Chapter 272

The sky gradually lit up.

Four full hours passed.

Everyone is worried about whether the laptop keyboard will be broken.

Worried about when Xiao Yao can’t hold on under the operation of the high-strength writing system.

Sudden.



Xiao Yao stopped his hands and the laptop screen went blank.

Ten seconds later.

The computer screen lights up again.

Personal system, done!

“Great God, please take my brother’s knees and take me to fly!”

Network security officer Hao Tian, ​​looking at Xiao Yao’s eyes as if looking at a god, exclaimed excitedly: “I would like to call you the strongest!”

Xiao Yao: “…”

People in Guoan Group 6: “…”

Xiao Yao took care of the young man lazily, raised his hands tiredly, opened the suspect’s laptop, and connected to the Internet.

Then, in front of everyone, he began to operate the gods.

Xiao Yao first used military computers and hacked into all the computers in the office of Guoan Group VI, using these computers as a “springboard.”

It is also commonly known as “broiler” or puppet machine.

In controlling all the ‘springboards’, a multi-level springboard ‘Sock Proxy’ is performed.

This is done to leave some fake IP addresses of proxy computers on the invaded computer.

Sophisticated hackers also use phone transfer technology to conceal themselves.

Commonly used techniques.

There is a private transfer service using 800 and 400 calls to connect to the ISP.

Then use someone else’s account to access the Internet, connect to a host through the phone, and then enter through the host.

Being in the security bureau, Xiao Yao didn’t want to be so troublesome.

Use the local area network directly to break into the suspect’s laptop.

After going through this computer, open the dark web software.

Why is it so tedious to prepare?

Can’t open the dark web software directly?

If this is heard by a hacker, he will definitely be laughed out of.

Do you know what those software on the computer are?

Is all software safe?

Make an analogy.

Penguin Q.

It can scan your computer at any time, control your computer, and create a variety of backdoors.

You can also delete and add some data through remote control.

How many people know that Penguin Q is rogue software?

With these permissions, Penguin Q can turn your computer into a ‘broiler’.

When people use these software, they can not only control your computer.

You can also back up all your chat records, voice, and video in minutes.

Maybe you did something wrong when you were videoing with your boyfriend or girlfriend.

Believe it or not, everyone can see and hear?

Security software?

Even the four mainstream systems are made by big companies.

When your computer uses these systems.

It is equivalent to handing over the computer to these companies.

Is there any security software in this world?

Otherwise, why do hackers make their own personal systems and programs?

Especially the software made by hackers Zeng Xu.

The shell is almost 100% set.

After you install it will open your back door.

You can get your computer permissions at any time…

When Xiao Yao opened the dark web software the first time.

He conveniently used two self-made programs to carry out ‘spot scanning’.

In doing so, the main purpose is to have a multi-party understanding of the target to be invaded through channels.

Ensure that the information is accurate.

Determine the direction of the invasion.

This is also usually done in two stages.

Step down: Find out the trusted host of the other party, which may be a machine used by an administrator, or a server that is considered to be very secure.

Scan: Use the scan to find the vulnerabilities left by the other party and prepare for intrusion.

If a loophole is found, Xiao Yao can then use the loophole to obtain the other party’s computer privileges.

Once you are sure that you are safe, you can start to invade the other party’s computer and do whatever you want.

In order to avoid being discovered, login logs and other related logs will be cleared in time after half of the intrusion is completed.

Finally quit in stealth!

This is a whole set of operations called hacking, as well as the intrusion process.

If your computer is ‘hijacked’, it’s okay for your desktop computer to unplug it, maybe you can recover a little loss.

If it is a laptop, unless you have modified a forced power-off switch.

Otherwise, you will not even have the possibility of shutting down.

Like a stripped baby, standing shivering in front of the hacker.

Was hung and beaten by a hacker with a small leather whip!

I have to say that the ‘Red Guest’ skills given by the system are too powerful.

Even a computer novice like Xiao Yao can instantly become a great god.

The two scanners utilize connected dark web software.

Scanning out the other party’s server is hidden behind the ‘five-layer camouflage’ at the first time.

The so-called five-layer camouflage.

It was the other party who hijacked five springboards using hacking techniques and disguised them.

Whenever something happens to a springboard, the other party can easily disconnect or fight back.

But under Xiao Yao’s ‘hongke’ skills, the opponent’s network computer technology is just like a child in front of an adult.

Unconsciously.

Xiao Yao has already wandered around on the other party’s computer.

However, don’t use hackers as fools.

This server host is also the other party’s ‘standby’.

It is only used to run the dark web.

Want to find any clues to hackers.

It is almost impossible.

But this is enough.

After opening a back door to the other party’s server.

Xiao Yao remotely copies the information on the other party’s server.

After all, the dark web is just a platform.

The people Guoan wants to arrest now are criminals who use the dark web to conduct transactions.

Catch the thief in primary and secondary.

Now that the owner of the dark web has moved, it will definitely be stunned.

Wait for Guoan to clean up these criminal traffickers.

Come back and clean up the owner of this dark web.

Times of Day.

People in Guoan Group VI are all reviewing member information copied by Xiao Yao from dark web hosts.

Unfortunately, there is not much information available.

There are also not many clues of information that I want to find through my account.

Because the owner of the dark web is really ‘just and honest’.

I don’t even play tricks, and I never secretly back up member information, exchange virtual currency and cash out any information about virtual currency.

The most critical point.

The total account number of the last inflow of the virtual currency purchased by the member is also unavailable.

Because these have encryption mechanisms.

As long as it is not a ‘super account’, it is the special authority of the owner.

Whenever it is intruded by humans, the encryption mechanism will be “destroyed” instantly and all data will be cleared.

Even if Xiao Yao possesses the horror ‘Red Guest’ skills, he dare not touch these encryption mechanisms easily.

It can be seen from it.

The owners of the dark web have long thought that one day their network would be hacked.

All preparations have been made in advance.

It will not give the intruder any opportunity to obtain important information.

But Hundred Secrets had a sparseness at the end.

It took half a day.

Xiao Yao still found the IP addresses of most ‘buyers’ through friends added by criminals.

Not everyone in this world is a hacker.

All have superb computer technology.

People who can use the ‘broiler’ and the ‘puppet machine’ as a springboard.

Only a few.

Are you arresting?

Of course not.

These are important customers of the murderer.

The source of money.

How could the murderer have the heart to give up these gold masters?

Xiao Yao secretly monitored the third day of the dark web.

A new member appears.

And a space established in the dark web.

Gorefiend space! .

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like