen Mo started from the Trojan virus itself to analyze the code of the Trojan virus, and after a short time, his face changed: "This software actually has a backdoor!" ”

After inspection, Chen Mo found that the code of the Trojan program had a backdoor program! The main purpose of this program is to record and store all kinds of information on the computer infected by the Trojan virus in the user's computer, which is also the main working principle of the Trojan virus.

However, this program has a small piece of code added to it, and the purpose of this code is very unsettling, it actually sends the information of the person who uses the Trojan virus to the website where the Trojan virus is downloaded!

What does this mean? Explain that the person who released this Trojan software is collecting information about the user! Who would use this Trojan in general? The answer is hackers, so the intentions of the publishers of Trojan software are very intriguing!

Obviously, the person who can write this kind of Trojan software must also be a hacker, he takes out his results under the guise of resource sharing for the majority of hackers to use for free, but secretly this guy is collecting information about hackers in a very covert way, and this guy's courage is really not ordinary! Or that his plan must be extraordinary! (A good event for pie in the sky, cool mobile phones are waiting for you!) Follow from ~ Dian/Chinese network public account (WeChat add friends - add public account - enter ddxiaoshuo), participate now! Everyone has a prize, now pay attention to ddxiaoshuo WeChat public account! οΌ‰