No. 402 Hacker Training
The 402nd hacker is a good idea
and peeping at the deleted and undeleted chat records of the chat software, Sheng Jinhuan's image in Jiang Wenchen's heart plummeted. It turned out that Sheng Jinhuan had always regarded Jiang Wenchen as one of the candidates for the spare tire, and Sheng Jinhuan refused Jiang Wenchen's pursuit but often gladly accepted Jiang Wenchen's affection, all in order to hang the spare tire and leave a final way out.
In fact, as early as high school, Sheng Jinhuan secretly hooked up with many classmates from wealthy families.
Even, Zhai Wuhao is also Sheng Jinhuan's alternative. At this moment, Sheng Jinhuan actually has a boyfriend who is studying abroad, but Sheng Jinhuan used various excuses to persuade her boyfriend not to officially disclose their relationship. Sheng Jinhuan kept her boyfriend with an underground romance while continuing to hunt for better targets on a large scale, and Zhai Wuhao was one of the alternatives for her to deliberately use Meng Haiyong as a pedal to hunt.
Jiang Wenchen, who was shocked by the cruel facts, was dumbfounded.
Goddess, it turned out to be a green tea.
Jiang Wenchen was suddenly very, very grateful for this second-hand laptop. If it weren't for the accidental invasion of Sheng Jinhuan's laptop, Jiang Wenchen would never have imagined that she would be such a woman with a pure and lovely appearance. Seeing Sheng Jinhuan's ugly face hidden in the dark, how much Jiang Wenchen once loved her, and how much he hates her now.
Jiang Wenchen's concept of love has changed dramatically in a very short period of time.
At this time, it was less than a day before Jiang Wenchen got a second-hand laptop.
……
Everything about Jiang Wenchen is in Wei Dongsheng's eyes.
In fact, there are no profiteers at all, and the second-hand laptop is a gold finger deliberately given to Jiang Wenchen by Wei Dongsheng. The 143 hacking utilities, including communication monitoring software, were also collected by Wei Dongsheng from other hacker groups or improved by himself in combination with computer intelligent life systems.
At this moment, Wei Dongsheng's attention is all focused on the construction of the quantum fluctuation circle. Wei Dongsheng does not want political forces such as the Chinese Cabinet and the NATO bloc to interfere with the quantum fluctuation circle project, in order to ensure that they have no time to contain Wei Dongsheng during this time, the chess pieces represented by Jiang Wenchen need to keep making trouble and divert the attention of the bigwigs.
Jiang Wenchen's dark chess is positioned as a righteous hacker.
Wei Dongsheng secretly observed Jiang Wenchen for several years, and knew that although this person was often foolishly deliberately deceived by Sheng Jinhuan and others, he had the courage to wave a knife at the strong man and the righteous insistence on not compromising with the darkness. Just like now, Jiang Wenchen has obtained countless super hacking tools, which can easily hack into the campus LAN of Panmen University and Panmen Institute of Science and Technology, and the lethality is very terrifying. However, in addition to deliberately peeping at Sheng Jinhuan's laptop because of emotional obsession, he would rather save money through frugality and hard work than use gold fingers to illegally obtain personal gains.
Of course, such an insistence on justice is by no means the justice hacker that Wei Dongsheng wants.
Wei Dongsheng immediately began to systematically interfere with Jiang Wenchen's life trajectory. The next week, Wei Dongsheng deliberately hacked into the computers of Jiang Wenchen's dormitory classmates, disguising roommate A's computer as a Trojan horse, and making roommate C's computer disguise as a virus, guiding Jiang Wenchen to start practicing the basic knowledge of network security. At the same time, Wei Dongsheng guided Jiang Wenchen to discover that there was a systematic set of cyber security self-study textbooks under the study directory by controlling Jiang Wenchen's two laptops and smartphones.
In this way, Wei Dongsheng began to urge Jiang Wenchen to learn the basic knowledge of network security.
Whenever Jiang Wenchen was slack, Wei Dongsheng would deliberately create a security incident in his interpersonal circle, forcing Jiang Wenchen to solve the problem while studying. With Wei Dongsheng's almost hand-in-hand teaching, Jiang Wenchen learned very efficiently, and in just two months, he understood the conventional usage and general implementation principles of 143 hacking tools.
felt that Jiang Wenchen had a certain combat effectiveness, and Wei Dongsheng guided him to register an account on the hacking technology forum "Evil Dragon Home" to integrate into the hacker circle.
Dragon Home is a niche professional forum for the hacker community, which is simply divided into five sections: Science, Art, Programming, Security, and Advanced. The science and art sectors are relatively active water areas, with mixed topics and different qualities; The programming section is aimed at all programmers, algorithms, architectures, back-ends, front-ends and even novices can find more or less like-minded people here, and cutting-edge technology posts are one after another; The security section is the essence of the Dragon Home, and it is also the core feature of the Dragon Home that is different from other technical forums, with countless script boys and industry elites active; The advanced section is a screening mechanism, and only when the technical level reaches a certain level will you be invited to join.
Wei Dongsheng left Jiang Wenchen more than ten days to adapt, and immediately started a new training.
However, it was said that Jiang Wenchen grew rapidly in the knowledge of the whale in the Evil Dragon Homeland, and at the same time, he gradually had a sense of belonging, and he posted from time to time to ask netizens in the forum. Wei Dongsheng activated the account that had been prepared for a long time, pretending to have a verbal conflict with Jiang Wenchen in a rebuttal, and then stalking and mocking Jiang Wenchen, playing an Internet troll who does not bite and disgusting people.
