Vol 2 Chapter 640: Fox tail (2)


The network is a virtual reality society! This sentence seems contradictory, but in fact it is plain and easy to understand. ; The network was born based on the real society. Similarly, it is a virtual society, but the so-called virtual reality society refers to some rules in reality, which is also applicable in the world of the network!
For example, as the old saying goes, the dragon does not suppress the ground snake, which proves that the ground snake is still very powerful in its territory, and the same is true in the network. The reason why Zhang Yang found this Australian hacker group is because in the Australian Internet community, all the turmoil has rushed, and the news of this hacker group is undoubtedly the most informed.
In fact, it’s not difficult to understand. It’s like, if you are a hacker, you live in [China], and suddenly the U.S. cyber community exploded Chapter 640. The tail of the fox (2) Various intrusions, although you will pay attention However, he said that he would not take it seriously, and carefully understand the behind these invasions, because it has nothing to do with you. At best, you are an onlooker who does not know the truth. To put it bluntly is to watch the excitement.
But after the same thing was born in [China], you will definitely earnestly understand how it happened, the reason, etc., because you understand that once such a thing happens, the country’s violent agencies and law enforcement agencies must intervene, and This is closely related to you. In case this event exposes your actual identity, you will be waiting for jail. Once you have something related to you, you will definitely be aware of it.
Therefore, Zhang Yang is looking for this Australian hacker team, who is known as the ideal, in order to obtain the resources in their hands. Of course, as for how to get it, there is a little trick in it. In fact, the overall strength of the ideal hacker group can only be said to be average, similar to the Black League, most of the members in it are king, geno their level, there is still a gap from the real super hacker.
Zhang Yang didn’t directly go to the connection, it was a login port, it was the fox tail (Chapter 640) that required a specific account and password to enter, and the core members of the ideal were just a few people. 1 Such a login port is bound to be monitored by software. Once the publicity is clicked, unless he has a specific account and password, or directly closes the page, otherwise, whether he is trying to crack or whatever, it will definitely be the first time Was shown by the other party.
After all, ordinary tourists who come to love this site will not seem to be hurt to help the site click ads? And it's still an advertisement in such a remote location. Zhang Yang opened the analysis software and analyzed the entire website. After finding its address, Zhang Yang started the invasion without thinking. The result of the invasion made Zhang Yang somewhat surprised. The ideal guys are quite fun, the whole Although the website was started by them, these guys did not do any defense against this website at all. It was just a simple server, and then the website architecture was built inside, and the firewall also used a cracked version on the market.
Talent! Zhang Yang is full of black lines, these guys will hide, but think about it too, if you make a junk website firewall super powerful, then as long as it is not a fool, this website will have problems. Even the intrusion is impossible to talk about. The system installed in the entire server is full of loopholes, and a few small methods are used casually. Zhang Yang successfully entered the server.
However, Zhang Yang did not get the highest management authority of the server in the first time, but was very small
Scanned the entire server with a scanner. The scanning process is fast, with the help of the starry sky and supercomputers, analyzing these junk servers is just a matter of seconds. After drawing the conclusion, Zhang Yang couldn't help but laugh. This group of animals is insidious enough. The firewall and system of this server are extremely rotten, but many places in this server system have placed a lot of highly hidden honeypots.
After carefully circumventing these honeypots, and confirming that no honeypots were touched, Zhang Yang directly copied the entire database of the same station to his computer. After the copying was completed, Zhang Yang quickly erased his traces and launched this website.
Opening his own anti-interpretation software software, Zhang Yang directly began to let Xingkong start anti-editing the entire website structure, he needs the source code of the entire website structure. The source code certainly hides the OP address and some information of their commonly used login port.
The speed of anti-editing is quite fast, that is, a few minutes. Starry Sky's performance is now too great to do these things is overkill. After finding his commonly used information in the source code, Zhang Yang immediately returned to Australia, and then searched for the OP address in the data record of Australia's national telecommunications network server provider.
