Chapter 10 Tracking Hackers
Li Chunfeng's mind moved, so he mobilized the kamikaze 1.0 to scan towards the hidden hole.
The information was quickly fed back, and the hidden hole turned out to be a preset backdoor, apparently a hacker had come to the company's portal.
And reserve a back door here for next time.
Although Li Chunfeng is not very clear about the world of hackers, after all, he has been doing application software development for a long time.
But since I am a programmer, of course, I have a feeling of yearning for hackers who dominate the Internet.
I also know a little bit about some basic hacking methods.
At this moment, Li Chunfeng never expected that the backdoor reserved after the hacker invasion that he often said would be in such a form in his current opinion.
In a dumb smile, Li Chunfeng quickly analyzed some of the information hidden in the small black hole, and there was an information monitoring feedback address among them.
That is, this backdoor not only serves as a safe channel for the next incursion, but also monitors the status of the server and feeds back the status of the server.
Li Chunfeng couldn't help but be a little eager to try, because through this feedback address, if he tracked down, he might be able to find out which hacker left this backdoor.
Li Chunfeng checked his status again, after all, he had just occupied a new server and had not yet fully adapted to the new environment.
At this moment, your mind quickly scans the entire space, whether it is CPU, memory, hard disk, motherboard, optical drive, network port, printing port, USB entrance and other hardware devices, or firewalls, anti-virus and other security software, and even the operating system, all of which are quickly scanned and detected.
Li Chunfeng found that his scanning speed exceeded that of the previous time on the public server, not only because of the hardware improvement, but also because of the improvement in the software obtained from the virus after devouring the virus.
When Li Chunfeng confirmed that he was fine now, the most powerful moment since his consciousness reappeared, he immediately launched a tracking operation.
The kamikaze 2.0 emitted by Li Chunfeng passed through the network channel at the speed of light, heading towards that address.
The channel of the Internet is still very different from the channel of the company's intranet, and from time to time Li Chunfeng can find through the kamikaze 2.0 that the channel has become a small road.
There have even been cases where many packets have been clogged.
Obviously, the network bandwidth in many parts of the Internet is not as large as expected, and of course those trunk lines are much better, but the amount of data is also much larger.
Li Chunfeng immediately discovered his new ability, and his kamikaze 2.0 could actually penetrate those information packets.
Not even a single byte of information is lost in the process.
This is a god-like ability, which means that on the Internet, Li Chunfeng does not have to worry about being clogged up in a certain place by a large amount of data.
His kamikaze 2.0 will always be able to travel at top speed, meaning it will be much faster than anyone else.
It didn't take long for Li Chunfeng to sense that kamikaze 2.0 had come to a server, and kamikaze 2.0 immediately began to multiply and replicate, and used this server as a node to infiltrate and spread.
At this moment, Li Chunfeng didn't know that this move would bring him great help in the future.
Kamikaze 2.0 quickly scans the server and feeds back some useful information, which is surprisingly fast, almost in real-time synchronization.
Li Chunfeng found that this server should be the "broiler" set up by the hacker (usually the computer that hackers hack and can control at will is called a broiler).
It seems that hackers are using broilers as a springboard to prevent people from directly tracing the IP address of the machine and thus being found and exposed.
Li Chunfeng didn't sigh too much, sensing that kamikaze 2.0 had taken over the computer, and sure enough, he found another hidden small black hole back door and found a new address from it.
Li Chunfeng then commanded the newly copied kamikaze 2.0 to track down the new address.
After about 20 minutes, Li Chunfeng sensed that Kamikaze 2.0 had gone from Huaxia to country M, from country M to country R, from country R to country A, from country A to country Y, country F and country D and country E, and finally back to country M.
During this period, he kept going around in circles, and in several servers, Li Chunfeng found that there was more than one backdoor hidden, and apparently these servers were set up by several hackers as their own broilers.
These were all recorded by Li Chunfeng, and through the comparison of different hidden back doors, Li Chunfeng found that each one was different and had its own special code segment.
