live on the computer

Chapter 10 Tracking Hackers

Chapter 10 Tracking Hackers
Li Chunfeng mobilized Kamikaze 1.0 to scan the hidden hole.

The information came back very quickly, and this hidden hole turned out to be a preset back door. Obviously, hackers had visited the company's portal.

And reserve the back door here for the next time.

Although Li Chunfeng is not very clear about the world of hackers, after all, he has been doing application software development for a long time.

But since he is a programmer, of course he has a feeling of longing for the hackers who dominate the Internet.

I also have a little understanding of some basic hacking methods.

At this moment, Li Chunfeng never expected that the back door reserved after the hacker intrusion is often mentioned, in his current view, it turned out to be in such a form.

Laughing dumbfounded, Li Chunfeng quickly analyzed some information hidden in the small black hole, and there was an information monitoring feedback address among them.

That is to say, this backdoor not only serves as a safe channel for the next intrusion, but also monitors the status of the server and feeds back the status of concern.

Li Chunfeng couldn't help but feel eager to try, because through this feedback address, if he traces it down, he may be able to find out which hacker left the back door.

Li Chunfeng checked his status again. After all, he had just occupied a new server and hadn't fully adapted to the new environment.

At this moment, my mind quickly scans the entire space, whether it is hardware devices such as CPU, memory, hard disk, motherboard, CD-ROM drive, network port, printer port, USB entrance, etc., or firewall, anti-virus and other security software, and even the operating system, all are quickly scanned. Ground scan detection.

Li Chunfeng found that his scanning speed was faster than when he was on that public server. This was not only because of the improved hardware, but also because of the improved software obtained from the virus after swallowing the virus.

When Li Chunfeng confirmed that he was fine now, the strongest moment since his consciousness regained, he immediately launched a tracking operation.

The Kamikaze 2.0 emitted by Li Chunfeng traveled towards that address through the network channel at the speed of light.

The channel of the Internet is still very different from the channel of the company's intranet. From time to time, Li Chunfeng can find through Kamikaze 2.0 that the channel he passes has become a narrow path.

There have even been instances of being blocked by many packets.

Obviously, the network bandwidth in many places on the Internet is not as large as imagined. Of course, those trunk lines are much better, but the amount of data is also much larger.

Li Chunfeng immediately discovered his new ability, his kamikaze 2.0 could actually penetrate those information packets.

In this process, not even a single byte of information is lost.

This is a god-like ability, which means that on the Internet, Li Chunfeng doesn't have to worry about being blocked somewhere by a large amount of data.

His kamikaze 2.0 will always be able to travel at top speed, which means it will be much faster than anyone can operate.

Not long after, Li Chunfeng sensed that Kamikaze 2.0 came to a server, and Kamikaze 2.0 immediately began to multiply and replicate, and use this server as a node to infiltrate and spread.

Kamikaze 2.0 quickly scanned the server and fed back some useful information. The speed was astonishingly fast, almost reaching the state of real-time synchronization.

Li Chunfeng discovered that this server should be a "broiler" set up by the hacker (usually hackers call a computer that they invade and can control at will as a "broiler").

It seems that when hackers operate in the network, they really use bots as a springboard to prevent people from being directly traced to the IP address of the machine and thus being discovered and exposed.

Li Chunfeng didn't sigh too much. He sensed that Kamikaze 2.0 had taken over the computer, and found another hidden back door of a small black hole, and found a new address from it.

Then Li Chunfeng directed the newly copied Kamikaze 2.0 to track the new address.

After about 10 minutes, Li Chunfeng sensed that Kamikaze 2.0 had traveled from China to country M, from country M to country R, ​​from country R to country A, from country A to country Y, country F, country D and country E, Finally, he returned to country M.

During this period, he kept going around in circles. Among several servers, Li Chunfeng found more than one hidden back door. Obviously, these servers were set up by several hackers as their own broilers.

These were all recorded by Li Chunfeng. Through the comparison of different hidden backdoors, Li Chunfeng found that each one is different and has its own special code segment.

