Chapter 42: The Mystery Man

Li Yi, male, 28 years old, a college dropout majoring in computer science, is currently the head of the "Feitian Assistant" plug-in platform, with an annual income of millions of dollars.

On the Feitian Assistant platform, there are hundreds of plug-ins for commonly used apps on mobile phones.

From games, food delivery, online car-hailing order grabbing software, to video software to advertise, etc., it can be said that everything can be said.

Not only that, Feitian Assistant has also opened up all the links of R&D, sales, and promotion, and created a new aggregation script plug-in platform with the concept of "one-stop service", creating a huge "plug-in kingdom".

As the head of Feitian's assistant, Li Yi's turning point in his life was in college.

He studied hard in high school and was finally admitted to a well-known computer university.

But after being admitted to college, he seemed to want to make up for all the regrets of high school, and began to play crazy online games.

After a semester, he was almost absent from class, hung up on exams, and skipped class.

Later, after Li Yi was warned by the school to stay on probation, he still did not wake up, and was finally swept away by the school.

In desperation, Li Yi met a mysterious master by chance in the game, and after coming into contact with this mysterious master.

The two discussed for a long time, and finally hit it off, and began to prepare to seek benefits on the game plug-in.

Under the teaching of the mysterious master, Li Yi quickly developed the first dungeon plug-in with his own talent.

This add-on has functions such as locking blood, increasing skills, and no cooldown, which can be said to be loved by some dungeon players.

Especially for some dungeon players who like to play PK in the arena, with this plug-in, they can easily beat all the gods, and they can't help themselves.

And Li Yi made a lot of money with this plug-in and got the first pot of gold in his life, more than 400,000 yuan!

Seeing that the plug-in was so profitable, Li Yi was even more impatient, and later he began to recruit troops, and the entire plug-in team began to expand rapidly.

Now, the team has grown to more than 40 members, with a total of five channels, each full of 2,000 people.

And these 10,000 people are all internal members, and all they buy are 1,000 a month of internal genuine plug-ins.

In addition to these internal members, there are also hundreds of thousands of peripheral members, who generally use low-end versions of plug-ins, which are very cheap, only a few dozen yuan, or more than a hundred.

This is just the money made by the game plate plug-in, plus various script tools, software and other income, the Feitian Assistant plug-in platform basically has a net profit of tens of millions a year, which is very profitable.

After squandering his money, Li Yi's life is also enjoyable, except for the daily inspection on the platform, the rest of the time is spent playing games and flirting with girls.

At this time, Li Yi was brushing up on the dungeon, but the boss who was originally pressed and beaten by him suddenly hit a full-screen skill damage, and he directly gave him seconds.

"Huh? Is the plug-in out of order? ”

Seeing this scene, Li Yi was stunned for a moment, and immediately went to check the game update without hurrying.

Generally speaking, the failure of the plug-in is nothing more than a game update that fills in some loopholes.

And this is the busiest time for these plug-in authors, because there are still tens of thousands of internal members waiting to use plug-ins.

However, when Li Yi entered the background of the Feitian Assistant server, he was directly dumbfounded after looking at the four big words [Inaccessible] in front of him.

What's the situation? The platform has been hacked!?

Before Li Yi came back to his senses, a person in charge of the Feitian assistant had already sent him a message: "Yi, Brother Yi, the server of our platform has been destroyed, all the information is gone, and it is in a grid state......

"What!?"

Seeing this news, Li Yi's eyes suddenly widened, and he shouted in disbelief: "This is impossible, this is absolutely impossible!" ”

He couldn't believe his eyes, just a moment later, the server of their platform was destroyed?

There are hundreds of thousands of scripting tools in it, as well as plug-ins, and it's all gone!?

Are those who watch the server eating dry!!

Taking a breath of air suddenly, Li Yi forcibly suppressed the anger in his heart and clicked on an independent chat tool called MSN on the computer.

On MSN, there is only one friend, Li Yi opened the avatar of a mysterious man and sent him a message: "Master, the platform has been hacked, all the data has been gridded, and the system needs to be restarted." ”

Three minutes later, the mysterious man's avatar lit up and replied, "How is that possible? The fire ...... I set"

However, before the mysterious man could finish speaking, under Li Yi's dull gaze, the avatar that had just lit up instantly dimmed.

Li Yi: "??? ”

Just when Li Yi was a little confused, his computer screen suddenly went black.

A scarlet prompt appears in the center, with seven large red letters clearly written on it.

The Internet is not disorderly!

Seeing this scene, Li Yi was so frightened that he trembled and turned pale.

After three or four years of cheating, with the help of that mysterious master, he also learned some techniques about hacking.

The simplest way to control a puppet machine to carry out DDOS attacks will also be.

However, it is the first time he has seen such a phenomenon of his computer being hacked unknowingly!

How strong is this person's hacking skills, he didn't even raise any alarm from his own firewall!

