The Strongest Hacker

Chapter 454: Being tracked (middle)

Chapter 454 is traced (Part 2)

"GOD" Zhang Yang directly entered the ID of the GOD. Zhang Yang did not have the first time to let the infected insects carry out the simulation calculation. The infected insects have just said that the so-called theoretical data is just the calculation through network data delay and so on. , To calculate a theoretical position about how far away from the server, such a position can not be too accurate, at most it can be located around a city. ;

What is the population of a city? Even a small county has a population of at least 50,000 or 60,000? Find one of 50,000 or 60,000 people, and it is still a person who can hide themselves very much, it is no different from a needle in a haystack. But narrowing the scope is true, if there are other means, it can still be found.

The retrieval of the infected insect Chapter 454 was tracked (middle) very quickly. When the detailed data about GOD was listed on the computer screen, Zhang Yang couldn’t help but be surprised. To be honest, Zhang Yang only Suddenly realized that the infected insect carried more than one hundred. What kind of stuff does the data come back, it is estimated that it is not the system itself, but a variety of backup databases, and only the data in these databases is the real wealth!

Thinking of this Yang as if eating ice cream in the three days, Zhangu did not know how long it took to collect this information. Zhang Yang didn't know, but what Zhang Yang knew was that the person who was born under the bulge was a big loss . Take a closer look. . . All the information in, the more surprised you look at Zhang Yang, like. . . There are very few traces left by such people on the Internet.

Even ordinary people won’t find out that Zhang Yang thinks so. If he hadn’t studied GOD in his last life, then he can tell whether it is GOD through his firewall and some broiler software, I am afraid that Zhang Yang can’t imagine that it is actually here. There can be so much information.

The most significant analysis above is placed at the top. This is obviously the conclusion drawn by the psychoanalyst in Chapter 454 that was traced (middle) by Biao Rong. The original words are like this: " ... than. There is a very obvious legacy of the Chinese red family. According to analysis, there is a 70% chance that GOD’s home is a very prominent Chinese family. It is not recommended to contact." This is the sentence placed at the top Reviews.

Seeing this Zhang Yang was quite shocking. To be honest, Zhang Yang did not expect these people to substantively divide things into reality just from the Internet. It's not obvious whether the family at home is very prominent, but since the people of anubis dare to draw such conclusions, it is obviously based.

Zhang Yang faint is very curious. He would like to see the specific analysis later. There is a detailed remark information behind these conclusions. After opening the remark information of this sentence, Zhang Yang saw densely packed, detailed lists of each Most of this kind of evidence is analyzed from the perspective of psychology, but after reading this, Zhang Yang knew that this is definitely an analysis made by psychologists.

"..., to be sure, GOS is not very young and is a young man, but from the results of several contacts, the other party's conversation is quite organized, calm and calm, looking at the problem directly, and With a keen political sense of smell, this does not correspond to a hacker image and psychological characteristics that do not touch the society and like to live in the self circle and the network circle." Seeing this analysis, Zhang Yang thought about himself and himself. Dialogues that I have touched, as well as some ways to look at the problem, etc. If you think about it carefully, it is true.

Brilliant! Zhang Yang nodded, not easy! Surely there are all kinds of things in the anubis organization. Being able to have such a personality, vision, etc., naturally cannot be born in an ordinary family, nor can it be a simple hacker. someone said. Some characters can be born, they are fart, just look at it, and if it's true you will be a tiger.

Life is a blank piece of paper, what kind of experience has been kind of person, if you say that a child has not experienced the society, has not seen these things, you can have a keen political sense of smell, do things very calmly and calmly, see the problem Can Yin point to the key, do you believe it yourself? Anyway, publicity is unbelief.

For example, Zhang Yang can make it out. He has been calmer in his life, but it is still far from the smooth middle-aged people, although he has also experienced a lot. The following is a detailed list of dozens of various psychological analyses. After reading it, Zhang Yang almost believed the above conclusion.

What is a cow, this is the real cow! Zhang Yang sighed for a while. After reading this article, I don't have to look at the habits of the GOS collected below. It is definitely based on it. Zhang Yang immediately curiously knocked in the id of gscsd. When the infecting insects collected the Adam system, Yi Yang had already used the id of gscsd to work with anubis.

Therefore, there must be information about the id of gacsd in the Adam system. Zhang Yang just entered this id. The infection is faster this time, and he directly called Zhang Yang for a piece of information. When he saw the analysis at the top of gscsd, Zhang Yang almost fell into the ground.

"I rely on it." Zhang Yang almost spit out blood, and if let others know that anubis compares to Zhang Yang's evaluation, it is estimated that the jaw will be almost surprised. Infected insects have captured the Adam system for a long time, that is to say, these data are comments that the other party has given Zhang Yangding a long time ago.

"..., lunatic! Absolute lunatic! From the behavior style of gscsd can be captured, this person's psychology has been greatly traumatized, and there is a slight depression, which is the type of behavior that causes trouble to those who are faint. I don’t consider the consequences of doing things. Most of them are done according to my own preferences...""This is the top sentence. When I saw this publicity, I almost fell to the ground.

The evaluation of the lunatic is a bit beyond Zhang Yang's expectations, but the following sentence Zhang Yang does not know how the other party analyzed it, but it is undoubtedly pinched the key point of Zhang Yang, the huge heart trauma, I went, what kind of psychology The trauma is more serious than when you saw that you died once and then survived strangely, but lived a few years ago?

Don't think that rebirth has no effect on a person's heart. In fact, the impact is very large. The so-called mild depression, depression Yang Yang does exist, but it is because it is not serious, and Zhang Yang slowly let go Because of my own heart, I just like it.

