Font Size:
Theme:

Chapter 10:Tracking the Hacker

Li Chunfeng's mind was moved to the kinematic 1.0 to scan the hidden hole.

The information feedback was fast, and the hidden hole turned out to be a preset backdoor, apparently with hackers coming to the company's portal.

Set aside the back door here for the next time.

Although Li Chunfeng is not very clear about the world of hackers, after all, he developed the application software early.

However, since it is a programmer, of course, it is a very longing feeling for hackers who are online.

There is also some understanding of some basic hacking methods.

At this moment, Li Chunfeng did not expect that the backdoors reserved after the hacker intrusion were in this form in his own eyes today.

In the dumb laugh, Li Chunfeng quickly analyzed some of the information hidden in the small black hole, which actually had an information monitoring feedback address.

That is, this backdoor not only serves as a safe channel for the next intrusion, but also monitors the status of the server and feeds back the state of concern.

Li Chunfeng can't help but be a little eager to try, because through this feedback address, he traced it, perhaps you can find which hacker left this back door.

Li Chunfeng once again checked his own state, after all, he has just occupied a new server, has not yet fully adapted to the new environment.

At this moment, my mind quickly scanned the entire space, whether it is CPU, memory, hard disk, motherboard, optical drive, network port, printing port, USB port and other hardware devices, or firewall, anti-virus and other security software, and even the operating system, are quickly scanned and detected.

Li Chunfeng found that his scanning speed exceeded that of the previous public server, not only because the hardware has been improved, but also because of the software obtained from the virus after devouring the virus.

When Li Chunfeng confirmed that he was now very good, the most powerful moment since the reappearance of consciousness, he immediately began to track.

The kinewa 2.0 emitted by Li Chunfeng passes through the network channel at the speed of light and goes to that address.

The channel of the Internet, and the channel of the company's intranet is still very different, from time to time, Li Chunfeng through the kaminoel 2.0 can be found, the channel through the channel has become the sheep gut path.

There have even been cases of being blocked by many information packets.

Obviously, the network bandwidth in many places on the Internet is not as large as expected, of course, those trunks are much better, but the amount of data is much larger.

Li Chunfeng immediately discovered his new ability, and his knean wind 2.0 can actually penetrate those information packets.

Not even a single byte of information is lost in this process.

This is God’s ordinary ability, which means that on the Internet, Li Chunfeng does not have to worry about being stuck in a lot of data somewhere.

His kamiflu 2.0 will always be able to travel at top speed, which means that it will operate much faster than anyone.

Not long after, Li Chunfeng sensed that kamilies 2.0 came to a server, and kamilies 2.0 immediately began to multiply and replicate, and used this server as a node to penetrate and spread.

At this moment, Li Chunfeng did not know that this move would bring great help to himself.

Kami 2.0 quickly scanned the server and fed back some useful information, which was amazingly fast and almost in real-time.

Li Chunfeng found that the server should be the "broiler" set by the hacker (usually the hacker refers to the computer he has invaded and can be controlled at will as a broiler).

It seems that the hackers acted in the network, and indeed they used broilers as a springboard to prevent people from being directly traced to the IP address of the machine, so that they were found to be exposed.

Li Chunfeng did not lament too much, sense that kamiseek 2.0 has occupied this computer, and indeed found another hidden small black hole back door, from which to find a new address.

Li Chunfeng then directed the newly reproduced kamibox 2.0 to track the new address.

About 20 minutes, Li Chunfeng sensed that the godwind 2.0 has gone from China to M country, from M country to R country, from R country to country A, from country A to country Y, F and D and E, and finally back to M country.

During this period, incessantly circling, in many servers, Li Chunfeng found more than one hidden backdoor, apparently these servers, by several hackers set up their own broiler.

These have been recorded by Li Chunfeng, through the comparison of different hidden backdoors, Li Chunfeng found that each is different, there are special code segments.