Thinking that his computer was hacked and all his relevant information was exposed to the eyes of others, Li Yi's heart was full of panic.

You must know that these of them who do plug-ins will not see the light of day, once their real IP address is exposed, then he will only be greeted by prison.

Not to mention that all of my information is now in the hands of others.

It can be said that whether he lives or dies now is between the thoughts of the hacker on the other side.

Li Yi forcibly calmed himself down, staring at the monitor with his eyes, his voice trembling a little: "You, who are you, as long as you don't expose my information, I am willing to give you one million a month as hush money." ”

He knows that when the computer is controlled, as long as the hacker wants to, then he can turn on his camera, or microphone and headset at any time.

————

At the same time, Su Muyun was at home.

At this time, Lin Yu was staring at a window on the screen that was constantly refreshing, his slender ten fingers tapping on the cold keyboard, and there was a crisp sound from time to time.

Because WikiBit destroyed the plug-in platform at the same time, it also threw a lot of encrypted hidden control Trojans in its server kernel.

Therefore, as soon as someone enters the server to check the situation, then the other machine's machine will be infected immediately, and a hidden backdoor will automatically form on the computer.

And Lin Yu can remotely control his computer through this back door, if the other party has a camera, then Lin Yu can see him, and if there is a headset, he can hear the other party's voice.

Not only that, but all computers that automatically form backdoors will also record them in the form of notepad documents on the Sky Eye.

Soon, a window popped up on the Sky Eye, and a backdoor path appeared inside.

Seeing this, Lin Yu clicked in and began to remotely link to the computer, and view various encrypted files and related information in the computer.

The eye of the sky is secretly monitoring the computer's every move.

Five minutes later.

"Tsk, I didn't expect it to be a big fish."

After reading all the owner's IP address, detailed information and other information, Lin Yu raised an interesting smile on his face.

This flying assistant plug-in platform is still quite strong, and the business development is so wide, there is something.

But alas, they met themselves.

Thinking of this, Lin Yu smiled unscrupulously, and planned to send all the information, plug-in evidence, appearance, and address of this Li Yi to the network supervisors.

At this moment, he suddenly saw that this Li Yi was texting a person named Master on the surveillance window.

Good guy, there are people in the back.

Seeing this, Lin Yu suddenly came to his senses, and he opened a few more windows, pulling out all his attack, invasion, defense, and auxiliary tools, and preparing to track them remotely.

"I'd like to see who's behind the scenes."

Holding the mouse, Lin Yu was inexplicably a little excited.

This is the first hacker he's ever met in real life, and hopefully he won't let himself down.

Through Li Yi's puppet machine, Lin Yu quickly found the IP address of the other party's mysterious person.

Of course, Lin Yu knew that this was the other party's virtual IP, because veterans have this habit.

Whether it is on the Internet, or on various microblogs, forums, and post bars, hackers will use virtual IPs to access.

It will not be like those computer novices who will use their real IP to query by default when browsing the website.

Like this kind of real IP address, hackers basically check it accurately, and they don't need to operate, and they can get the person's detailed address in real life.

No hacker would be idle to do such a thing, though, because it doesn't make any sense at all.

Of course, if there is a grudge, then say it separately.

Turning on the scanner, Lin Yu threw the virtual IP he had just found into it, and instantly parsed out a large number of camouflage IPs, that is, broilers.

The progress bar on the scanner is growing at a rate visible to the naked eye, and the IP address is still increasing, and more than 10,000 broilers are swiped in a minute.

"This person has a lot of broilers, but I'll be cheaper later."

Looking at the broiler that was still refreshing, Lin Yu laughed evilly, opened his chicken catching tool, typed in a piece of malicious code, typed [LIUNX] in the type column of the tool, and then clicked Run.

This chicken catching tool is an auxiliary tool that he has edited a long time ago, and if you enter an arbitrary IP through this tool, you will automatically get a broiler.

And after obtaining the broiler, the chicken catching tool will also automatically implant the backdoor Trojan on the broiler computer, and automatically classify.

Lin Yu is still very satisfied with this tool, because the types of broilers caught by this tool are all servers that he chooses and is familiar with, such as LIUNX, UNIX, etc.

Not only that, but this chicken catcher also updates the vulnerabilities automatically.

In other words, if you choose a LIUNX type computer, it will break into the system vulnerability and then proceed to gain control based on the vulnerability.

In other words, even if the broiler system is updated, this tool can still continue to control the broiler.

Ten minutes later, the opponent's broiler had increased to more than 150,000, and the scanner stopped working.

Lin Yu moved all the more than 150,000 broilers to the analysis tool, and then a row of data was displayed on the window.

[Generals: 10, Privates: 150,000.] ]

Seeing this information, Lin Yu quickly understood that this person had a total of ten auxiliary machines and 150,000 puppet machines.

In terms of DDOS attacks, this configuration can be said to be very good.

As for DDOS attacks, they are also known as denial-of-service attacks.

