The Strongest Hacker

Vol 2 Chapter 639: Fox tail (1)

After Chen Xiaowei sent them away, Zhang Yang returned to the study. Starry Sky's retrieval information should have almost come out. Sitting in front of the desk, Zhang Yang moved the mouse, but he did not have the first time to check the starry sky information. It was sitting in a chair and meditating. Chen Xiaowei's words gave Zhang Yang a lot of reminders, so that Zhang Yang suddenly understood that the direction of this world is completely different from what he imagined.

Especially the relations between these countries, current affairs politics, etc., these things will often be amplified due to a small factor, and finally lead them to deviate from the trajectory in Zhang Yang’s memory further and further away until they go On the two roads, I am afraid that apart from those natural disasters and other things, most of the remaining events will be different from those in Zhang Yang's memory. Chapter 639 The Fox Tail (1).

After hesitating for a while, Zhang Yang thought about taking out his mobile phone, and then entered a series of secrets in the mobile phone, and then broadcast the phone. The phone rang for a long time before being picked up: "Hey, please find someone, speak." An English girl with a rich and quirky accent rang.

"I'm looking for Mr. Guriska." Zhang Yang said directly. There was a pause at that end, and it was only a long time before that accent continued to ask: "Is it Mr. Glow?" "No." Zhang Yang continued to smile. "Er boss, hello." Anthony's familiar voice came from the phone. The conversation just before was just an appointment between Zhang Yang and Anthony. The two made an appointment in private and did not tell anyone.

"How bar? Did I finish what you did?" Zhang Yang asked softly.

"Almost, we have basically set a strategic goal now. If there is another three years to consolidate, I promise, then in this country, the boss you say there will be no second voice." Anthony said quickly.

"Well, that's good!" Zhang Yang agreed with satisfaction. Zhang Yang's thoughts Anthony is the most important part here. Now I heard Anthony's progress far exceeded Zhang Yang's expectations. Zhang Yang, Chapter 639 The Fox The tail (1) is naturally very happy. "There have been nearly 500 million US dollars in succession. If there is no progress at all, I might as well be killed by the head. Don't worry, boss, now we have basically started to make profits here, and you don't need the boss to invest money in the rest. ."

"Well, in this column, I have no other meaning to make this call. I mean that I may not contact you for a long time in the future, but you need to reach what I gave you as soon as possible. Target, I will be of great use by then." Zhang Yang said lightly.

"No problem." Anthony agreed readily, and after making sure that Zhang Yang had nothing to do, Anthony hung up the phone. Hanging up Anthony's phone, Zhang Yang felt relieved immediately. After deleting all the relevant information in his mobile phone, Zhang Yang turned his mouse on the computer and checked the information retrieved by the starry sky.

Checking the comparison information of the starry sky, Zhang Yang's eyes narrowed slightly. Sure enough, there were great discrepancies in the reports of the Australian police and the media's own reports, especially in some murders. The official reports of the police were obviously hidden. There are many things, and although the media reports there are more materials, but because there is no evidence, it gives an incorrect feeling.

But in the end what the truth is like, I am afraid that only the talents at that time knew. Putting aside all of this information, Zhang Yang checked all the information of the company that the little hacker worked for, retrieved by Starry Sky, which is located in an office building in a high-tech zone in Sydney.

Looking at the address of this HG company, Zhang Yang suddenly thought about it for a moment, and Zhang Yang quickly found out the information found in the starry sky. Many of these materials are searched from the Internet by Starry Sky. Basically, there are basically materials related to HG. Of course, they are relatively important.

I rummaged inside and squinted, it was very good and very powerful!

Sure enough, it's greasy! The information that Zhang Yang sees is that the company that has business dealings with HG Company is originally fine, because there are only six companies that have business dealings with HG Company! As a company that specializes in renting servers, HG naturally has a cooperative relationship with other companies.

These cooperation information were all found out from some clues on the Internet, but these six companies Zhang Yang have just appeared, and the businesses they operate are basically the network, or the system or even the computer. This is very unreasonable. It should be understood that as a company that rents a server, it is impossible for all of its re-accounts to be companies in this area, and this point cannot be explained, that is, since it is a company that does this, their main business It is bound to be related business in this regard, so these companies are more than ninety-nine percent to buy servers by themselves! Instead of renting!

The most important thing is that after Zhang Yang retrieved all the information from these six companies, he finally showed an amazing gushi. The addresses of these six companies were actually one place! Although it is not the same at the end, these prove that the six companies and HG are all in an office building.

This is too fake. When you see this, as long as you are not an idiot, you will know that there is something stupid. Zhang Yang does not know whether the Australian police have appeared, and Zhang Yang does not know whether COa has appeared, but Zhang Yang knows that this possibility is unlikely. First of all, these confidences Neither the company nor the six companies have announced. When Starry Sky is performing advanced search, the information-capturing program it releases can be more powerful than that of googee!

In other words, you can use the star search program as a small super Trojan, because it can search for information in websites that are not publicly available, such as some information in a company's internal network. Another point is that these so-called cooperation messages are only based on the calculation and analysis of the starry sky. They are not divided, and there is no direct information indicating that there is a connection between them.

