SC092 Specific Schemes

A successful hacker requires not only skill, but also a wealth of knowledge, including mathematics, psychology, social engineering, linguistics, and more. Pen % fun % Pavilion www.biquge.info

How do I get an unknown prepaid bearer phone number from a known room number?

It's not difficult!

Nan Lin Guiyi instructed Butler to turn on the independent inductive learning and judgment mode, and then instructed Butler to monitor Qin Yun and notify him immediately if Qin Yun came upstairs.

Of course, if anyone else goes upstairs, they need to be notified as well!

After making preparations, Nanlin Guiyi tapped on the keyboard, and he first lifted the restrictions of the shadow system and entered the real system. Then, in the real system, it is connected to the APCS asynchronous parallel computing system.

Through the computing power of the APCS system, Nanlin Guiyi retrieved the surrounding mobile service base stations, including all the base stations of the five mobile service providers, centered on the Flower Valley Hotel in Ota Ward.

After Nanlin's inspection, eMobile and WILLCOM were excluded. WILLCOM, in particular, has no service base stations nearby at all, and eMobile has borrowed Docomo's base stations.

Therefore, Nanlin Guiyi only needs to detect the base stations of the three major operators of Docomo, Softbank and AU. In fact, in Japan, the three major operators are basically the world, and the other two have their own operational focus.

After Nanlin Guiyi retrieved the base stations of the three major operators, their coverage was displayed through shaded areas of different colors, and the final intersection was naturally the Flower Valley Hotel.

After determining the base station signals of the three major operators, Nanlin Guiyi cut into the guest check-in information record of the Flower Valley Hotel, and listed all the check-in personnel.

Then, based on the identity information of the occupants, the internal networks of the three major operators are returned, and the phone numbers of the occupants are cross-referenced and matched.

Moments later, a total of 79 occupants retrieved the phone numbers of 67 of them, of which 12 were unable to find the phone numbers.

Of the 12 occupants who could not find their phone numbers, three were eMobile users, and the information could not be found in the databases of the three major operators.

Nanlin Guiyi gave up the three eMobile users, only three less, it doesn't matter!

There are only the last nine users left, and the phone number is unknown, although it is still impossible to determine the phone number of Dai Jia, but the next job is already very simple!

The mobile service base station maintains a connection with the mobile phone, and the so-called mobile phone signal is actually the connection signal between the mobile phone and the mobile service base station. To put it simply, if you look at it from the mobile service base station, you can find all the connection information.

With the Flower Valley Hotel as the target scope, the mobile service base stations of the three major operators have access to a total of 79 signals, of which three eMobile users borrowed Docomo's mobile service base stations and are still discovered by Docomo's mobile service base stations.

Because there are nine prepaid bearer accounts, Nanlin Guiyi can't judge which of the nine numbers is wearing armor, he can only test them one by one.

But how do you get the test results?

The answer is simple!

Nanlin Guiyi quickly typed on the keyboard, edited a text script, and asked Butler to simulate a natural language dialogue based on the text script.

Butler's degree of artificial intelligence is indeed very powerful, and Nanlin Guiyi and Butler are in the simulation scene, and they can't even judge that Butler is a computer program.

If Butler is allowed to participate in the Turing test, it will be an easy crushing rhythm!

But Nanlin Guiyi knows that there are many artificial intelligence systems that can pass the Turing test, but none of them participate. After all, when it comes to AI systems, every tech company, every tech giant, has all hidden AI systems.

"Butler, let's get started!" Nanlin Guiyi commanded.

In room 1808 of the Valley of Flowers Hotel, the room phone rang.

Dai Jia was browsing his laptop, and when the guest room phone rang, Dai Jia's face changed slightly, and he looked at the room phone vigilantly, and finally picked up the receiver of the guest room phone.

"Moxie Moxi?" Dai Jia took the initiative.

"Hello sir, do you need room service?" Butler's simulated female voice is very delicate and has a desire to listen. Hope.

"No, you don't!" Dai Jia said directly.

Butler continued, "Sir, we offer a different kind of room service, we can come to the door in person, and the price is fair. If the gentleman is not satisfied after coming to the door, he can also ask for a replacement. ”

Dai Jia understood what Butler meant, he thought about it for a moment, and still asked, "If you are not satisfied, you can replace it?" First of all, I'm very demanding! ”

Having just completed the difficult task of teasing the Kasai Police Department, Dai Jia was very proud and decided to indulge himself. After all, Daigar believed that the Kasai Police Department would not be able to arrest him at all.

Otherwise, how could Dai Jia book a ticket for tomorrow?

"Rest assured, sir, if we arrange a door-to-door service service that you are not satisfied with, you can request a replacement. Sir, do you need a home service service? Butler's simulated coquettish voice asked again.

"What price?" Dai Jia asked rhetorically.

Butler began to explain the wearing of armor, including different ages, different nationalities, different cup sizes, and different prices.

On the other side, when Butler was communicating with Dai Jia, Nanlin Guiyi was not idle, he controlled the mobile service base stations of the three major operators, and sent text messages to nine prepaid anonymous phone numbers in turn.

The content of the SMS is very simple, it is just a standard reminder SMS message from mobile communication service providers, and it does not arouse suspicion.

When Butler's exchange with Dai Jia was close to a minute, Nan Lin Guiyi, who was in the physical evidence technology laboratory of the Kasai Police Department, suddenly smiled.

Because, after Nanlin Guiyi sent a text message again, Butler reminded Nanlin Guiyi that the system had collected the prompt sound of the text message through the telephone receiver in room 1808 of the Flower Valley Hotel.

Wear armor's phone number, OK!

After Nanlin Guiyi determined Dai Jia's phone number, Butler and Dai Jia also ended the exchange, in fact, Butler guided the end, Dai Jia was not satisfied with the price, and hung up the phone.

However, Dai Jia didn't know that when he was talking to Butler, the text message ringtone from his mobile phone had already let Nanlin Guiyi know his mobile phone number.

Nanlin Guiyi only sends a text message to a prepaid bearer number at a time, and as long as Butler collects the text message ringtone, it proves that the number is wearing armor.

"Butler, have you learned this method?" Nanlin Guiyi asked.

————

New book uploads, referral tickets needed, member clicks, favorites, etc., thank you for all your support!

————

Pay attention to the public: Qms5120 to learn more about the behind-the-scenes footage of the works and authors, as well as popularize computer knowledge from time to time.

————