Vol 2 Chapter 122: Personal communication


Chapter 122 Private Message
Xiang Kun knows that in the eyes of many people outside of the industry, hackers are the best programmers.
In general, the title with "guest" is the king, the hacker with the "host" and the title with the "teacher" are the masters, and the "engineer" with the title of the "member" are all dicks...
But in fact, top programmers and top hackers are not high or low. They only specialize and excel in different areas. One is to find ways to meet and implement requirements and build systems; the other is to rack their brains to dig and exploit vulnerabilities to invade the system; One is studying building and the other is studying security.
There is no complete boundary between the two. Hackers themselves are a subset of programmers, and programmers can turn into hackers at any time.
Interest and specialization are in different directions.
When Xiang Kun was in middle school, he was obsessed with the handsomeness of hackers in film and television dramas and novels. He fantasized about hacking computers all over the world, hiding behind the screen and manipulating everything, and he was behind the scenes. Occasionally, I follow the tutorial to black out a few bad passwords and poorly maintained websites, but I didn’t actually do anything. Basically, I just wandered around, spied and left a txt or jpg file to signify my visit. That's it, just a very good script kid.
Now Xiang Kun is not unfamiliar with terms such as SQL injection, cross-site scripting, buffer overflow, heap spraying, etc. He also knows the principles, but he does it for a while to let him attack and invade specific targets. Less than. It is not only the different thinking habits, but also the different understanding and application habits of many vulnerabilities, as well as the lack of other large accumulations, such as many spare broilers, reserved backdoors, different levels of social work libraries, and special programs written by yourself or others Tools, etc., can not be done all at once.
Of course, although top hackers are powerful, they are not omnipotent.
Just like someone coming into your house, they usually don’t smash the door with a hammer directly. They either pretend to be a courier, check water meter, collect electricity bills, repair a computer, deliver food... or just take advantage of it. When you are not going out, or when you are sleeping, use the imperfect security and structural problems to sneak in through the window, unlock the master key and sneak in, and even follow you trivially when you go home from grocery shopping, and You enter the house together.
Even if you do not open the door, they can pretend to be your identity, collect couriers for you at your door, and send couriers and order takeaways in your name.
Unless you blow up all the roads outside your house (disconnect the internet), it is indeed a very bad thing to keep thinking about it.
But the premise of all this is that they know the real address (IP) of your home.
On the Internet, the most important information is the IP, which represents your location, and the mac address is your "name", just like when someone finds out that you live in a hotel, you must know your name to find you In which room, caught you.
The world is so big, if you don’t interact with people and there are no clues exposed, certain people may not be able to find you because they don’t know you are the person they are looking for.
But now, Xiang Kun wants to actively "send packages" with people who may be malicious to him and capable of tracking him, so he must be careful and be prepared.
The router in that coffee shop is like the uncle of the doorman who collects express mail at the gate of a certain community. Xiang Kun asked the uncle to help him send a package in the name of Xiaoming. Uncle asked the postal brother (network service provider) to deliver the package. Give it to him, as requested, the postal brother handed the package to the errand boy A (a springboard) contacted by Xiang Kun, and the errand boy A handed the package to the errand boy B (two springboards) as required.
Brother B took the package and handed it to an errands league (TOR). The errands league packaged the package outside and handed it to brother C. Brother C only knew that the package was delivered to XX city, so it was delivered Later, I found a little brother D in XX city to take over. He tore up a layer of parcel and knew that the next destination was XX Street. So he found a little brother E near XX Street to take over, and little brother E tore another layer of parcel. , Sent to the front desk of a company on XX (knowing the server).
When the company's front desk opened the final package, there was no address of the sender. They had to send the package back to the sender, but they had to hand it to brother E.
Then, brother E finds brother D, and brother D gives it to brother C. After returning all the way, it is handed over to brothers B and A, sent to the postal brother, and then to the security room of the guardian, he is Xiang Kun Lead away in the name of Xiao Ming.
So even if the front desk of the company (Zhihu) is controlled by the "wicked" and beat the sender E to death, the younger E can't tell the sender’s address because he doesn’t know at all, he just Knowing that it was given to him by Brother D.
Of course, this method is not completely safe and cannot be traced.
For example, there are "bad guys" informants in the errand boy league, or if the "bad guys" have been ruthless, they paid enough price and manpower to catch little brother D and beat them, then catch little brother C, and then found out about him. Brothers A and B both caught them and beat them and tortured them one by one.
For example, put a locator in the package sent back. If Xiang Kun opens the package, the locator will start working.
For example, sending Xiang Kun a truck of packages requires him to spend a lot of time to carry them, and gives them time to track down.
