Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 17 Outflanking

As soon as the screen flashed, Hu Yifei saw the other party’s desktop. Surprisingly, he found that the other party’s operating system was in the English version.

"European and American pornographic films?" Hu Yifei reacted very quickly this time and immediately remembered this.

The other party used a scanner to scan for vulnerabilities on Hu Yifei's computer, but there was almost no available information returned. It should be that Hu Yifei's firewall was blocked.

Hu Yifei can still recognize the scanner. He used to use the scanner to scan the website server of the University of Science and Technology and finally got a thick scan result. The report made Hu Yifei unforgettable for his life and still remembers it freshly: the big title vulnerability 1, a large section of profound English; the big title vulnerability 2, a large section of profound English; the big title vulnerability 3, a large section of profound English...

Since then, Hu Yifei has been injured and never dared to use any scanner again.

In fact, many fool-style scanners are combined with attack tools, specifically scanning for a kind of vulnerability, and can attack instantly after scanning the vulnerability. But at that time, Hu Yifei didn't know that he read an article called "Hacking Step by Step", saying that it was the first step of hacker invasion, which was scanning. So he ran to the wolf's den and posted a post and asked others what scanner is the best. An expert solemnly recommended a model to Hu Yifei, saying that it was the most famous scanner in the industry, with the fastest scanning speed, the most complete vulnerability information, and the strongest auxiliary functions.

Hu Yifei was so excited that he downloaded the legendary "three best" scanner back, but he didn't know that it was a security scanner. The report he obtained was also a security report. So a by chance the big cup was staged!

The other party's scan lasted for two minutes and got five available information. Hu Yifei could only count the number clearly. He didn't know what the information specifically meant, and he couldn't help but feel a little anxious.

"Damn!" Hu Yifei cursed. He didn't expect that he had read half of the book, but he still couldn't understand it. The effect of watching the silent performance was far inferior to that of Cobra. Although Cobra's demonstration had strong performance traces, he had an explanation and could still see the excitement, but this time he was completely blind.

Hu Yifei was very depressed and ran over to seek enlightenment. This could lead to enlightenment!

The intruder there had already opened the command line program, a dark interface similar to the DOS operating system, and then quickly typed some commands. This time, Hu Yifei was even more stunned. He couldn't even understand the clear operation, and the characters on the pure command line were even more confused. He could only understand one thing, that is, the commands typed by the other party pointed to his computer.

Soon, the execution result came out and failed!

Hu Yifei was overjoyed. He could easily understand this simple message.

The other party quickly typed a new command, and the target still pointed to Hu Yifei's computer, but the result of returning was still failure. Five or six commands were replaced in a row, all of which failed to execute. For a moment, the other party's operation stopped, as if thinking about finding a new way.

Hu Yifei's stomach roared twice. He just saw that the other party failed several times in a row, and he was happy and forgot about eating. Now that the other party had not moved for more than ten minutes, Hu Yifei's stomach began to stir up again. After hesitating for a moment, he stood up and whipped up on the big table in the middle of the dormitory to see if he could find something to put it on, otherwise it would be too uncomfortable.

After searching for a long time, he found a piece of chewing gum and two packs of isatis root powder. Hu Yifei was almost crying. Both of these things seemed to contain sugar. According to the biology book, sugar can be converted into energy, but the carrier of this energy seems to be too much.

Hu Yifei gritted his teeth and stuffed the gum into his mouth, "Damn it, just think it's like eating candy buns!" He tried to recall the smell of candy buns, and then removed the two packs of isatis root powders, washed them away with water, and went up to smell them. His face was full of deep and distant words: "When I was a child, when I heard the hawking of black sesame paste, I could no longer sit still..."

Before returning to the computer, the intruder began to move again. What surprised Hu Yifei was that after leaving for a while, the other party's operating system turned into Chinese. Since he had not seen the other party's operations just now, Hu Yifei didn't know what was going on. He guessed that the other party had probably entered another computer, which was a bit similar to his use of a magic weapon.

The other party's further actions confirmed that Hu Yifei's guess was correct. He searched through this Chinese computer for a while and found a file called "Dongyang University of Science and Technology Students' Online Registration Information Form".

Hu Yifei then realized that the guy was invading other computers in the school. The computers that store such information should be the school network center.

The intruder opened the registration form and quickly searched it. Soon, he locked an IP address: 10.50.0.120. He saw the intruder holding the mouse and circled the corresponding information behind the IP address: Room 319, Dormitory Building No. 2, Hu Yifei.

Hu Yifei suddenly had all his hair standing up. He sat in front of the computer and watched others retrieve his true information. It felt so terrifying. It was like he was being witched by someone. At this moment, his life seemed to be in the hands of others.

The intruder's attack did not stop. He quickly cleaned up the logs, then quit the computer in the network center, and then connected to another computer. This time, Hu Yifei saw it clearly. The other party was using a small software with similar interface to his artifact, called a remote terminal connector.

After clicking on the connection, the other party entered another computer, without any extra actions, and directly ran a shortcut icon on the desktop called "Dongyang University of Technology Student Archives Management System". Enter the three words "Hu Yifei" and click the query button, Hu Yifei's file was transferred out. This file is something that Hu Yifei had never seen before. It includes photos, birthday, phone number, hometown, and other information.

The intruder took the mouse and circled it again. This time the circle was Hu Yifei's email. After a few seconds, the other party cleaned the logs again and quit the computer.

The interface returned to the English operating system. The other party opened the email tool and began to write a letter to Hu Yifei's email address. The title was: "Alumni Hu Yifei, invitation letter from his alma mater, Dongfeng Experimental Primary School!" Then he put the content of the letter that had been prepared long ago. It was all code, and it was carefully crafted at first glance.

This series of actions made Hu Yifei amazed. The other party was so powerful that he just glanced on the file. In just a few seconds, he even remembered what elementary school he went to. The other party's scheming was also very admirable. Most people must have no suspicion when they saw a letter with such titles. As long as they clicked in, they would probably be hit.

After the other party finished writing, he did not rush to send it. Instead, he opened the search engine and searched for information about Dongfeng Experimental Primary School. Finally, he found the mailbox of the principal of Dongfeng Experimental Primary School. He wrote the email address into the sender column, then clicked Send, and delivered the email to Hu Yifei's mailbox.

"I won't go to order it!" Hu Yifei also understood at this time. The other party could not conquer his computer head-on, so he remembered this curve of saving the country. He probably wanted to plant a Trojan on his computer via email.

After sending the email, the other party logged into the wolf nest base camp. This time Hu Yifei could see clearly that the other party's ID was the wolf spider. He sent Hu Yifei a text message to the forum, "Your computer is very safe, I need some time."

Hu Yifei withdrew from the artifact and ran to reply to the other party, "Then let's go for three days, the validity period is three days, and it will not be postponed!"

"OK!" The wolf spider's reply was very short.

Hu Yifei smiled very lewdly. This shameless wolf spider wants to trap me, but now it's a good thing. Hu Yifei is not worried that the wolf spider will come to attack his computer. That kid will definitely stay in front of the computer for three days. Please wait. I won't enter my email for three days.

Hu Yifei hummed a small song and went out for dinner.
Chapter completed!
Prev Index    Favorite Next