typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK1192 Powerful broiler!

.

Xia Kingdom time, July 5th, it was close to nine o'clock in the evening. Converted to Lijian Kingdom time, it was only about eight o'clock in the morning.

Raphael was invaded and tracked by mysterious hackers early in the morning. After receiving the help of Shi Lei's incarnation as a vest, Wisdon, he tracked down an important clue.

The eleventh relay server of the mysterious intruder is actually the web server of the official website of NHK TV station!

What is the most famous thing in the hacker community in recent times?

The answer is definitely two of the world's top hackers, using NHK TV station as the battlefield, they launched many exciting hacker duels!

These two world-class hackers are Raphael and Mr. M. The web server of the official website of NHK TV station was just hit by a bullet.

Now, the web server of the official website of NHK TV station suddenly became the eleventh relay server controlled by the mysterious hacker who invaded Rafael. Even without Shi Lei reminding him, Rafael himself would have thoughts about Mr. M.

"Wisdon, it's not that I don't believe you. It's just that you know that my relationship with Mr. M is so... Forget it, let's not talk about this. Wisdon, do you have a log for your counter-tracing? Can you show me the log?

?" Raphael asked.

Raphael was not too impulsive. Hearing that the web server of the NHK TV official website was talking to Mr. M, he started to start a fight with Mr. M.

The anti-tracing log proposed by Raphael will definitely generate logs automatically recorded by the system during the anti-tracing process.

Shi Lei agreed directly without any hesitation. Then he handed the system log to Raphael through the voice communication channel. "Mr. Feeney, we at Mirui Technology Group know everything about you and Mr. M."

It is clear. Now, the relationship between Mr. M and our Mirui Technology Group is not good. Therefore, Mr. M can be regarded as our common enemy."

Raphael quickly browsed through the anti-tracking log sent by Shi Lei. He personally confirmed that the eleventh relay server of the mysterious intruder was indeed the web server of the official website of NHK TV station!

"Wisdon, do you suspect Mr. M is behind this?" Raphael asked Shi Lei.

Shi Lei thought about it for a while and took the initiative to express an uncertain opinion, "I don't know! However, according to what I know about Mr. M, his defense skills cannot be so bad. So, I think it shouldn't be Mr. M."

Although Shi Lei took the initiative to say that the mysterious intruder was not Mr. M, this statement was better than directly stating that the intruder was Mr. M. If Shi Lei took the initiative to say that the mysterious intruder was Mr. M, Raphael would instead suspect that the mysterious intruder was not Mr. M.

gentlemen.

But Shi Lei took the initiative to say that the mysterious intruder was not Mr. M. In his heart, Raphael was more inclined to believe that the mysterious intruder was Mr. M.

This kind of performance is called confrontational psychology. Human beings usually involuntarily refute other people's opinions. Especially when there are only two people, they usually do not agree with the statement of the person who speaks first.

Shi Lei took advantage of this mentality. He designed a pit for Raphael and asked Raphael to jump into it.

"Maybe it's really not Mr. M!" Raphael replied, "This bitch who invaded me, his invasion method is different from Mr. M."

Shi Lei was a little surprised. Did he make a mistake in guessing Raphael's psychology? Or did Raphael trust Wisdon too much?

"However, Wisdon, I also feel that it is Mr. M! The more the hacker who invaded this time does not look like Mr.

After you gain enough strength, you have to fight me to the end." Raphael spoke again.

Shi Lei felt a little relieved. He thought that Raphael really agreed with his statement and did not doubt Mr. M!

If Raphael did not doubt Mr. M, then Shi Lei had no choice but to give up the opportunity to frame Mr. M.

"Mr. Feeney, we don't know whether the mysterious intruder is Mr. M for the time being. However, as long as we keep tracking, we will have a chance to know the other party's real IP address, and then analyze the other party's identity." Shi Lei made a suggestion.

.

"That's right!" Raphael agreed, "Wisdon, continue to track the real IP address of the intruder. Leave the defense matters to me."

Shi Lei responded affirmatively: "Okay, Mr. Feeney, once I find any more useful clues, I will notify you immediately." After saying that, Shi Lei cut off the power of the voice-changing microphone again.

"Yizur, analyze the IP address of the web server connection of the official website of NHK TV station!" Shi Lei gave the order to Yizuer, while he himself was thinking about how to use this matter to gain maximum benefits.

