The Strongest Hacker

Chapter 39: The first broiler (Part 1)

   Chapter 39 The First Broiler (Part 1)

After carefully checking his own network and confirming that no one is following, Zhang Yang can’t wait to start experimenting with the things that GOD answers him. Zhang Yang’s current level is actually very high, but he seems like you build a building Like tall buildings, the knowledge of the Red Zone can only be regarded as a part of it, a whole frame.

   But if you want this building to be extremely strong, beautiful, and higher than other buildings, then the framework alone is not enough. The framework alone can only be said to be a rotten building. But with the framework, it is much faster to start from the foundation than others. What Zhang Yang needs to do now is to quickly fill up all these frameworks with the knowledge of Blue Zone.

   So after seeing the short answer of GOD, Zhang Yang can quickly understand it, and it is useless to recite these basic knowledge. Now the only thing is practice. In his answer, GOD even told Zhang Yang that many hacker chickens have been accumulated overnight, and it is not every time to look for broilers before the shot, then the newly found broilers are not safe, and prepare these broilers in advance, just It depends on your means.

Low-level hackers are looking for personal computers as broilers and springboards, and the masters are looking for servers of some companies, or even large servers of some high-tech companies. Because the switching time of personal computers is not fixed, and network restrictions may sometimes affect It works, but the server is different. Its computing speed is no problem, and its network is not a problem. As long as it can be called a server, then the network is at least dedicated line access.

However, since it is called a server, then the network security of these servers is naturally the responsibility of the security company. Unless you think that your strength is higher than these security companies, otherwise, it’s okay, save time by these security People track your IP, not worth the loss.

However, Zhang Yang now has a very good experimental object, that is, the school server of S University, S big money is undoubtedly undoubtedly, as the top universities in the domestic comprehensive university, every year is just a variety of graduates, successful career teachers Sisters donate a huge amount of money.

Therefore, S University, as a domestically outstanding university in science, naturally has no doubt about the strength of the computer department, and its server is also very advanced. The difference is that although the S server has a lot of security maintenance costs every year, But in fact, these servers are managed by the school's computer department teachers and students, and everyone knows where the network security costs go.

   These things are not necessary to say, anyway, the school's server has no important information, even if it is attacked by a hacker, it is nothing more than a loss of data, as long as you take out the backup. Speaking of which, the school's servers are reluctant to hire a special security company, which has another meaning.

The computer department of S University can be said to be one of the best in China, and the strength of the computer department of Q University, which is ranked first in the domestic comprehensive universities, is needless to say. The computer departments of these two universities have never dealt with it. of. There are indeed a lot of high-tech people in the animals in the computer departments of the two universities. If you invite a professional security expert, the cost of each hacking is too high.

   And if you don't care, the motivation of these students in the computer department of your school is not small, which is one of the main reasons why the S computer department can compete with the Q big.

But this also gives Zhang Yang a chance. In any case, the school server is also a server, which is better than a personal computer, and there is an advantage. If the school server is used as a springboard, even if someone tracks it, as long as Zhang Yang hides his own IP, there is no way to find it.

   The entire external IP of S or 30,000 people in S is a public IP. If you want to find a person from 30,000 or 40,000 people, the difficulty is no different from finding a needle in a haystack. At the beginning of the school, Zhang Yang easily invaded the school's mainframe, but this time was different from the last time. This time, Zhangyang wanted to build a super administrator in the mainframe.

Building a super administrator is not the main thing. The main thing is to hide the account of the super administrator. There are many people who manage the school server, so the account inside is also very complicated. The account of the super administrator is just There are seven or eight. Secretly invading the school's mainframe, Zhang Yang checked the several commonly used ports with his own scanner in accordance with the information given to him by the knife.

  It has been said that many hackers commonly used trapping methods in broilers are to set up and modify several major ports and some strategies. These policy settings are rarely viewed by anyone, and even super administrators will not go to check these things, so these places have become the most commonly used means of ambush.

  Because you want to set up a super administrator account, always go through these ports and modify the policy, and the trap they placed will send an alarm to tell the trapped host that there are people who illegally invaded the host. The power of this scanner by Zhang Yang will not be described in more detail. This is a scanner developed by GOD a few years later, and then after Zhang Yang studied with thanatos, he modified it with his own understanding.

The analysis results came out quickly. Zhang Yang originally thought that the school's server should not have any masters. However, after the scan results came out, Zhang Yang understood that he still underestimated this group of animals from the S computer department~www.wuxiahere. com~ There are a lot of hidden masters here.

   In several major strategies and port locations, there are several traps hidden, four of which are inadequate and very rough, and can be found with a little care. But one of the traps is quite clever. If you are not careful, you will think it is a system service, because it has been perfectly integrated with the system service.

   Zhang Yang was a little delighted immediately. After all, he had not enough experience in setting traps. Although the settings of these people were rough, he always gave Zhang Yang some inspiration and experience. But in the end, the trap of this system service is indeed quite clever, because it disguised as the key service of a system, and the real system service is hidden, so even the average master will not take it seriously.

It looks like there are a lot of "masters" on this server, hehe, but now I am someone Zhang. The main function of these traps is to work when you don’t find it. Once a master is found, stop them from sending alarm messages. It's very simple. Zhang Yang quickly bypassed these traps and began to crack the school's management system.

While cracking the school management system, Zhang Yang copied the virus he wrote. The tracking strategy and concealment of this virus are definitely more powerful than the super virus that Zhang Yang discovered. He doesn’t have to worry about being discovered. . And this embedded virus will automatically replace the key files of the system, while hiding the super administrator account established by Zhang Yang in a while.

  *

  Recommended votes are few... The top few in the new book list...The votes of others are thousands, we are very pitiful.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like