Even if the OP address is not searched, Zhang Yang knows that this thing cannot be the four-adjacent address of any member of the ideal person. It is estimated that they are used by them. The address of the server used for contact. Finding such a server is naturally very simple. Finding a server rental company will be able to rent such a server, and there is no need for the parties to come forward. The current server rental company, as long as it is a regular company, can sign a lease contract and pay on the network.
It's just that although Zhang Yang thought that the OPa address would be the address of a server leasing company, what Zhang Yang didn't expect was that this address would actually be this. coincidence? Looking at the address searched on the screen, Zhang Yang was amazed for a while. This address was unexpectedly found by Zhang Yang just before. The address of the server rental trading company where the little hacker was working, and coincidentally, the server they used was this HG high. Technology company!
Fuck, it’s not easy! Zhang Yang was a little speechless. If he wanted to invade this company, Zhang Yang had already invaded. The reason why Zhang Yang didn’t do it was because he didn’t want to fight the grass for the time being. Although Zhang Yang has confidence in his own strength, the world is not afraid of 10,000 in case, No one is a god, no one can guarantee that he has never made mistakes, especially now that the other party may be Zhang Yang's fear, even when the starry sky is snubio from other people's hands, Zhang Yang can't be small
heart.
But now this link is back, your sister! It took a long time for Zhang Yang to roll his eyes. Now that he doesn't have a good solution, after thinking about it, Zhang Yang decided to start. It's not a problem to go on like this, who knows that he circled around and finally came back. Opening his own scanner, instead of scanning this OP address, Zhang Yang scanned the official website of HG Hi-Tech.
The result of the scan was very fast, and Zhang Yang was slightly surprised that this HG company has some strength. Their company's firewall is very good, and the entire system does not have any vulnerabilities, although some vulnerabilities that have not been announced yet still exist. But these few vulnerabilities are not too fatal vulnerabilities, which can be seen from this, the company's technical strength is really very good.
But this still can't stop the publicity, their company's strength is good, but there is still a considerable gap from the world's top firewall. After about 20 minutes, Zhang Yang successfully entered the company's internal network and quickly scanned the inside of the system. It was normal. Except for the firewall, anti-virus software and some security policies, Zhang Yang did not show any other Of honeypots, which proves that this company is in normal operation without any problems.
Is this really just a coincidence? Zhang Yang touched his chin. Originally, Zhang Yang believed that this company was definitely a problem, but now it seems that the facts are not what Zhang Yang thought. This company does not seem to have any problems on the surface, and the entire company's official website also Very clean, nothing messy. Looking at the scan results, Zhang Yang thought about it, and finally turned off the scanner. What is the situation of this company? Zhang Yang doesn't want to control it for now. Now he first hacked into the server of the ideal person and got the OPs address of the members in them. the most important.
From these people, Zhang Yang may be able to get some things that he did not know, and has entered the company's system, and then intruding into a separate server is naturally not a problem. Like this kind of server leased by a rental server company, whether it is a group of servers or a thousand groups of servers, the external OP address of each server leased to the same company must be separate, there can be no two companies The situation of sharing a static  appears. Unless these two companies are in good agreement, this may not be possible. Otherwise, according to the regulations of various countries, this situation cannot occur.
And this server is the ideal server they rent for interest ~ EbookFREE.me ~ so the number of servers does not have to be large, only two sets of servers. Server leasing companies, they are only responsible for renting the server and maintaining the server hardware to ensure that the server hardware does not have any problems. As for what the server is used for, whether it is used as a website, or as a game server, or a game private server or the like , Server leasing companies simply don't care.
In other words, in these servers, the firewalls of the companies that rent these servers are also different from each other. Zhang Yang rescanned his target server firewall.
Sure enough, the firewall of this server is quite advanced, which is in line with the strength of the ideal organization.
Zhang Yang analyzed this firewall, not any firewall that appears on the market, it should be written by their internal members. It works differently than the firewalls on the market. Scanned this firewall, almost all All external ports are closed, and no external data transmission is accepted at all. Only a point-to-point port is left open, which should be the login port on the website. ! ! ! ;
;
--------------
--------------
Latest chapter of Ebook The Strongest Hacker Click here