"Sir, the system retrieved the web server of NHK TV station's official website, which is connected to more than 110,000 IP addresses. After the system automatically scanned, analyzed and excluded, the following suspicious connection IP addresses were listed." Yizuer responded to Shi Lei.

Reverse tracking of IP addresses is not a simple task, it can even be quite complicated.

For example, a hacker has five transit servers as broilers, among which server A is the springboard for the final end. The hacker's terminal connection IP addresses are all the IP addresses of server A.

So, if you want to track down the hacker hiding behind the five relay servers, you must first find the IP address connected to server B in server A.

Don't think that this is a simple task, just find the connection IP address of server B in server A. If you know the address or label information of server B in advance, and then search for the connection IP address of server A, it is indeed

An easy thing.

But what if you don’t know it beforehand?

Usually, there is definitely more than one connection IP address for server B, but thousands, even tens or millions of connection IP addresses.

It is really not easy to find the correct connection IP address among so many connection IP addresses! If you want to accurately determine the connection IP address you need to find, you need to analyze the connection data. According to the data flow at the end of server A,

Trace to the upper-level server. Then trace upward level by level, and finally find the source point of the data flow.

With the help of Yi Zuer, Shi Lei tracked the data flow of the mysterious intruder step by step. At the same time, he had to avoid being discovered by the intruder, lest the mysterious intruder directly cut off the data flow.

Although the method of directly cutting off the data flow is a bit rough, cutting off the intrusion in this way will allow powerful anti-tracking personnel to find the final source. But if the real IP address of the source is insignificant to the intruder, then

It makes no sense anymore.

In order to ensure that the mysterious intruder could be tracked and ascertain the identity of the mysterious intruder as much as possible, Shi Lei was very careful in his counter-tracing.

More than ten minutes passed, and Raphael asked: "Wisdon, are there any new clues?"

Shi Lei turned on the power switch of the voice-changing microphone and replied: "Mr. Feeney, I'm sorry, I'm still tracking. The defense strength of the intruder's transit server has increased a lot. If there is any latest news, I will notify you immediately

of."

"Okay!" Raphael responded with some frustration.

Regardless of what Raphael thought, Shi Lei turned off the power switch of the voice-changing microphone again, and continued to follow the clues of the mysterious intruder with Yi Zuer.

Almost ten minutes later, Shi Lei finally met the powerful cock!

All of Shi Lei's tentative attacks were resisted by the powerful broiler of the mysterious intruder. This powerful broiler, through Shi Lei's query, had a computing performance of at least 10tflops!

This kind of computing performance is already the same as Yizuer's parent server, which is the origin of supercomputers. It can also be ranked 59th among the world's top 500 supercomputers in the first half of 2006.

Faced with a powerful broiler with a computing performance of 10tflops, Shi Lei did not mobilize more powerful computing resources to directly break through the opponent's defense, but carefully explored system vulnerabilities.

Shi Lei has many system vulnerabilities, and they are vulnerabilities that have not yet been announced. Shi Lei now needs to test whether the unannounced vulnerabilities he has mastered can enter this powerful broiler.

After testing more than ten unannounced vulnerabilities in succession, Shi Lei couldn't help but be a little surprised when there was no response from this powerful broiler server system.

You must know that Shi Lei is a reborn person, and the loopholes he mastered will only be announced in the future. However, this powerful broiler with a computing performance of 10tflops does not have the loopholes that Shi Lei tried.

This explains one thing!

The mysterious intruder is really very powerful! He has at least mastered more than ten unreleased vulnerabilities that Shi Lei had previously explored, and at the same time, he has patched the corresponding vulnerabilities in the core program of the Linux operating system.

‘I don’t believe that this damn intruder has mastered all the vulnerability information!’ Shi Lei snorted in his heart and decided to come up with a trump card.

This trump card was a vulnerability discovered by Shi Lei himself, and it was an unpopular vulnerability in the system's underlying code. It was a very high-authority vulnerability, and Shi Lei named it 'Earth Thorn'.

This means that this kind of attack is like a spike suddenly popping up from the ground, and it is difficult to defend against it.

Through loopholes at the system's underlying code level, Shi Lei finally entered a powerful broiler with a computing performance of 10tflops. And in this powerful broiler, Shi Lei discovered some information.

Some information on the identity of the mysterious intruder!

.

PS: Thanks for the support


This chapter has been completed!
Previous Bookshelf directory Bookmark Next