Chapter 207: A Group of Sand Sculptures
At this time, what is displayed on the computer screen is a large string of complex codes, constantly flashing.
This is a large number of IP addresses of types A to E of major meat machines, as well as attack packets and source code of some MAC addresses.
61.0.50.0 - 61.4.63.255 Amejian New York
61.4.80.0 - 61.5.80.255 Aramco Solid Wharton
128.210.0.0 - 128.210.255.255 Hankook Seoul
128.211.0.0 - 128.211.255.255 Tokyo of the Rising Sun Empire
.......
At the same time, a large amount of data is constantly leaked, and there is a pale green progress bar on the top, which indicates that the progress has reached 100%.
"Shet, Obo, we made it! Hahaha, sure enough, the firewall set up by those yellow-skinned monkeys is not comparable to our offensive methods. Everyone leaned over there, looked at the data displayed on the screen, and smiled.
"COPY ALL OF THEIR DATABASES, AS WELL AS SYSTEM LOG FILES OR WHATEVER, GOGOGO, GUYS, WE'RE GOING TO MAKE A LOT OF MONEY THIS TIME!"
"Tsk, I really don't know what important information that game company has, and it actually asked the senior management to come forward in person, but whatever, 30 million US dollars, I can earn it now."
Soon, everyone was happily discussing what you said and what I said.
At this time, Oubo quickly entered a CD command, which can directly enter the target system database, so as to modify the key in it to get the information he wants.
The general idea is to use the cd command to approach the C:\Windwos\system32 subdirectory and change the administrator password in it.
In the "Command Prompt (cmd)" window, enter the cd c:\ command, press the Enter key, and then switch the directory to the root directory of the C drive administrator, and then enter cd Windows\system32 to successfully invade.
Step 2: During the gap period when the opponent's firewall is compromised, enter the dir command.
The purpose of this DIR command is to list all or specified file directories on the disk, including volume label, file name, file size, file creation date and time, directory name, disk space, etc.
Type dir and press Enter
Achievement:
Root Files:
Heavy Nuclear Fusion Technology. Doxc, file size 1028MB, generation date: 2020.4.27.
"Hey, what we're looking for seems to be this document, get this document over first, and then copy their database."
A sharp-eyed hacker standing on the side quickly saw the file name displayed on the Obo screen and immediately spoke.
"I know, I don't need you to say more." Ou Bo gave him a blank look, and soon established a direct connection between their organization and Datang Technology.
They can choose to use the meat machine to jump layer by layer, and then hide their IP address and MAC address range as much as possible, so as to achieve the purpose of coming and going without a trace.
It's just that this is risky, after all, one more jump of the meat machine will slow down the speed of a network, and the jump of the meat machine layer by layer, at least 5000+ jump channels or more, in order to achieve the effect of stealth.
However, in this case, the network transmission will be 5,000 times slower, if the network speed on the meat machine's side is fast, it is okay, if the network speed is slow, their side will also be slow.
So the most hidden is the most unsafe, after all, the other party's firewall can be repaired at any time, and then directly delete all the information that has not been sent, or through special means, the files that are still in transit in the meat machine will be recovered.
The way they send it is to split a file into 204 copies equally, as if it is compressed in separate volumes, and then forward it to their original server at the same time, so as long as there is a small file problem, then the whole file will be garbled.
Oubo directly entered a ping command and a netstat command.
The Ping command is a command under Windows, Unix, and Linux systems, which belongs to a communication protocol and is part of the TCP/IP protocol.
Netstat is a console command that is a very useful tool for monitoring TCP/IP networks, which can display the routing table, the actual network connection, and the status of each network interface device.
Netstat is used to display statistics related to IP, TCP, UDP, and ICMP protocols, and is generally used to verify the network connection of each port of the machine.
Soon, a point-to-point communication link appeared on the computer screen, and a progress bar appeared.
"The line was set up successfully, hey guys, you guys need to hurry up too, I just looked up the information from their system logs, and it will take two minutes for their firewall to restart." Ou Bo looked at the progress bar displayed on the computer screen, and he was also relieved.
It only takes 30 seconds at most, and the point-to-point transfer can be completed directly, and soon they can ask Amejian for 30 million US dollars with this information document.
At the same time, if time permits, they can also directly copy a copy of Datang Technology's data database, so as to threaten Datang Technology to hand over a large amount of data to get this data back.
After all, in their eyes, Datang Technology is an excellent game company, and the core code of the game can be said to be uncracked so far, even their top hacker team has no problem with this code.
Therefore, if they can ask Datang Technology for a large ransom, their income will definitely increase a lot, and even if they can't get it, they won't lose at all.
Even if you sell this data to other game companies, you can get a lot of money.
"Hey, hey, Obo, their stupid firewall has a worse IQ than my stupid cat, and this code of mine can directly shut down their firewall for a minute." And Viohm also spoke at this time.
He quickly opened the cmd command line, typed shutdown -s -t 60, and soon a line of words appeared on the computer screen.
[The firewall system of the other party will be shut down in 60 seconds.] 】
Because firewalls generally have power backup and BIOS undead systems, they are generally directly restarted and restored after being intrused.
So this code can directly drag the firewall for a minute.
....
Meanwhile.
Datang Technology, inside the quantum computer matrix.
In a bunch of data streams, Yuan also sneered when he watched the other party's hackers' operations.
"A bunch of stupid dicks."