As the saying goes, who knows who is who behind the Internet, change the vest and scold people happily.
This is the common situation of forum exchanges, some netizens rely on the Internet to cover up as actors, play his non-existent profession, exaggerate his non-existent wealth, and there is untrustworthy false information everywhere. With the cover of the Internet, the emotions will also be extremely amplified, and the slightest dissatisfaction will be scolded. What's wrong with scolding you, anyway, you don't know who I am, and you can't chase me to the real world anyway.
However, the so-called lack of knowing who is who is all a delusion. For the vast majority of netizens, their Internet addresses and identities are recorded in the files of the relevant departments, and the relevant departments do not come to you because you have not crossed the cordon, just like the police in reality cannot be nothing but frequently disturb you.
Cyber security practitioners are a group of "cyber police" who are not cyber police, although they do not have the right to investigate the private data of netizens, but they have the ability to collect the private data of netizens. As a professional forum for the hacker community, the contradictions in the virtual world of the forum often spread to the real world, especially when the master reduces the dimension and punishes the script boy or the new Ding who is not even as good as the script boy, digging out your real identity every second.
This has nothing to do with personality and temper, it is purely a matter of holding a sharp weapon and killing from the beginning.
Since I have the power to punish you in the real world, why not beat you up in the real world?
With 143 hacking tools that are easy to use for fools, Jiang Wenchen naturally became murderous. After being ridiculed by Wei Dongsheng's vest again, Jiang Wenchen activated hacking tools such as communication monitoring with red eyes and anger, invaded the Evil Dragon Homestead server to obtain administrator permissions, and obtained the IP address when Wei Dongsheng's vest logged in to the forum.
Wei Dongsheng plays a low-level hacker, since he knows a little basic network security knowledge, he will definitely not use the "real IP" to log in to the dragon home. Jiang Wenchen realized that what he had invaded was only a broiler, and immediately slowly linked theory with practice, crossed a broiler and then a broiler, and finally found the real IP address of Wei Dongsheng's vest.
Of course, the so-called real IP address is certainly not real.
143 hacking tools such as communication surveillance originated from Wei Dongsheng's hands, how could he fall in front of a novice like Jiang Wenchen. The real IP address obtained by Jiang Wenchen was not Wei Dongsheng's real IP address, but the real IP address of Wei Dongsheng's vest, and the "real identity" of Wei Dongsheng's horse suit was a member of a small telecom fraud group. Wei Dongsheng deliberately ridiculed and provoked Jiang Wenchen in order to cause a conflict between Jiang Wenchen and the small telecom fraud group, and then use the small telecom fraud group as a whetstone to cultivate Jiang Wenchen.
Everything was ready, and Wei Dongsheng happily admired Jiang Wenchen and the small telecom fraud group's battle of wits and courage.
Wei Dongsheng believed in Jiang Wenchen's righteous attributes.
Jiang Wenchen also did not live up to Wei Dongsheng's trust. Although the invasion of the nest of small telecom fraud groups originated from boring forum quarrels, Jiang Wenchen decided to punish them on behalf of justice when he overheard evidence of the telecom fraud group's unscrupulous evil.
This telecom fraud syndicate is so infuriating.
Perhaps because urban students are well-informed and unable to defraud, this group of fraudsters is shockingly targeting poor rural students who have a weak sense of security because of difficult family conditions. In a case witnessed by Jiang Wenchen, the victim's father, who had no education, was busy working at home and going to the city construction site to work hard, and finally saved enough for the victim's sister and brother to pay for their college tuition. However, this group of telecom fraudsters took advantage of the filial piety mentality of the siblings who were eager to reduce the burden on their parents, bullied the siblings into not understanding the financial aid process, and deceived them of their only hope of life with a clear conscience. If it weren't for Wei Dongsheng indirectly urging Jiang Wenchen to return the money to them in time, the sisters and brothers might have committed suicide in despair.
The more Jiang Wenchen learned about the details of the telecom fraud syndicate's evil deeds, the more angry he felt.
Jiang Wenchen initially thought that reporting the case would smash this telecom fraud group, but who knew that the reality gave him a blow in the face, and the local department actually ignored Jiang Wenchen's report. There are many reasons, for example, Jiang Wenchen reported the case anonymously in a different place; For example, Jiang Wenchen has already returned the money to the victim, and it is inconvenient to file a case; For example, the victims are spread across five provinces and 27 cities, and it is very difficult to investigate and collect evidence; For example, telecommunications fraud syndicates have residents across the Taiwan Strait, and rash actions may affect the country's united front work, and so on.
The reason is very good and realistic, but Jiang Wenchen refuses to accept it.
Since the local authorities were unwilling to take the initiative to arrest them, Jiang Wenchen simply presided over justice himself.
In the summer of 2015, Jiang Wenchen fought with the telecom fraud group in a handover of troops, and played with local departments to coerce public opinion. Since your local departments feel that these small cases are not worth making a fuss about, I will try my best to pierce the veil of harmony and prosperity, expose the information of those poor victims and the rampant nature of the telecom fraud syndicate to all netizens, and let all netizens see whether you should file a case and arrest this group of telecom fraudsters.