So they were all recorded by Li Chunfeng as feature markers, so that they will definitely be encountered on the Internet in the future, and they can be identified accordingly at that time.
Otherwise, in the vast Internet, you have repeatedly encountered a hacker, how do you know if it is the same or different?
According to this characteristic marker, Li Chunfeng always stared at the hacker he was tracking at the beginning.
And in this process, Li Chunfeng has unconsciously spread his kamikaze 2.0 on the Internet.
After another minute, Li Chunfeng found that the hacker's trail had returned to Huaxia, and then locked it on a computer in Haidu.
The computer had multimedia peripherals, and Li Chunfeng quickly controlled the computer through kamikaze 2.0, and then saw a young man with dyed yellow hair from the camera, who was no more than fifteen or sixteen years old.
is smoking a cigarette and chatting with someone on the computer.
Li Chunfeng couldn't help frowning, and immediately thought that his action was meaningless, and couldn't help but secretly complain about his soul form.
Looking at this little yellow hair, I thought to myself that this guy is only afraid that he is not the hacker.
With the copied kamikaze 2.0, all the nearby computers were quickly controlled, so that Li Chunfeng quickly understood that this was an Internet café.
Apparently, the hacker used to surf the Internet through this Internet café, and then connected to his own broiler, and through a series of springboards, hacked into the company's website server, and set up a backdoor.
The hacker is expected to hack the company again, but not necessarily from the computer in this Internet café.
Li Chunfeng was a little disappointed, after all, he was hopefully trying to track down a hacker, so he could have a fight. Look at your current form, and what kind of sparks will collide in the face of hackers.
Subsequently, I was also a little comforted, I felt that kamikaze 2.0 was going around in circles on the whole network, and I really saw a number of hackers, and their methods of setting up backdoors were also eye-opening.
After perceiving the exit from the computer in this Internet café, Li Chunfeng did not directly withdraw his attention to the thread.
Judging from the methods of these hackers, it is obvious that attacking and retreating, they are through countless springboards, so this is also a practice that they can learn.
The kamikaze 2.0 clone seems to have a great advantage in the Internet due to its own mind as an outer package, and it is difficult for other hackers to detect it.
It's always good to be cautious, though.
Li Chunfeng mobilized a kamikaze 2.0 clone to go around the domestic Internet, sometimes passing through some computers or servers that were already hidden and controlled by his kamikaze 2.0.
By the way, it will be checked that these kamikaze 2.0 are hidden enough to leave no traces.
Sometimes, when a new computer or server is discovered, it will also stop and proliferate a new kamikaze 2.0 to scan and occupy it.
In this process, he also saw a lot of domestic hackers' broilers, so his list of hacker characteristics became longer and longer.
Suddenly, a familiar feature appeared again, and it turned out to be the hacker who had tracked the entire Internet.
This broiler is not in the previous path!
Then Li Chunfeng did not hesitate to command the kamikaze 2.0 and follow the address left in this new clue.
In just two minutes, Li Chunfeng sensed that kamikaze 2.0 had tracked more than a hundred computers, and finally locked on an IP address in Haidu City again.
Li Chunfeng then manipulated kamikaze 2.0 to enter and take possession of the computer.
This is a laptop, Li Chunfeng is happy in his heart, it is very likely that it is used by the hacker himself.
With the scanning of kamikaze 2.0, the information and related data of this computer were quickly collected and fed back to Li Chunfeng.
The flow of information is flowing at the speed of light.
At this time, there is no one on the other side of the camera, the computer is on, and the person is not there. However, judging from the room layout, it should be a hotel room.
Li Chunfeng quickly found out from the feedback that the owner of this computer should be called Deng Ling'er, and there are some photos in the computer.
Li Chunfeng looked at the girl in the photo with some disappointment, melon seed face, big eyes, wheat-colored skin, about 1.60 tall, about 20 years old, and a ponytail.
Such a little girl who looks harmless to humans and animals may not be the hacker.