HK303 Trap to pit others!

PS: Painful, sad! Our "Hacker" was actually squeezed out of the best-selling list, I implore everyone to support and subscribe to "Hacker", give Makuyama a little affirmation, and also give Makuyama a little support! According to the calculation of 4 chapters a day, the junior VIP calculation, only needs three cents and six cents a day, this is the survival of Makuyama, thank you! Monthly passes and tips, clicks and recommendations, are also support for Makuyama!.

Shi Lei had just drawn the SO meter on the enterprise-level fixed broiler and retrieved the local disk of the No. 1 server. The overall package of the reconstituted SO plan was about to be opened, and the Endless Defense sounded the alarm.

Clicking on the log record of Endless Defense, Shi Lei's face changed suddenly!

The package of documents planned by the SO project automatically recorded the IP address of Server No. 1 and attempted to transmit information to the International Intelligence Bureau of the Ministry of Foreign Affairs.

If there is no Endless Defense to prevent this message from being sent out, then JFS will be able to know the real IP address of Shi Lei in an instant.

And without Shi Lei's knowledge, he knew Shi Lei's real IP address!

Knowing Shi Lei's real IP address, what the International Intelligence Bureau of the Ministry of Foreign Affairs can do, it will make Shi Lei cool to death. They don't hack into the IP address directly, not even probe.

They will only query this IP address, which corresponds to the actual geographical location.

There is no doubt that from the IP address, you can really find out the actual specific address. Although IP addresses are dynamically assigned, for example, the IP address used today and the IP address used tomorrow may not be the same.

But can't you find out the dynamic allocation?

The idea is naΓ―ve!

To use network services, you need to have a physical access to the network, that is, a network cable connection. With a network cable connection, on the Internet service provider's side, a record will be generated.

The network cable is physically present. No matter how good your hacking skills are, it's impossible to hack all the network cables, right?

The line where the entity exists, on the side of the network server, will have a number record. For example, Shi Lei's network service in Jingyayuan, access the service through the physical network cable, the network service provider will assign an IP address to this line, if someone knows this IP address, and hacked into the network service provider, you can find this IP address through the IP address. Which line is assigned exactly.

From the number of this line, you can find out Shi Lei's real address in the line number record!

Even if Shi Lei hacked into the network service provider and modified this information, it would not be really insured. Because the line installs these materials. Not just electronic records, but also paper records.

Jing Ya Yuan at the time of the introduction of network service providers. When the network service provider allocates each line. A written record will be made.

Therefore, Shi Lei hacked the record information of the network service provider, if someone really wants to investigate, as long as there is a relationship with the network service provider, you can query the written record, then Shi Lei will be a tragedy!

As for speaking of wireless Internet access. That's even less reliable. Wireless signals have positioning characteristics, and wireless Internet access is easier to track than wired Internet access!

Shi Lei was shocked into a cold sweat by the SO plan, but fortunately there was endless defense. Otherwise, this is the rhythm that will be caught by the International Intelligence Agency of the Ministry of Foreign Affairs!

Fortunately, when Shi Lei sent the SO plan back, he used the disorder file segmentation technique to split the SO plan into more than 100 copies and transferred them to multiple broilers to retrieve the local server No. 1, and also eliminated the IP connection record. Otherwise, in the point-to-point transmission just now, the IP address of the No. 1 server will probably be exposed!

'Damn the International Intelligence Agency of the Ministry of Foreign Affairs, do all these insidious setups!' Fortunately, brother is cautious, otherwise he will be yin by you again! Shi Lei was secretly happy in his heart.

There is a problem with the SO plan document package, which confirms the suspicion that Shi Lei easily entered the confidential information server inside JFS before.

It turned out that it seemed to be defenseless and smoothly entered the confidential information server, but in fact, it had fallen into the trap of JFS.

JFS security experts devised a trap when they suspected that someone had entered the JFS internal network.

Shi Lei was unfortunately hit!

The only thing to be thankful for is that Shi Lei did not completely fall into the trap, although he was yin, but his real IP address was not detected.

This is a blessing in disguise!

In Shi Lei's mind, after some analysis, he was no longer in a hurry to open the SO plan file package. What can be easily taken away by him is probably not a good thing.

There may even be a follow-up.

In order to study the SO planning package, Shi Lei set up a sandbox environment. Any changes in the sandbox environment have no effect on the system itself.

The sandbox environment has been widely used in the field of anti-virus and anti-Trojan security.

was setting up a sandbox environment, Shi Lei suddenly stopped, and it should be very powerful to be able to make the International Intelligence Bureau of the Ministry of Foreign Affairs so relieved and bold!

Stopping the establishment of a sandbox environment, Shi Lei divided the SO plan into more than 100 parts again and sent it to a fixed broiler. At the same time, Shi Lei also fixed the broiler and copied the endless defense.

On the fixed broiler server, Shi Lei began to establish a sandbox environment. In case there is any big problem in the SO plan, it can also be borne by the fixed broiler.

