Xia Kingdom time, July 5th, is nearly nine o'clock in the evening. It is converted into Lijian Kingdom time, and it is only about eight o'clock in the morning.
Raphael was invaded and tracked by a mysterious hacker early in the morning. After receiving the help of Shi Lei as a Vest Wisdon, he tracked down an important clue.
The eleventh transit server of the mysterious invader is the web server of the official website of nhk TV!
What is the most famous thing in the hacker industry in recent times?
The answer is definitely two world-class hackers, using NHK TV as the battlefield, and have launched many wonderful hacker duels!
These two world-class hackers are Raphael and Mr. M.Nhk TV's official website web server, but they were just shot.
Now, the web server of the official website of nhk TV has suddenly become a mysterious hacker who invaded Raphael and the eleventh transit server controlled by him. Even without Shi Lei's reminder, Raphael himself will have an association about Mr. M.
"Wisdon, it's not that I don't believe you. But you know my relationship with Mr. M., so... Forget it, let's not talk about this, Wisdon, does your anti-tracking have a log record? Can you show me the log record?" Raphael asked.
Raphael was not too impulsive. When he heard the web server of the official website of the nhk TV station and Mr. M, he was about to make a duel with Mr. M.
The anti-tracking log proposed by Raphael will definitely generate a log automatically recorded by the system during the anti-tracking process.
Shi Lei agreed without any hesitation, and then passed the system log to Raphael through the voice communication channel. "Mr. Fini, we know everything about you and Mr. M. We know everything about you and Mr. M. Now, Mr. M has a bad relationship with our Miri Technology Group. Therefore, Mr. M is our common enemy."
Raphael quickly browsed the anti-tracking record log sent by Shi Lei. He personally confirmed the eleventh transit server of the mysterious invader, which was indeed the web server of the official website of nhk TV!
"Wisdon, do you suspect that this matter is Mr. M., who is making trouble behind the scenes?" Raphael asked Shi Lei.
Shi Lei thought about it for a moment and took the initiative to put forward an unsure view, "I don't know! However, according to my understanding of Mr. M, his defense technology cannot be so bad. So, I don't think it should be Mr. M."
Although Shi Lei took the initiative to say that the mysterious invader was not Mr. M, this statement is better than directly saying that the invader was Mr. M. If Shi Lei took the initiative to say that the mysterious invader was Mr. M, Raphael would instead suspect that the mysterious invader was not Mr. M.
But Shi Lei took the initiative to say that the mysterious invader was not Mr. M, and Raphael would prefer that the mysterious invader was Mr. M.
This manifestation is called confrontational psychology. The human heart usually involuntarily refutes other people's views. Especially when there are only two people, they usually do not agree with the statement of the person who speaks first.
It was precisely because Shi Lei used this mentality to design a pit for Raphael and let Raphael jump in.
"Maybe it's really not Mr. M!" Raphael replied, "This bitch who invaded me, his invasion method is not the same as Mr. M."
Shi Lei was a little surprised. Could it be that he had made a mistake in speculation about Raphael's psychology? Or was Raphael too trusting Wisdon?
"However, Wisdon, I also feel that it is Mr. M! The more the hacker that invaded this time is, the more Mr. M is suspicious. I really can't think of which hacker has to fight with me after I show enough strength." Raphael spoke again.
Shi Lei breathed a little relieved. He thought Raphael really agreed with his statement, and did not doubt Mr. M!
If Raphael did not doubt Mr. M, then Shi Lei could only give up helplessly if he could frame Mr. M.
"We don't know whether Mr. Fini, the mysterious invader, is Mr. M at the moment. However, as long as we keep track of it, we will have the opportunity to know the other party's real IP address and then analyze the other party's identity." Shi Lei made a suggestion.
"It's right!" Raphael agreed, "wisdon, let me handle the real IP address of the intruder next."
Shi Lei responded affirmatively: "Okay, Mr. Fini, once you find any useful clues, I will notify you immediately." After saying that, Shi Lei cut off the power supply of the voice-changing microphone again.
"Yuzhuer, analyze the web server connection IP address of the official website of nhk TV!" Shi Lei issued an order to Yizhuer, and he himself was thinking about how to use this matter to obtain the greatest benefit.