But in the end, even if they knew from the little postal brother that the final destination was a certain community, they even found the doorman, and learned that the person sending the package was named Xiao Ming.
But their immediate reaction was definitely to search the entire community and find this guy named Xiao Ming.
When Xiang Kun, who was spying on the side, found out, he took off the mask on his face, destroyed all the packages (virtual machine), and quickly retreated.
Xiang Kun had heard that when the police were investigating a malicious hacking incident, the deputy minister of public security personally supervised the incident. In the middle of the night, the telecom operators opened the gates to determine the location of the attack. Then the engineer drove the protocol analysis equipment in a computer room. A computer room was connected for testing, and the police uncle blocked the suspect's door before it was up.
Although it is determined that the opponent has no relationship with the official, Xiang Kun has always been accustomed to thinking about the imaginary hostility, just as the opponent can find his access IP to make a plan.
When I was thinking if there was anything I hadn't considered, Zhihu replied to the private message on "August Kasumi".
"You are also a vampire? How do you prove it?"
Xiang Kun had already anticipated this problem, and replied: "You can go hungry more during the day than at night. If you don't drink blood when you are hungry at night, you will be easily manic.
When he was considering answering, he thought about how to prove his identity as a vampire without revealing his identity. The less information he revealed, the better.
It's as if he didn't say that he was bald, molted, or changed teeth, nor did he say that he became stronger and his eyesight improved. After all, he was not sure if other "vampires" had the same changes as him, at least that "giant owl" But there is no hair loss or baldness. Once he says this, he will probably let the other party know that he is bald, which is an obvious feature.
"Kasumi of August" replied:
"Are you afraid of garlic?"
"I'm not afraid, but I can't eat. Except for water to drink, I can vomit everything I eat. I'm not afraid of crosses and Buddha statues."
"Wow! You are really a vampire! I finally found the same kind, so happy!"
Xiang Kun looked at the screen indifferently, sneered in his heart: pretend, then pretend.
Then reply: "Yes, I'm so excited too! I finally met the same kind!"
Kasumi in August: "Let’s use QQ to chat. Zhihu’s private messages are not safe for me. Maybe the administrator can see our chat! What is your QQ number? I add you!"
Pipika Kachuchu (new registered ID to Kun): "What is your QQ number, I will add you."
Kasumi in August: "424423"
Xiang Kun just wrote down the QQ number in his head, and didn't even search for it, let alone open QQ. After a while, he replied: "Oh, I forgot my QQ password. Come out, forget it, just say it in Zhihu's private message, people shouldn't have time to spy on the content of our chat."
Of course, he knows the purpose of the other party using QQ to chat. The private message on Zhihu is on the server of Zhihu. The other party has less authority, but when using QQ, it is easy to find a P2P method, and then Knowing the IP of the other party in the chat is equivalent to removing the company's front desk when sending the package and handing it directly to the other party's hands. The younger brother E who sent the package will be directly caught and beaten.
Of course, under the disguise of Xiang Kun, using tor to open QQ and chat with him, it is not so easy to find the real IP. It's just that Xiang Kun didn't prepare a new QQ account temporarily, and he didn't bother to change the way.
After a while, Kasumi from August replied: "Why don't you add a WeChat account? What is your WeChat ID? Don't you tell me you can't remember your WeChat password?"
Pipika Kachuchu: "What is your WeChat ID?"
Kasumi in August: "Hey! May I ask first!"
Pipika Kachuchu: "Forget it~EbookFREE.me~ I think we should talk like this first, how did you become a vampire? When did you find it?"
Kasumi in August: "Why are you not a gentleman at all?/Poor expression."
Pipika Kachuchu: "I am not a gentleman, I am not sure if you are of the same kind."
Kasumi in August: "Not sure why did you send me a private message? My answer is very clear, right?"
Pipika Kachuchu: "So how did you become a vampire, and when did you change?"
Kasumi in August: "There are many things I don't want to say in private messages. Either add QQ, or add WeChat, or call directly."
Pipika Kachuchu: "What is your WeChat and phone number?"
Kasumi in August: "You are too defensive. You have to get a vest to send private messages? You keep asking me for information, but don't tell me about my situation? You want to know when I became Vampire, how did you become a vampire, do you have to tell your situation first? / An angry expression."
Pipika Kachuchu: "You speak first, I will tell you later."
After a while, Kasumi in August made a sigh, and then replied:
"Well, I became a vampire a month ago. As for how I changed it, I don't know how it happened. It just happened when I woke up. What about you, who was your first food?"
Xiang Kun raised his brow. This reply revealed too much information, and the other party might not even realize it.
Latest chapter of Ebook What It’s Like Being a Vampire Click here