Humans are born as gregarious animals. When you have a secret that you can’t say to anyone but you can only be pressed against your heart, you will find that it is something that can drive people crazy, if you don’t mediate yourself. . Seeing this, Zhang Yang was somewhat fortunate. Fortunately, they didn’t collect their information for a long time, so they didn’t find any useful information. And with the loss of the Adam system, these databases will naturally be lost. Although the other party can completely re-analyze one Come out but there will be a lot of things lost in the middle.

I don’t know if the other party has a backup, but now I don’t care if I have a backup. With this identity guaranteed, Bin ‘it’s impossible to doubt Zhang Yang. The important thing is that this thing is totally for Zhang Yang to make a wedding dress, anubis planting trees, Zhang Yang rides cool! Zhang Yang can now fully understand why anubis would go crazy after losing the Adam system.

If Zhang Yang's words, I'm afraid he will also go crazy. With the growth of time, the surprise that the Insect System loaned to Zhang Yang is getting bigger and bigger.

After researching, Zhang Yang thought of his main task. He immediately changed the name of GOD, as well as these servers, as well as tracking the honeypot from the tracking ratio. All the information collected in that hand was all entered into the infected insect system. Zhang Yangyun wanted to see if the infected insect could calculate the approximate location.

The calculation process is actually not complicated, and it is not slow at all. Zhang Yang does not know how this calculation formula anubis came out. After about ten minutes, the infected insect will have a result, but just see this result, Zhang Yang has some pain.

The answer is very simple, only four words, four words that make Zhang Yang almost. "Northeast China!" Well, it's simple and concise, but there is basically no difference between these four words. By the way, how big is Northeast China? The population is one or two hundred million. Looking for someone? Find it. More importantly, the accuracy of this approximate range is not guaranteed.

But this faintness proves that the theory of anubis is correct, at least it can be narrowed to a certain range. While Zhang Yang was studying infected insects, the situation on the Internet suddenly changed drastically. Zhang Yang didn't pay attention, but the infected insects reported dozens of messages one after another.

Quickly switching to the information screen, Zhang Yang's eyes instantly glared. I don't know what the reason is. Tracing the honeypot suddenly caught a large amount of data flow, and instead of capturing data indiscriminately as at first, but following the data flow autonomously and quickly.

At first glance, Zhang Yang knew that tracing the honeypot had a result, and had tracked the real target. The tracing honeypot is not the same as the ghost virus. The ghost virus is an autonomous virus, which is set according to your settings. It is required to go to track other people, and then feedback the latest post in the tracking name, as well as ip location, simulate cracking the firewall, etc. It is autonomously aggressive.

But tracking the honeypot is another matter entirely. First of all, it is passive. It is like a trap. It can only be triggered if it is stepped on by a prey, and it does not have the ability to attack others. The ability of the firewall, but its ability to penetrate the firewall is more powerful than the ghost virus, because it will simulate a data packet, but passively follow the locked data stream all the way.

It does not feedback the other party's mail information. Even if the feedback is the direction of the other party's data flow attack, instead of being able to follow the reverse direction like a ghost virus, it will automatically find a new connecting mail and then carry out the back tracking. It doesn't work, it can only be hidden in the other party's data stream, and the data stream is chaotically chasing. Wherever the other party goes, it can only track where it is.

And it will only track in a new direction. Perhaps it is very vague to say so. For example, everyone knows that the data flow is back and forth. For example, if you visit a website, this website will have feedback information back to you. , Of course, there are data streams feedback to you. For example, if you stepped on the tracking honeypot in this broiler, and then you went directly to the next broiler, this honeypot will immediately track you to the next honeypot, and when the next honeypot is tracked, the data stream returned will also It is the data flow to the previous broiler, this tracking honeypot will not continue to track.

So although this thing is extremely concealed, as long as you do not discover the honeypot in advance and then trigger it, the possibility of discovering it again is very small. Although its concealment is extremely high, there are few people who use it, because in fact, it does not have much effect on hackers.

Like Zhang Yang, when entering the network, he will first connect between the first-level broilers that he has already caught. These broilers are to ensure that no one has been invaded. Then most of the broiler chickens that invaded were also invaded before, or left behind. Although this small program will also connect to the network and send some information, all broilers have a firewall. Even if someone chases over, the most is to see the firewall.

If he wants to backtrack you, then it will be exposed. However, it's pretty good to use this gadget to monitor people~www.wuxiahere.com~ except that you can only see what the other party is doing through the data, and how the specific people are doing, you can't see anything. However, this is enough. Zhang Yang's method of connecting to this small program is not the same as other hackers. Zhang Yang has infected bugs, which can track the location through the data sent by this small program.

And Zhang Yang can follow the post directly with another broiler, so the other party will not find Zhang Yang. But now, this situation is a bit serious. This person does not know how to find the GOSD firewall vulnerability, or it is a knock on the door. He has broken through several GOD chickens in succession, and at the current speed, I am afraid it is very Tracking soon. The real concave mail.

Can't shoot? Zhang Yang hesitated, especially now tracking ratio. Who is Zhang Yang is still not very clear, there is a great possibility that it is anubis, but Zhang Yang has a hunch, it should not be anubis, at this time anubis should not be shot casually, the intelligence agencies of all countries in the world are staring at it quite Tight, anubis should not have this leisurely. Besides, GOD is not gscsd. GOD has been on the market for many years. If anubis does it, it will be done early. It won’t wait until now. ! ! ! ;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like