Therefore, they are recorded as characteristic markers by Li Chunfeng, so that they will certainly encounter them in the Internet in the future, and then they can be identified accordingly.

Otherwise, the Internet has repeatedly encountered a hacker, how do you know whether it is the same or different?

According to this feature mark, Li Chunfeng always stared at the hacker he was first tracking.

In this process, Li Chunfeng unknowingly has spread his knean wind 2.0 on the Internet.

After another minute, Li Chunfeng found the hacker's trace back to Huaxia, and then locked in a computer in Haidu.

The computer has a multimedia peripheral, Li Chunfeng quickly through the kneumloid 2.0 control of the computer, and then from the camera, saw a young man with yellow hair dyed hair, but the age of fifteen or six years old.

I’m smoking a cigarette and talking to people on my computer.

Li Chunfeng frowned involunter, immediately thought that his action was meaningless, and couldn't help but spit on his soul form.

Looking at this little yellow hair, I thought this guy was just afraid that this guy was not that hacker.

As the copied kamiseek 2.0 quickly controlled the nearby computers, Li Chunfeng quickly understood that this was a home Internet cafe.

Apparently, the hacker used to go online at this Internet cafe, went online through this computer, and then connected his own broiler, went through a series of springboards, broke into the company's website server, and set up a backdoor.

The hacker is expected to invade the company again, but it will not necessarily launch an intrusion from the computer of this Internet cafe.

Li Chunfeng was a little disappointed, after all, he was hoping to track down a hacker.Look at your current form, what kind of sparks will collide with hackers.

Subsequently, there is some comfort, they perceive the kneumen 2.0 in the whole network circle, really saw a number of hackers, they set up the back door approach, but also let themselves open their eyes.

After perceiving exiting the computer of this Internet cafe, Li Chunfeng did not directly withdraw the attention thread.

From the methods of these hackers, it is obvious that the attack and retreat, they are through countless springboards, so this is also their own can learn the practice.

Because of its own ideas as an outer envelope, the kneumothelium 2.0 separation seems to have a great advantage in the Internet, and other hackers are difficult to find it.

But it’s always good to be cautious.

Li Chunfeng mobilized a kneumonic 2.0 in the domestic Internet to pedal the circle, sometimes from some of the computers or servers that have been controlled by their own kneumloh 2.0.

You will check whether these kamilies 2.0 are hidden enough to leave no trace.

Sometimes, when a new computer or server is discovered, it also stops, breeds and copies the new kamickery 2.0, and scans it to occupy it.

In this process, let him also see a lot of domestic hackers broilers, so their own hacker characteristics list is getting longer and longer.

Suddenly, a familiar feature appeared again, and it turned out to be the hacker who tracked the entire Internet.

This chicken is not in the previous path!

Then Li Chunfeng did not hesitate to command kneumer 2.0 and track down the address left in this new clue.

In just two minutes, Li Chunfeng sensed that kamikazing that Godwind 2.0 tracked more than 100 computers, and finally locked an IP address in the sea city again.

Li Chunfeng then manipulated the kamita-breeze 2.0 into and occupied the computer.

This is a laptop, Li Chunfeng's heart is happy, it is likely to be used by the hacker himself.

With the scanning of kneumen 2.0, the information and related data of this computer were quickly collected and fed back to Li Chunfeng.

Information flows at the speed of light.

At this time, in front of the camera, there is no one, the computer is open, and the person is not there.However, from the room layout, it should be a hotel room.

Li Chunfeng quickly found from the feedback that the owner of the computer should be called Deng Linger, and there were some photos on the computer.

Li Chunfeng looked at the girl in the photo with some disappointment, melon face, big eyes, wheat-colored skin, height of about 1.60, about 20 years old, with a ponytail.

Such a little girl who looks at the harmlessness of people and animals may not be the hacker.

Comments

No comments yet. Be the first to comment on this chapter!