After establishing the sandbox environment, Shi Lei decompressed the SO plan file package. The SO plan is a document package and is not password protected, which is expected by Shi Lei.

When the SO plan was decompressing the file package, through endless defense, Shi Lei immediately found that the CPU usage of the broiler server had increased sharply.

The files that are decompressed from the SO plan package all start to run automatically, consuming the CPU resources of the broiler server and constantly sending information outward.

Not only that, but these auto-running files are duplicating themselves in large numbers, flooding the sandbox environment in an attempt to crash it.

Endless Defense blocks the destruction of the sandbox environment by these auto-running files.

Shi Lei analyzed these files and found that most of the files were malicious computer viruses, and a small number of files were system backdoors. There are also log files that scan the computer for things like account numbers and passwords, and then send it back to JFS.

In front of the No. 1 server, Shi Lei snorted coldly.

'International Intelligence Service of the Ministry of Foreign Affairs, you are really insidious! Shi Lei despised JFS in his heart, and then in the fixed broiler, he completely deleted the SO meter, and cleaned up the sandbox environment and endless defense.

The SO plan obtained from the International Intelligence Bureau of the Ministry of Foreign Affairs was obviously an empty shell trap, and Shi Lei was faintly depressed. Meantime. He was even more curious about what that SO plan was.

Shi Lei, who was in an unhappy mood, came to the Internet world of Wosang Country again, ready to play a game of police chasing thieves with JFS. Shi Lei is of course playing the role of a cyber thief, while JFS plays the role of a cyber policeman.

After coming to the network of the country of Vosang. Shi Lei first probed the JFS internal network. Self-implanted system backdoor. Shi Lei found the back door of the system. It still existed, which made him very suspicious.

JFS security experts, the first time they didn't find the backdoor of the system, Shi Lei would not have doubted it. But the SO plan has such a sinister setting, Shi Lei is sure that the fixed broiler who receives the SO plan. It must have been known to the International Intelligence Bureau of the Ministry of Foreign Affairs. Since he even knows about the broiler server, if he doesn't know the backdoor of the system, Shi Lei really doesn't believe it.

Since the International Intelligence Bureau of the Ministry of Foreign Affairs has already learned about the backdoor of the system implanted by Shi Lei. And they didn't clear it, obviously trying to lure hackers in again, and then come to an urn to catch turtles!

The guys from the International Intelligence Agency of the Ministry of Foreign Affairs are really insidious!

After guessing JFS's insidious intentions, Shi Lei naturally couldn't be fooled. As usual, Shi Lei logged on to the official website of NHK TV to check if there was any latest news.

On the official website of NHK Television, a large headline in red highlights a huge news headline.

"The International Intelligence Agency of the Ministry of Foreign Affairs easily suppressed Mr. M's offensive and successfully rescued the Tokyo Metropolitan Police Department"

Looking at this title, Shi Lei couldn't laugh or cry. NHK TV likes to pull the bias as always, obviously Shi Lei did not confront JFS, leaving only a small botnet to delay and stop the International Intelligence Agency of the Ministry of Foreign Affairs.

But in the mouth of NHK TV, it became JFS that hit Mr. M hard and beat Mr. M back and forth. How shameless does this have to be to write a press release?

Shi Lei read through the whole text and couldn't help laughing. Suddenly, at the end of the article, he noticed something strange.

β€˜β€¦β€¦ Looking for Mr. M, there is a need for cooperation. ’

This short paragraph of text is obviously not the original text of the NHK TV news release, but someone should have added it later. Shi Lei immediately hacked into the web server of the official website of NHK TV, looked up this text in the web server, and added the IP record of the entry.

It took a few minutes to find the record, and after clearing the record, Shi Lei controlled the broiler and tracked it according to the IP address.

After tracking the past according to the IP address, Shi Lei had just entered the other party's server, and the other party immediately sent a message.

'Hello, Mr. M! ’

There is no signature, no mark, just a simple greeting, and it is in Xia Chinese script!

Shi Lei quickly investigated in the server and found that there were more than ten connections in total, and he secretly moved in his heart: "Could it be the Night Dynasty?" ’

'Who are you?' What's the matter with me? ’

Shi Lei also uses the Xia Guowen script, which one of the top hackers does not speak more Chinese in the circle?

It was the dark night of the Dark Night Dynasty who came into contact with Shi Lei, and he accepted the advice of the code name D to seek the help of Mr. M.

'Mr. M, you have a grudge against JFS, right?' We also have a grudge against JFS! In the words of Xia Guo, we have a common enemy, and we can cooperate! ’

Shi Lei was curious about what the guy from the Night Dynasty wanted to do, and the other party used Xia Guo to test himself, Shi Lei didn't plan to expose it, so he asked.

'How to cooperate?' What do you want to do? I still have some good feelings for you Xia Guo. ’

Seeing Shi Lei denying that he was from Xia Guo in the dark night, there was a trace of regret in his heart.

'Mr. M, do you have any system vulnerabilities that can enter the JFS internal network?' We're going to get into the JFS intranet and mess around with it! ’.

(To be continued.) )