After hesitating, Zhang Yang turned off all these materials. After thinking about it, Zhang Yang started to open his springboard all over the world. Zhang Yang’s springboard has been useless for a long time. These springboards are afraid that there are many backdoors that can be used. Some of them have disappeared. , Either by the other party's present or the other party's upgrade system destroyed these hidden backdoors.

The more hidden the backdoor, the higher its disguise, and the higher the disguise, the more vulnerable it is to this. Such as upgrading the system, etc., will passively destroy these backdoors. Because these backdoor camouflage procedures are normal system services, so even if these backdoors are checked out, they will not doubt that this is artificial, this is the highest state where the backdoor is placed.

Like those hidden backdoors that are not easy to be seen, although they are hidden enough, and they are also not easy to show, at least the technology cannot reach a certain level and those backdoors cannot be found at all, but these backdoors have a significant disadvantage , That is, once it is revealed, others will immediately know that this is artificial. Someone left a backdoor in the system, unlike the backdoor used by Zhang Yang. Even if it is revealed, the other party just thinks that The system service or other is not optimized, not handled well, or it is regarded as a loophole. It would not be considered artificial.

Such a backdoor can guarantee your safety to the greatest extent, because you can’t use the broiler all the time. Once you are not using it, the backdoor you left is displayed, and it is determined that this backdoor is artificial. After that, the other party can easily place various honeypots in the system to specifically detect your backdoor. Once you enter the system illegally through this back door, maybe your whereabouts have already been discovered by the other party's honeypot.

Then you will be directly passive. If the opponent is a master with the same strength as you, you can't run away. In fact, don’t look at hackers. It seems to be very secret. Even if you do bad things on the Internet, others will not be able to see it, but the war between hackers is actually cruel. As long as there is a small mistake by one party, under the current technical conditions and strength, you are very It's hard to get rid of each other unless there is a big gap in strength between you.

After connecting all the backdoor broilers you can use. Zhang Yang directly began illegally invading Australia's official telecommunications system. Zhang Yang did not access Australia's networks through normal channels, such as opening Australian websites and then accessing information on these websites. Such methods did not get any useful information at all. information.

Zhang Yang is now invading the entire Australian telecommunications network, which seems vague to say, but in other words, to make an analogy, compare a country to a huge WAN, all users are in this WAN Users, and our users visit these websites normally, as if everyone is walking up and down the street in a fair and decent way, to see our friends and neighbors in another community.

But what Zhang Yang is doing now is to investigate these communities and the information of these neighbors from another side, such as the filing information of this community left in the city, its household information, geographic location, which equipment is attached, and so on. These things are stored in the whole country and can be said to be another network system hidden under the normal network. It is not open to the public. Ordinary people will not know that there is such a place.

In fact, to put it bluntly, this hidden network system is the record of all these websites, and seeing some digitalized things in it is a boring thing. And no one will check such things. Although each country maintains the operation of such a network, these data are all computer data, and they are too large. In addition to those fixed records, other temporary data, The numbers generated every day are enough to crash the world’s largest supercomputer, including the starry sky.

The reason why Zhang Yang entered this system does not mean that he is a god. He can get some of what he wants from here, but Zhang Yang wants to see what the current network environment in Australia looks like. Undoubtedly, through this method is the simplest.

Finding Australia's national telecommunications server, Zhang Yang sneaked into it. For Zhang Yang, the current firewalls that are now known all over the world are backward products for him, and they can enter silently without much effort.

After entering this server, Zhang Yang immediately began to quickly input a few commands in the command input box of Starry Sky. In fact, it was very simple. Zhang Yang wanted to let Starry Sky count the illegal access generated in the entire network in the recent time period. What is the difference between the data and the usual?

This kind of data-based stuff is easy to count. It takes about ten minutes. Zhang Yang got the information he wanted. Looking at the data that appeared on the computer screen, Zhang Yang immediately whistled. It looks good. Australia is really surging at the moment.

Judging from the reality of the data, although Zhang Yang cannot know how many hackers there are, or which hackers it is, it is impossible to know which websites were attacked or which networks were hacked, but Zhang Yang does not need to know these, Zhang Yang only needs to I know that at this moment, the number of hackers active in the entire Australian network system is at least three times higher than usual. This is enough.

However, these data are tossed out by one person, or a team, or dozens of people tossed out, but these data all prove that ~www.wuxiahere.com~ There are really great people here in Dalian!

I didn't expect that I was Liu Chengyin, but I wanted to draw COa's sight casually, but now it seems that I found this cunning fox by mistake.

Is this fox's tail true, is it grown on the fox, or the tail that has been cut off by the fox? After exiting this system, Zhang Yang erased all his traces. Apart from this effect, there is no other use here. Thinking of getting other information, Zhang Yang had to do it himself.

After thinking for a while, Zhang Yang thought about it, and quickly entered a URL in the address bar. This is a very common **** ~ love website. At the same time, it is also a very old trick. The eye-catching spam link is a server login port that a well-known Australian hacker team usually contacts.

Zhang Yang knows a lot of hackers in his head. Although he has rarely contacted these hackers in his life, Zhang Yang in his last life is well-known in the hacker circle all over the world. ! ! ! ;

;

--------------

--------------

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like