To put it bluntly, many computers do justice to one computer, sending useless packets to it all the time.

For example, a single attack software on a computer can send 3,000 attack packets per second, but a computer and network bandwidth can handle 10,000 attack packets per second, so the attack will not have any effect

THEREFORE, DDOS ATTACKS CAME INTO BEING, SINCE ONE COMPUTER IS NOT GOOD, THEN TEN, HUNDREDS, THOUSANDS, OR EVEN TENS OF THOUSANDS.

In the face of such a massive attack, if there is no firewall or server dedicated to DDOS attacks, then computer crash is the only result.

DDOS attacks are the most commonly used methods by hackers nowadays, and it is divided into four parts.

The fourth part is the computer that was attacked.

The third part is the puppet machine, that is, the computer used to attack, which is equivalent to the private in Lin Yu's analysis tool.

The second part is the control machine, which is not used to attack, but to issue orders, which is equivalent to the commander in the privates.

The first part is the secondary machine, which is used to manage the control machine and the puppet machine, and is generally used with the best equipped computer, which is equivalent to the general in the analysis tool.

If you want to push it forward, it's this machine.

Therefore, a qualified old bird hacker will hide very deeply, and ordinary people can't catch them at all.

All that can be found are all kinds of fake IPs, fake IPs, and even disguised IPs, and the real IP address is difficult to find.

"Well, kill the generals first, and by the way, see how their configuration is, and then lead the sheep over."

Lin Yu nodded to himself, and after making up his mind, he put out the 150,000 puppet machines in the analysis tool separately, put them in the "flood" filter, and handed them over with the chicken catching tools.

The Flood Filter is a semi-filtered, semi-attacking tool that will disappear when activated.

At the same time, it will also track the address of the IP connection, then attack again, and then continue the cycle until the real IP address of the other party is found.

Of course, now that the flood filter and the chicken catcher are connected, all the broilers that would have disappeared if they were attacked will be taken away by the chicken catcher tool, and the backdoor Trojan will be planted to become Lin Yu's broiler.

Now everything is ready, only the east wind is owed.

Lin Yu called up the devouring tool, and confidently, he directly used his own machine to start fabricating the data stream.

Soon, 10,000 elaborate streams of fabricated data appeared in the devouring tool.

Seeing this, Lin Yu did not hesitate to turn on the flood filter at the same time, and manipulated 10,000 simulated data streams to attack the ten auxiliary machines in the analysis tool with pervasive means of invasion!

In the face of perfect-level computer technology, with the pervasive means of invading, port scanning, finding the opponent's system vulnerabilities, breaking through the opponent's firewall, planting backdoor Trojan programs and other operations were quickly completed within three minutes, and a secondary machine was directly broken through by Lin Yu!

There was no time to query its specific IP address and related configurations, so Lin Yu continued to invade the next auxiliary machine non-stop.

Time passes slowly.

As the water supply filter operated, the attack program was directly activated, and the broilers inside began to decrease at a rate visible to the naked eye.

Especially with the disappearance of the auxiliary machine, the rate of reduction of broilers has become more exaggerated, basically tens of thousands.

The broiler inside the chicken catcher grows at a rate visible to the naked eye.

Ten minutes later, Lin Yu, the ten co-engines, successfully devoured eight of them, leaving only the last two.

At this time, the other party also reacted, but to Lin Yu's surprise, that person ran away without hesitation!

Yes, the other party relies on the last two auxiliary machines and tens of thousands of broilers, and the source data stream is constantly shuttling between the broilers and the springboard.

The speed of his escape was so fast that Lin Yu was very surprised when he saw it.

However, how could Lin Yu let go of this big fish.

After calling up the tracking and analysis tools, Lin Yu found the virtual IP according to the pseudo-IP in the other party's data stream, and then found the broiler IP that issued the virtual IP.

Lin Yu kept following up, shuttling on one broiler and springboard after another, following closely behind the mysterious man, chasing after him.

Generally speaking, if the other party's fake IP is caught and the other party immediately disconnects the network, then it will not be traced.

But as long as you chase the virtual IP through the pseudo-IP, and then follow the virtual IP to find the broiler IP, then even if the other party is disconnected, you can also catch the real IP of the other party!

However, if you want to continue to track, you need to follow the other party's springboard layer by layer, which is an endless cycle process.

Of course, the top masters will attack the opponent's broiler at this time, by reducing the number of opponents' springboards, thus shortening the tracking time.

For example, the flood screening tool made by Lin Yu is constantly attacking the opponent's broiler at this time.

Just as Lin Yu was tracking, Tianyan suddenly automatically popped up a monitoring window, and Li Yi's voice trembled from inside.

"You, who the hell are you, as long as you don't expose my information, I'm willing to give you one million a month as hush money."

After hearing this, Lin Yu couldn't help but laugh dumbly.

Good guys, give yourself a million hush money?

How did he feel a little offended...