Chapter 27 Anti-tracking
When Cheng Mo walked to school, Song Xizhe, who had slightly curly hair, big and round eyes, and a very delicate appearance, was looking at Cheng Mo's IP address in a daze in the dormitory of Building A2 of Changya Middle School. According to the IP
It showed that this person was just in the "Blue Love" Internet cafe in the middle of Fallen Street. He also hacked into the Internet cafe's management system and looked at the other person's ID number.
The Vientiane Management System used by most Internet cafes in Star City was a system full of loopholes for him. Based on his ID card, he judged that the person was about 20 years old and was a boy named Hu Xin. Song Xizhe thought that this person should be from Yuelu Academy or Normal University.
of college students.
Normally, Song Xizhe would not scan the customer's IP address. However, when he wanted to enter the URL given by the other party yesterday, Song Xizhe was really frightened, so today he specifically checked to see who the other party was, but it was a pity that the other party was very cautious.
, covered the camera with his clothes, and he even suspected that the other party’s ID number was fake.
In fact, Song Xizhe was not completely successful when he tried to enter the URL given by the other party last night. At first, he tried to ping the server using conventional methods and was able to find the IP address, but the webpage could not be entered.
So he chose to directly invade the server and find clues from the server. Generally speaking, there will be multiple sites on a server, and only large websites will have several servers or even computer rooms.
But the strange thing is that there is only one site on this server.
Then everything was normal. He started looking for DNS records, the type of website server, the type of scripts running on the website, the type of operating system of the server, the ports open to the server...
Then he discovered that this website requires a very strange browser - Netscape Navigator to log in. This is an extremely old browser, even earlier than Internet Explore, and has very poor security.
Not only that, it also requires that the Netsc ape Navigator be modified to a specific model before you can access this website.
This made Song Xizhe extremely curious about what kind of URL the customer had given him. Without thinking about it, he spent Bitcoin on a foreign hacker forum to download a specific version of Netscape Navigator to his computer. He was very interested in his computer.
The security system is very confident.
However, after he downloaded and typed in the URL, he could only enter the login page, and registration required an activation code. Of course, this was not a problem for Song Xizhe. He directly began to review the elements, see the data statements through the debugging console, analyze them, and find loopholes.
.
But after he bypassed the activation system and registered successfully, he could only stay on the surface of the website and could not access the data at all. Simply speaking, a system can be divided into five levels: external service area - management area - internal service area
-Office area-core area.
From left to right, the nature of the area becomes more and more secretive. As a hacker, the attack sequence should also be like this. Enter from a room in the external service area, and then rely on the information found to try to jump to other machines and strive to enter the inside.
service area, and then enter the core area through the office area.
So Song Xizhe was just staying in the external service area at the moment and could not enter the room in the external service area. At this time, he needed to find a way to enter the room (post) before he could do more things, so Song Xizhe started to brush the code again, but in
When he tried to enter a post, a red banner suddenly popped up on the web page, which said in English: Please stop your hacking behavior, we have detected your accurate location, please leave this website immediately, otherwise there will be consequences
conceited.
Then a red "5" flashed on the webpage and the countdown started. Song Xizhe had never encountered such a situation since he became a hacker. He was stunned for two seconds, but he still made the most correct reaction and immediately
I unplugged the power supply, and when I turned it on again, I found that my computer could not enter the operating system interface at all, and it directly showed a blue screen....
Song Xizhe had no choice but to reinstall the system. After entering the computer, he found that almost all his data and software had been deleted. The other party had broken through the protection of the virtual machine and attacked the host. This was really incredible to Song Xizhe.
However, Song Xizhe did not realize the seriousness of the matter at this time. He thought that the data could be restored after deletion. However, he spent the whole night recovering the data and only recovered a small half. Some of the data was completely overwritten after recovery. This is also
This means that these data can never be recovered.
This included a lot of information that should be handed over to customers, which caused Song Xizhe to suffer heavy losses...
Fortunately, the screenshot of entering the forum yesterday is still there, so all these losses naturally fell on Cheng Mo. Song Xizhe looked at Cheng Mo's IP address and thought to himself: I see a fellow, I lie to you without any discussion. Brother! You hurt me this time.
Qian, I've been working overtime all night, and I've lost so much income. It's not too much for me to ask you for fifteen thousand...
———————————————————————
When Cheng Mo returned to class, it was still early. Some people in the classroom were sleeping on their stomachs, some were listening to music with headphones, some were playing on their mobile phones, and there were also suspected lovers sitting together and whispering, and classmates who lived close to Changya
Everyone will go back to rest, and those who are not at home in Star City can go to the dormitory. As for Cheng Mo, he can either go to the library or stay in class...
Cheng Mo would naturally not agree to the school doctor Gao Yuemei's invitation to go to the school doctor's office at noon every day. If you take the initiative to receive someone's kindness, you must pay for it. This is Cheng Mo's principle.
His arrival did not cause any disturbance. Only Sun Dayong, who was sitting in his seat playing "Honor of Kings", looked up at him. Cheng Mo quietly walked through the light and shadow-dappled aisle. Beside him, beige
The colored desks were glowing with bright light, and some of the blue curtains were drawn with only a golden slit remaining, while some were bundled into bunches and slowly fluttered by the cool breeze.
Cheng Mo thought to himself: What is my youth? Writing questions alone? A classroom alone? A life alone?
Life is really boring!
No, it's better not to think so much, I have to survive first.
Cheng Mo sat in his seat and looked at the watch again. If this watch was really worth 300 million, then if he sold it, he might be able to do a heart transplant. Heart transplant surgery is now very mature.
, the difficulty is not in the surgery.
There is just a serious shortage of donor sources, but for wealthy people, this is nothing. A large part of darknet transactions is organ trading.
Secondly, even if the surgery is successful, you will have to take anti-rejection drugs for life to suppress your own immune system, and they can only last for more than ten years.
However, as long as he lasts for another ten years, he hopes to wait until his own cell culture to print a heart and solve the problem of donors and rejection. Originally, what he was most looking forward to was that this watch could provide such data to medical institutions, but according to Laji Naotong
Judging from the screenshots of the forum, it is far from that.
Cheng Mo suppressed his curiosity about the content of those posts, such as those inexplicable team invitations, such as whether the "unactivated Ouroboros" mentioned in those trading posts was the watch on his wrist...
But to solve this problem, you have to log in to that website. Since Laji Naotong is so sure that he can't find a way to log in on the Internet, he must get the method to log in to this website from him. Fifteen thousand
He doesn't have the money, but he must learn the method.
He began to recall the communication process with Laji Naotong. If he could find out Laji Naotong's true identity, he could use him as a hacker to steal website information and threaten him. But the question was what should he do?
Find the spicy braintwitch?
Ordinary people may be helpless and feel that they are not hackers and cannot counter-track, but Cheng Mo does not think about how to chase Laji Naotong from a technical point of view, but thinks from the logic of human behavior.
Cheng Mo began to recall some information on La Ji Nao Tiao QQ. There was actually no information on it. His age was 100 years old and his address was Los Angeles, USA. However, some of the screenshots of his information basically came from the space of this QQ number, so
Although this number is not his personal number, it must be his commonly used work number.
Almost all hackers go to forums to communicate with others, including Cheng Mo who found La Ji Nao Tiao in the "No Taboo" forum, so Cheng Mo took out his mobile phone and searched several of the largest hacker forums in the country, such as "Hongke"
Alliance", "Dark Group Technology Forum", "Hegou.com" and so on. After finding these forums, Cheng Mo began to test his endurance and willpower, looking for posts and QQ posts one by one about the ID of Laji Naotong.
Chapter completed!