Chapter 59: Cicadas catch mantis (middle)


  
  King and others were speechless for a while, but they didn't have any opinions, just quickly checked their machines, and then opened several gossip forums, always paying attention to the status of these forums.
Zhang Yang is very hot. He was originally planning to directly hack out all these gossip forums, and then put some hardware destruction viruses into it, and directly exploded their servers. In the end, he endured it and exploded these gossip forums. Any benefit, and it will attract the attention of the network supervisor.
In the eyes of outsiders, this department may be an ordinary one of the thirty-six branches of the Ministry of Public Security, but Zhang Yang, who had been with thanatos for a long time in his previous life, knows that the Network Inspection Bureau is not as simple as it seems on the surface. It is divided into several groups, and this bureau is not just under the name of the Ministry of Public Security. It is only superficial. It also directly belongs to the National Security and the General Staff.
   The Network Supervision Bureau is divided into internal and external departments. The external department is what we usually think of as the network supervisor. It is responsible for the network security of the general public. It belongs to the Ministry of Public Security. Some virtual transactions on the network, virtual fraud, etc. are under their control. The internal branch is responsible for more things, and their main job is to manage internal and external hackers.
  Hackers are a special group. It seems that there are many hacker lists in the internal network inspection bureau. Some of these hacker lists are self-reported, and some are stored by Guoan. And if this special group is not managed well, it will be no less harmful than some terrorist attacks.
The direct economic loss caused by the famous September 11 incident in the history of the United States is about 40 billion US dollars, and indirect it is an astronomical figure, but at this stage in the life of people, the Internet is generally widespread. If there is really one If the super hackers are mad, the losses will be only a lot more than this figure. You know, almost all the financial order in society today is based on the Internet.
  After all, these gossip forum websites are regular websites, the server was destroyed by someone, and the police also said that in the past. I searched the post with Baidu and found several gossip forums that posted this post. Zhang Yang opened all these websites directly. After finding the most recent website, Zhang Yang immediately found that the ID of the posting was still online.
After pulling out his own scanner and infected insects, Zhang Yang directly released the infected insects, scanned the port of this website server, and confirmed that there were no honeypots or the like, Zhang Yang quickly entered the back door opened by the infected insects and entered directly Inside the site, after secretly giving himself super permissions, Zhang Yang started looking for the IP of the post ID as soon as possible.
The firewalls of these gossip forums are actually very rubbish, and they are broken like a poke. These forums are totally based on the traffic brought by these messy posts to collect ads to make money. It is not a powerful company at all, and firewall spam is also justifiable. . Even if you don't need to be infected with worms, Zhang Yang does not take ten minutes to invade a web server like this.
   But for the sake of speed, it is most efficient to use infective insects. After finding the IP of this ID, Zhang Yang quickly touched it. This is the first time Zhang Yang’s two lives have added up to track the IP of others. Thinking of this, Zhang Yang feels quite sad. The last life was too miserable by thanatos. No.1, which is known as the Red Zone, has never followed anyone. The only limited number of times is using the software of thanatos.
Soon, Zhang Yang touched the front of a computer along the data stream and scanned the computer with his scanner. Zhang Yang sneered. The grandson Pan Wenlong was quite smart and actually got a broiler. But seeing this broiler, Zhang Yang's face was a bit dark. MLBGD, like rookie Pan Wenlong, could use a computer as a broiler. Isn't it too bad for him to mix up in his last life?
   This computer is obviously a personal computer, the system used is still XP, after scanning it, there are at least dozens of loopholes. Zhang Yang was speechless and quickly picked one of the most vulnerable vulnerabilities. Zhang Yang didn’t even bother to use worms. He easily entered the computer and Zhang Yang quickly got the address of the next IP. Seeing this IP, Zhang Yang I feel familiar.
  Thought about it, Zhang Yang suddenly realized, I rely, is this not Baiying Security's external company IP? Pan Wenlong's grandson actually did this in his company? Originally, Zhang Yang had plans to think about how to get some money from Baiying safely, but now Zhang Yang can't control so much, money is thinking of another way, but this matter can not make him comfortable.
Pan Wenlong is not stupid, knowing to post these posts in his Lao Tzu's company, even if some people want to check who he is, Baiying Security's firewall will provide him with protection, so that others are not so successful, but Pan Wenlong never thought that Baiying's secure firewall would be the same for Zhang Yang as Zhang Yang himself.
   After easily entering Baiying's secure internal network, Zhang Yang quickly found his location through Pan Wenlong's data stream. From the company's internal network IP distribution diagram, Pan Wenlong was surfing the Internet in his Lao Tzu's office. However, according to the IP logo of the intranet, the IP of this computer is not specified~EbookFREE.me~ Obviously, Pan Wenlong came with his laptop, and then used the network cable in his Laozi office to get online.
Sneaking into the computer used by Pan Wenlong, Zhang Yang immediately saw the account of Pan Wenlong's animal registered in the school forum. Obviously he still wanted to send the post back, but Zhang Yang just hacked the school's server. It was estimated that the school's The administrator is checking the server, and the registration response is very slow. After a while, Pan Wenlong changed a forum and continued to register.
   "MLGBD." You are so cruel, Zhang Yang scolded in his heart, since you are doing the first year, you can't blame me for fifteen. While monitoring Pan Wenlong's computer, Zhang Yang quickly checked it in his computer to see what could be used by himself.
   There are not many files in Pan Wenlong's computer. In addition to a lot of messy games on the F drive, Zhang Yang quickly found an encrypted folder in the hidden folder of the E drive. The name of the folder is called linear algebra. Isn't this TM trying to make it obvious? Linear algebra is also worth you to hide the folder, and then use encryption software to encrypt?
I turned over the D disk again, and Zhang Yang quickly found a file in the D disk again. It was a DOC file called backup. Zhang Yang copied the file to his computer and opened it. After opening it, Zhang Yang was happy, I rely on it, This document records some numbers and English, and some annotations, and at a glance, it is estimated that it is the account and password of some forums of Pan Wenlong. Isn’t this SB? You are the son of the CEO of a security company, can't you stop hackers from invading your computer?
  
  Want to know what happened, hey, leave the ticket! ! !
Latest chapter of Ebook The Strongest Hacker Click here