So they were all recorded as characteristic marks by Li Chunfeng, so that they will definitely be encountered on the Internet in the future, and then they can be identified based on this.

Otherwise, in the vast Internet, if you encounter a hacker repeatedly, how do you know whether it is the same or different?

According to this feature mark, Li Chunfeng has been staring at the hacker he first followed.

In the process, Li Chunfeng has unknowingly spread his Kamikaze 2.0 on the Internet.

After another minute, Li Chunfeng discovered that the hacker had returned to Huaxia, and then locked on a computer in Haidu.

That computer has multimedia peripherals, and Li Chunfeng quickly controlled the computer through Kamikaze 2.0, and then saw a young man with dyed yellow hair from the camera, only fifteen or sixteen years old.

He is smoking a cigarette and chatting with people on QQ on the computer.

Li Chunfeng frowned involuntarily, and immediately thought of the meaninglessness of his action, and secretly complained about his soul form.

Looking at this little yellow hair, I thought this guy might not be that hacker.

As the copied Kamikaze 2.0 quickly controlled all nearby computers, Li Chunfeng quickly understood that this was an Internet cafe.

Apparently, the hacker used to surf the Internet through this computer in this Internet cafe, and then connected to his own broiler. After a series of springboards, he invaded the company's website server and set up a backdoor.

It is estimated that the hacker will invade the company again, but he may not launch another intrusion from the computer in this Internet cafe.

Li Chunfeng was a little disappointed. After all, he was hoping to track down a hacker, so he could compete.Look at your current form, and what kind of sparks will collide with hackers.

Afterwards, I felt a little relieved. I felt that Kamikaze 2.0 was going around in circles on the whole network, and I actually saw quite a few hackers. The way they set up backdoors was also an eye-opener for me.

Li Chunfeng didn't directly withdraw his attention from the thread after sensing that he quit the computer in this Internet cafe.

Judging from the methods of these hackers, it is obvious that they have gone through countless springboards for attack and retreat, so this is also a practice that they can learn.

Since the kamikaze 2.0 avatar has its own mind as the outer package, it seems to have a great advantage in the Internet, and it is difficult for other hackers to find it.

However, it is always good to be cautious.

Li Chunfeng mobilized a Kamikaze 2.0 avatar to go around in circles on the domestic Internet, sometimes skimming over some computers or servers that had been secretly controlled by his Kamikaze 2.0.

Will check by the way whether these kamikaze 2.0 are concealed enough to leave no traces.

Sometimes, when a new computer or server is discovered, it will also stop, multiply and copy a new Kamikaze 2.0, and scan and occupy it.

During this process, he also saw a lot of domestic hackers, so his list of hacker characteristics became longer and longer.

Suddenly, a familiar feature appeared again. It turned out to be the hacker who had tracked the entire Internet by himself.

This broiler is not in the previous path!

Then Li Chunfeng commanded Shenfeng 2.0 without hesitation, and followed the address left in this new clue.

In just 2 minutes, Li Chunfeng sensed that Kamikaze 2.0 tracked more than 100 computers, and finally locked on an IP address in Haidu again.

Li Chunfeng then manipulated Kamikaze 2.0 to enter and occupy the computer.

This is a laptop, and Li Chunfeng was overjoyed, it is very likely that it was used by the hacker himself.

With the scanning of Kamikaze 2.0, the information and related data of this computer were quickly collected and fed back to Li Chunfeng.

Information flows at the speed of light.

At this time, there is no one opposite the camera, the computer is on, and no one is there.But judging from the room layout, it should be a hotel room.

Li Chunfeng quickly discovered from the feedback information that the owner of this computer should be named Deng Ling'er, and there are some photos in the computer.

Li Chunfeng looked at the girl in the photo with some disappointment. She has an oval face, big eyes, and wheat-colored skin. She is about 1.60 tall, about twenty years old, and has a ponytail.

Such a harmless little girl may not be the hacker.

 Today's second update, fellow book lovers, bring your recommendation tickets, otherwise Li Chunfeng will blackmail you.

  Please click!Ask for collection!Ask for a recommendation ticket!

  


(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like