Chapter 75 Rights Protection Action (2)
After taking out the content of the voice recorder and completely analyzing it in the computer, Tangerine took out the paper on which he shorthanded Chen Yong's narration and entered the relevant content into the computer.
"How can a fraud case involving such a high amount of money not be solved!"
Tachibana Jun, who didn't know what to think, had a smile on his face, and at the same time, he released a cold ice that seemed to be killing intent, making the temperature in the apartment seem to drop by several degrees.
Imagine that Orange enters a very complex URL on the computer's search engine, and after verifying it with the username JZ, he logs in to a special cyberspace with a national map as the interface.
I searched for "Beautiful Baby" in cyberspace and limited the address to Hwaseong, so I was able to search for Beautiful Baby Barber Shop north of Hwashae University very smoothly.
The map of the whole country was also refined into a Hwaseong plan, but compared with the normal Hwaseong plan, there are more complex colorful lines on this map.
And there are constantly light spots moving on the line, coming and going, densely packed, and it definitely doesn't look beautiful.
"Found it."
The corners of the orange man's mouth, which was raised from the keyboard and hugged to his chest, lifted slightly, revealing a stunning smile, his eyes became extremely sharp, and the complex light movements on the computer were reflected in his eyes.
After waiting for a while, I refined to the map around the Beautiful Baby barber shop, and a light point appeared on the location of the Beautiful Baby.
Seeing this scene, Tangerine immediately made a move, his two hands flew on the keyboard, the sound of keyboard tapping was endless, and complex program algorithms were lined up from the top of the screen to the bottom.
Soon, the map showed seven red lines stretching from the perimeter of the barbershop, all connected to the network where the barbershop was transmitting data outward.
Within seconds, a reading progress bar appeared in the center of the screen, reading at a rate of 5% per second.
At this point, the sharp light in the orange orange eyes faded and returned to that bland state.
When the progress bar is read to 100%, a new folder will appear on the desktop of the orange computer, named Beautiful Baby.
Move the cursor and click on this folder, you can see that there are a lot of things in it, including some bills and UnionPay transfer records, as well as the Password (password) used for UnionPay transfers, because these are all copied from the computer in the Beautiful Baby store.
When Beautiful Baby's computer is normally used on the Internet, the code is implanted into the computer, and the information saved on the PC is scanned, filtered, and transmitted, all in one go.
As a hacker, Tangerine has played this method almost seamlessly, and there are only a handful of people who can find traces of Tangerine's actions.
Looking through the bills and transfer records, Tangerine found that the owner of the store actually recorded every recharge amount, and it was recorded in an encrypted file on the PC side.
The amount obtained through WeChat and Alipay transactions is also aggregated and transferred to a CCB account through a PC UnionPay transfer.
With these things, this is ironclad!
Just like Chen Yong said before, not only the students in the past few years, but the Beautiful Baby store began to play this method five years ago, and the students' attitude of swallowing their anger made them more unscrupulous, so that the use of the method became more and more frequent, and finally the East Window incident occurred.
According to statistics, after removing the normal business income, Beautiful Baby's illegal total income has reached more than 350,000, and the number of college students involved has reached more than 2,000, and each transaction has a clear record, including the recharge amount, the student's name, contact number, and recharge time.
"Hehe, that's interesting!"
Tachibana, who found that the actual number was a bit surprising, was even more interested in this matter, and he wanted to know how many tricks the owner of this store had played!
Fingertips back on the keyboard,Orange tangerine once again on the PC side of Beautiful Baby,After parsing the algorithm of the firewall,Successfully infiltrated it,Then crack the PIN code and wireless password of the wireless network router,All the mobile terminals linked by the wireless network are included in the monitoring scope。
In this way, all online information communication behaviors in Beautiful Baby fall under the control of Tangerine.
As long as Orange is willing, it is only a thought to transfer all the money on the bank card bound to the mobile terminal.
However, Tangerine is very clear:
A real hacker is starving to death, and it is impossible to touch the money on the Internet!
Compared with cash, controlling the amount of money existing in the network is more like a pile of data, and there is no sense of substance.
Such a parsing firewall, implanting code to steal information, and monitoring network information are as simple as a common thing for professional hackers, because the entire network system has an extremely fatal vulnerability - network and communication protocols.
When the TCP/IP protocol stack is designed, it only considers the problem of interconnected resource sharing, and does not consider that it cannot solve a large number of security problems from the network at the same time.
For users who lack cyber security knowledge, the code implanted by hackers through relevant links is difficult to remove, or even undetectable, and these people who have stolen information can really be said to "die without knowing how to die"!
This is also the dark place of the current developed network!
……
Analyzing the mobile terminal information that is currently linked to the router signal, Tangerine found a familiar name, the third boss - Jiao Qingfeng.
"He's the one who is talking to Zhan Jian today?"
Because he hadn't seen it, Tangerine could only speculate about the situation at that time.
Think about it, Tangerine Orange did something to Jiao Qingfeng's mobile terminal (mobile phone), intercepted all the information of Jiao Qingfeng's mobile phone through the information reception of the router, and generated a backup in his computer.
"Whew—that's enough!"
Close the login interface, clear all login traces, and Orange Orange brings up the interface of WOE again, and after confirming the second batch of enhanced metals collected, WOE also logs out.
At 10:40 p.m. in the capital, it was not early, and it was time for him to wash up and rest.
The relieved orange orange stretched slightly, and the glasses moved to the floor-to-ceiling window, and the light came in with the light from outside the window, refracting to the side on the orange orange's glasses, leaving a piece of white.
Tangerine, who thought of something, was slightly stunned, but the mobile phone vibrated gently at this time, and a text message came.
I touched my phone and saw that it was a message from Su Yile.
Su Yile: What are you doing?
Tachibana: ?
Su Yile: Don't play stupid on me, I detected abnormal data transmission through the Huahai network, I guess you mobilized part of the network north of Huahai University to launch an attack!
Tachibana: That's right.
Su Yile: What are you doing?
Tachibana: Solve a little thing.
Su Yile: Be careful, this is not a joke.
Tangerine: I will give you a copy of the information at that time, and you can help me spread it, focusing on industry and commerce and public security.
Su Yile: Okay.
Tachibana: The results of the survey?
Su Yile: It will take time.
Tachibana: Contact me with results.
Su Yile: Okay.
At the end of the chat, Su Yile, who rented near Huahai University, frowned fiercely, Tangerine's behavior really made her a little angry, and it was a risk to do so.
However, she forgot one thing when she cared, except for her, there was no second person who could guess that the launch of this cyber attack came from Orange Mandarin!