"Sir, the system retrieved the web server of the official website of NHK TV. There were more than 110,000 IP addresses connected in total. After the system automatically scans, analyzes and excludes the following suspicious IP addresses," Yi Zuer responded to Shi Lei.
Reversely tracking IP addresses is not a simple task, and it can even be said to be quite complicated.
For example, a hacker has five transit servers as broilers, where a server a is the springboard for the final end, and the hacker's terminal connection IP address is all IP addresses of a server.
Then, if you want to track down a hacker hidden behind the five transit servers, you must first find the connection IP address connected to the b server in server a.
Don't think that this is a simple task, just find the connection IP address of the server A and server B. If you know the address or tag information of the server B in advance, and then search for the connection IP address of the server A, that is indeed an easy task.
But what if I didn't know in advance?
The connection IP address to the A server is usually not just one B server, but tens of thousands, or even tens of millions of connection IP addresses.
It is really not easy to find the correct connection IP address among so many connection IP addresses! If you want to accurately judge the connection IP address you need to find, you need to analyze the connection data and track it to the previous server based on the data flow at the end of the server A. Thus, you can track it up one level at a time and finally find the source point of the data flow.
With the help of Yi Zuer, Shi Lei tracked the data flow of the mysterious intruder step by step. At the same time, he also wanted to avoid being discovered by the intruders, so as not to directly cut off the data flow of the mysterious intruders.
Although the method of directly cutting off the data flow is a bit rough, disconnecting the intrusion in this way will be able to be found by powerful anti-tracking personnel. However, if the real IP address of the source is irrelevant to the intruder, it will be meaningless.
In order to ensure that the mysterious invaders can be traced and to as much as possible to find out the identity information of the mysterious invaders, Shi Lei's counter-tracking is very careful.
More than ten minutes passed, Raphael asked, "Wisdon, are there any new clues?"
Shi Lei turned on the power switch of the voice-changing microphone and replied: "Mr. Fini, sorry, I am still tracking. The intruder's transit server has increased a lot of defense strength. If there is any latest news, I will notify you immediately."
"Okay!" Raphael responded with a little discouraged.
No matter what Raphael thought, Shi Lei turned off the power switch of the voice-changing microphone again and continued to track the clues of the mysterious invader with Yi Zuer.
Almost ten minutes later, Shi Lei finally met the powerful broiler!
All Shi Lei's tentative attacks were blocked by the powerful broiler of the mysterious invader. Through Shi Lei's query, the computing performance of this powerful broiler reached at least 10tflops!
This computing performance is already the same as Yi Zuer's parent server, that is, supercomputer. It can also rank 59th among the world's top 500 supercomputers in the first half of 2006.
Faced with a powerful broiler with a computing performance of 10tflops, Shi Lei did not mobilize more powerful computing resources to directly break through the opponent's defense, but instead carefully tested the system vulnerabilities.
Shi Lei has many system vulnerabilities, and they are vulnerabilities that have not been announced. Shi Lei needs to test whether the vulnerabilities that he has mastered can enter this powerful broiler.
Shi Lei couldn't help but be surprised after testing more than ten unreleased vulnerabilities in succession, but this powerful broiler server system had no response information.
You should know that Shi Lei is a reborn person, and the loopholes he has mastered will only be announced in the future. However, this powerful broiler with a computing performance of 10tflops does not have any loopholes that Shi Lei tentatively tested.
This shows one thing!
The mysterious intruder is really powerful! He has at least mastered more than a dozen unreleased vulnerabilities that Shi Lei had tested before, and at the same time, he has filled in the core programs of the Linux operating system.
'I don't believe it. This damn invader has mastered all the loophole information!' Shi Lei snorted coldly in his heart and decided to take out a killer weapon.
This killer weapon was a vulnerability discovered by Shi Lei himself, and it was an unpopular system underlying code vulnerability, which was a vulnerability with very high permissions. Shi Lei named him "Earth Thorn".
It means that this kind of attack is like a spike that suddenly appears underground, and it is difficult to defend against it.
Through the system's underlying code level vulnerability, Shi Lei finally entered a powerful broiler with a computing performance of 10tflops. And among this powerful broiler, Shi Lei discovered some information.
Some information about the identity of the mysterious invader!