Chapter 54 : Brother Dao is here! [4 more, ask for flowers for collection]

This sentence was not said by Mr. Yun, but by another man with a shaved head.

This person is impressively Dao Ge, the CEO of Bao’s Network Information Security Department.

As soon as Brother Dao came onto the stage, the eyes of the technical executives who came with the Internet giants all lit up.

Brother Dao, that is in their minds, a benchmark figure in the field of Internet security.

Those big guys looked at the technical supervisor beside him seriously, said.

“Look more, learn more, this kind of opportunity is rare!”

These, of course, do not need those bigwigs to say much.

After Brother Dao’s voice fell, six civilian hackers began to take action.

Just as Mr. Yun said, these six people can use all the means they can use!

On the big central screen, a virtual account jumped out.

Pointing to the virtual account on the screen, Brother Dao explained.

“This is an account protected by the network security protection zone!”

“There is a sum of money in this account!”

“In each round of links, we will appropriately relax some constraints.”

“Provide them with some convenience, so that these six hacker friends can show themselves more happily!”

As the picture on the central big screen kept beating, Brother Dao explained to the side.

“Now, we can see that in the first attack, the hacker used the phishing wifi and obtained the mobile phone number of this account.”

“Then they stole the bank card number of the account with a near-field card reader.”

Listening to Brother Dao’s explanation, many big bosses were a little bit trapped.

Use the Internet to make money, they understand. But with these technical terms, they are dumbfounded.

At this time, their subordinates came to use.

Those technical directors listened to Brother Dao’s explanation while explaining their puzzles to the big guys.

The principle of the near-field card reader: Whether it is a bus card or a bank card, it needs to support reading and writing the data in the card to some devices.

The near-field card reader is to use this kind of reading and writing technology to obtain relevant information of the user.

These technical methods that have never been heard of, make those big brothers feel a little nervous.

After this, it’s not safe to go out with a card.

At this moment, Brother Dao’s voice sounded around.

“Okay, let’s continue to look at this round of offense and defense.”


“The hacker has collected the mobile phone number of this account, and the bank card number of the account!”

“Next, they use this information to try to reset the account’s payment password.”

Having said that, Brother Dao smiled, and then continued.

“However, after resetting the payment password, an ID card is required.”

“Under normal circumstances, hackers cannot obtain the ID of the account holder in a short period of time, so…”

At this moment, the frames representing six hackers on the big screen are floating red.

“Unfortunately, the first round of logging in… failed!”

Listening to Brother Dao’s explanation, the big guys seemed to be surprised.

They have a deeper understanding of information technology security.

Only when they realize the seriousness of this problem will they make some choices.

Brother Dao shrugged and continued: “It’s the second round now.”

“In the second round, we provide them with appropriate convenience.”

“In this round, hackers got the payment login password of the account by hitting the database!”

“Crashing library? What is crashing library?”

“Crashing the library is the user’s leaked account password on other websites to try to log in to the user’s other devices.”

“Now, these hackers have obtained the user’s account password and successfully logged in to the user’s payment account!”

Everyone on the scene watched the data changes on the big screen and listened to Brother Dao’s explanation, as if they were on the scene.

This kind of experience of watching how others hack into accounts from the perspective of God made everyone really nervous and excited.

After all, these bigwigs are all expensive.

What if you encounter this situation with your company’s account?

How should they respond?

In the anxious waiting of everyone, the six images on the big screen became red again!

Brother Dao said at the right time: “It’s a pity that during the transfer process, the payment password could not be cracked! It still failed!”

“Now, we enter the final round! In this round, our conditions continue to relax!”

Sure enough, as the restrictions were gradually relaxed, these hackers showed great strength.

“In the third round of attacks, hackers planted Trojan horses directly in the user’s mobile phone!”



“Now, through the big screen, we can see that the hacker has completely controlled this phone!”

Sure enough, six different pages of mobile phone screens appeared on the big screen.

How do hackers plant Trojan horses? How do users get hooked by Trojan horse programs…

A series of behaviors showed clearly.

Brother Dao snapped his fingers and said with a smile.

“Now that they have a mobile phone, they can log in to the payment account of the account directly through the mobile verification code!”

“Then we can see…”

“The hacker chose to change the payment password!”

“To modify the payment password, personal information needs to be verified!”

“The hacker successfully changed the payment password through the bank card and ID photo stored in the mobile phone.”

“In this way, the hacker has all the conditions needed to transfer money!”

Brother Dao talked from beginning to end in one breath.

At the most critical moment, Brother Dao stopped, his eyes swept across the faces of the Internet technology executives below, and said mysteriously.

“I think, under normal circumstances, when a hacker has so much information, transfer a sum of money! Or steal some confidential documents, that’s easy.”

Everyone nodded silently.

After all, they pay the bill by themselves, which is almost the same process. *

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like