Chapter 40: Siege and Interception
Now that he has found a feasible way, Feng Xiaotian naturally won't wait stupidly, he immediately took action.
Compared with this supercomputer, it is much easier to deal with other computers in the local area network, Feng Xiaotian randomly chose a computer and began to try to control it, his method is quite simple, directly using the vulnerability of the computer processing system as a breakthrough to modify the execution program of this computer.
The processing system of this computer is a strengthened version of Windows 3.0, that is, an upgraded version in the popular sense, although the upgraded version of Windows 3.0 has fixed many system vulnerabilities, but if you want to fix all of them without falling, it is obviously impossible, Feng Xiaotian has mastered this system as many as 13 vulnerabilities, just a little try, he has verified that a vulnerability he found still exists, and then he passed this vulnerability, secretly infiltrated the core program of the computer.
Just when he was about to modify the core program of this computer, something happened to Feng Xiaotian who was very surprised: he was actually kicked out of this computer in an instant, what is the situation?
Before Feng Xiaotian could figure out this problem, he himself was attacked by two other data streams, and then Feng Xiaotian completely understood: Oh, it turns out that there are masters guarding here.
Those two streams of data are Satan and Angel, the two found out about Feng Xiaotian's intentions, and immediately followed him, when Feng Xiaotian sneaked into the computer, they took the first step to modify the relevant programs of the computer, and immediately kicked Feng Xiaotian out of the computer, and then the two launched an attack on Feng Xiaotian.
In the face of the attack of the two data streams, Feng Xiaotian did not panic at all, he had already used an unknown number of springboards when he participated in the hacker competition, so that it was not so easy for others to track down his real IP, after Satan and Angel attacked, Feng Xiaotian even had time to change his IP address again, and changed it three times in a row.
Feng Xiaotian does this for a reason, if you want to attack a target on the Internet, you have to find it first, how to find it? The answer lies in IP, IP is actually the target, any individual or group on the network, there is IP, this is an impossible situation, Feng Xiaotian changed his address three times in a row, which made the other party's attack fall in an instant, and then he began to lurk, quietly observing these two data streams, he wanted to see how these two people would find themselves.
Feng Xiaotian was a little joking, but Satan and the angel were a little surprised, of course, they were only a little surprised, and then the two began to act, they began to track Feng Xiaotian's whereabouts through the traces left on the Internet, just a few seconds later, the two found Feng Xiaotian again, this time the two were not careless, they divided their labor, one person was in the back to block, and the other person ran to the front of Feng Xiaotian to intercept.
The three of them are now in the LAN, if you want to stay in the LAN, you have to stay somewhere, this place may be a web page, or a computer, the place where Feng Xiaotian hides is a computer, and he is not surprised to see that the other party found himself so easily, he can also do this, the data on the network will not lie, you pass by somewhere, it will definitely leave residual data traces, Feng Xiaotian did not disguise or clear these data traces just now, The other party was able to find him, and Feng Xiaotian was not surprised at all.
However, the other party's position made him a little solemn, one of these two data streams was blocked at the data output port of this computer, and the other was blocked at the data input port, what did they want to do? Shut down the door and hit the dog? Hehe, I'll play with you!
Feng Xiaotian is also competitive, seeing the other party act like this, he is a little breathless, he feels that the other party is a little contemptuous of himself - do you think you can catch me by blocking the intersection? Is it that simple? I'm not running away now, aren't you trying to catch me? Then I'll just come and get you guys too!
The so-called "catch" here refers to finding the real IP of the other party, once the real IP is exposed, it means that your real address in the real world will also be exposed, what Feng Xiaotian wants to do now is to find the real address of the two - just like he found Troy's real address some time ago.
Feng Xiaotian began to act, he first set the target on the person blocking behind him, as he began to attack, the two sides immediately broke out a full-scale conflict, obviously, the other party has long been prepared, in the face of Feng Xiaotian's attack, this person did not flinch at all, the two of them used this small computer as a battlefield, and began a fierce and cruel fight!
At the same time, the North American Air Defense Command was holding an emergency meeting, which was chaired by Commander Lecce, who only heard him ask with a serious face: "Can anyone tell me what happened with the sirens that sounded just now?" ”
Hearing this, the Minister of Security James replied: "Your Excellency, the alarm was sent by a supercomputer, and a hacker just now sent an access request to the computer, and according to the program we set, any unfamiliar ID sent a data stream to it, and it will call the police at the first time. ”
Commander Lecce originally thought that the siren just now was caused by a threatening missile invading the airspace of the United States, but when he heard James's words at this moment, his hanging heart relaxed slightly, but then, he thought of something, and only heard him say uncertainly: "Another hacker?" James, is this hacker the same one who hacked into my personal computer earlier? ”
James thought for a moment when he heard this, and then said: "Although there is no clear evidence, I think there should be a connection between the two, and it cannot be ruled out that they are the same person." ”
Lecce frowned when he heard this: "What is the security department's plan for handling this matter?" ”
Lecce was not panicked, he felt that it was a fantasy for a single hacker to break into the "fortress" computer, and now he had to consider how to catch this hacker, James naturally understood what Lecce meant, and only heard him say: "Your Excellency, General, I have removed some of the personnel involved in the 'Sky Canopy' plan, they have already taken action against this hacker, and I believe that it will not be long before the results will come out." ”
Lecce nodded when he heard this, and then asked, "James, how is the situation on the other side of the 'Sky Canopy' plan?" Did we take back control of the server? ”
Commander Lecce is still very concerned about this matter, after all, the loss of the server is directly related to him, if he didn't put the password of the server in his personal computer, it is impossible for hackers to succeed.
Lecce felt a little indignant when he thought of this: Damn hackers! After the matter is dealt with, I will definitely submit a bill to Congress so that the FBI can step up its crackdown on them!