Revisiting Future Path

Chapter 402: Hacker development

402th Hacker Development

Peeping at the deleted and undeleted chat records of the chat software, Sheng Jinhuan's image in Jiang Wenchen's heart has plummeted. It turned out that Sheng Jinhuan had always regarded Jiang Wenchen as one of the candidates for the spare tire. Sheng Jinhuan refused to pursue Jiang Wenchen's pursuit but often accepted Jiang Wenchen's affection, all in order to hang the spare tire and leave a final escape.

In fact, as early as the high school age, Sheng Jinhuan secretly hooked up with many wealthy classmates.

Even Zhai Wuhao is also Sheng Jinhuan's candidate. At this moment, Sheng Jinhuan actually already has a boyfriend who is studying abroad, but Sheng Jinhuan uses various excuses to persuade her boyfriend not to officially disclose their relationship. Sheng Jinhuan keeps her boyfriend with her underground love affair while continuing to hunt for better targets on a large scale. Zhai Wuhao is one of her options for deliberately using Meng Haiyong as a pedal hunting.

Jiang Wenchen was dumbfounded by the cruel facts.

Goddess, it turned out to be a green tea bitch.

Jiang Wenchen was suddenly very grateful for this second-hand laptop. If it weren't for the accidental intrusion of Sheng Jinhuan's laptop, Jiang Wenchen would never have thought that she was such a woman who was pure and lovely in appearance. Seeing Sheng Jinhuan's ugly face hidden in the dark, how much Jiang Wenchen once loved her, and how much he hates her now.

Jiang Wenchen's view of love has changed dramatically in a very short time.

At this time, it was less than a day before Jiang Wenchen got a second-hand laptop.

...

Everything about Jiang Wenchen was in the eyes of Wei Dongsheng.

In fact, there are no profiteers at all. Second-hand laptops are the golden fingers that Wei Dongsheng deliberately gave Jiang Wenchen. The 143 hacking utility tools, including communication monitoring software, were also collected by Wei Dongsheng from other hacker organizations or personally improved in combination with the computer intelligent life system.

At this moment, Wei Dongsheng's attention is all focused on the construction of the quantum wave circle. Wei Dongsheng does not want the Chinese cabinet, NATO group and other political forces to interfere with the quantum wave circle project. In order to ensure that they have no time to contain Wei Dongsheng during this period, the chess pieces represented by Jiang Wenchen need to keep doing things and divert the attention of the bigwigs. force.

Jiang Wenchen's dark game is positioned as a justice hacker.

Wei Dongsheng secretly observed Jiang Wenchen for several years and knew that although this person was often foolishly deliberately deceived by Sheng Jinhuan and others, he still had the courage to swear at the strong and the justice to insist on not compromising with the darkness. Just like now, Jiang Wenchen has got countless super hacking tools, which can easily invade the campus LAN of Panmen University and Panmen Institute of Technology. The lethality is very terrifying. However, in addition to deliberately peeping at Sheng Jinhuan's laptop because of his emotional obsession, he would rather save money through hard work than using gold fingers for illegal personal gain.

Of course, this kind of justice is definitely not the justice hacker Wei Dongsheng wants.

Wei Dongsheng immediately began to interfere in Jiang Wenchen's life in a planned way. The next week, Wei Dongsheng deliberately invaded the computer of Jiang Wenchen’s dormitory classmates, disguised roommate A’s computer as a Trojan horse, and made roommate C’s computer disguised as a virus, and guided Jiang Wenchen to practice basic knowledge of network security. At the same time, Wei Dongsheng controlled Jiang Wenchen's two laptops and smart phones to guide him to discover that there was a system of network security self-study materials in the study directory.

In this way, Wei Dongsheng began to urge Jiang Wenchen to learn the basics of network security.

Whenever Jiang Wenchen feels lax, Wei Dongsheng will deliberately create safety incidents in his interpersonal circle, forcing Jiang Wenchen to learn while solving problems. With Wei Dongsheng’s almost hand-in-hand teaching, Jiang Wenchen learned extremely efficiently. In just two months, he understood the general usage and general implementation principles of 143 hacking tools.

Feeling that Jiang Wenchen has a certain fighting capacity, Wei Dongshengfu guided him to register an account on the hacker technology forum "Evil Dragon Home" to join the hacker circle.

Evil Dragon Home is a niche professional forum for hacker groups. It is simply divided into five sections: science section, art section, programming section, security section, and advanced section. The science sector and the art sector are relatively active water zones, with various topics and different qualities; the programming sector is aimed at all programmers. Algorithms, architectures, back-ends, front-ends and even novices can find more or less similarities and cutting-edge technologies here. Posts one after another; the security section is the essence of the evil dragon homeland, and it is also the core feature of the evil dragon homeland which is different from other technical forums. There are countless script kids and industry elites active; the advanced section is a layer of screening mechanism, technical level Only at a certain level will you be invited to join.

Wei Dongsheng left Jiang Wenchen more than ten days to adapt and immediately started a new training.

But it is said that Jiang Wenchen has grown rapidly in the home of evil dragons, and gradually gained a sense of belonging. He posts posts from time to time to ask the netizens in the forum. Wei Dongsheng activated his long-prepared account, pretending to have an argument with Jiang Wenchen during a rebuttal, then stalked and mocked and abused Jiang Wenchen, playing the role of an Internet stunner who does not bite and is disgusting.

As the saying goes, who is behind the Internet knows who is who, and even if you change the vest, you can still curse happily.

This is the commonplace of forum exchanges. Some netizens rely on the cover of the Internet to act as actors, playing his non-existent profession, boasting of his non-existent wealth, and unreliable false information everywhere. With online cover, emotions will be extremely magnified, and the slightest unsatisfactory will swear. What's wrong with scolding you? Anyway, you don't know who I am, and you can't chase me in the real world anyway.

However, the so-called not knowing who is who is an illusion. For the vast majority of netizens, their Internet addresses and identity characteristics are recorded in the files of relevant departments. The relevant departments did not come to you because you have not crossed the cordon, just like the police in reality cannot be all right. It's nothing more than harassing you.

Cyber ​​security practitioners are a group of “Internet police” who are not cyber police. Although they have no right to investigate the private data of netizens, they have the ability to collect private data of netizens. As a professional forum for hacker groups, the contradiction in the virtual world of the forum often spreads to the real world, especially when the master dimensionality reduction punishes the script kid or the newbie who is not as good as the script kid, dig out yours every minute Reality identity.

This has nothing to do with personality and temper, it is purely a weapon in hand, killing intentions from the start.

Since I have the ability to punish you in the real world, why don't I take you hard in the real world?

With 143 easy-to-use hacking tools for fools, Jiang Wenchen naturally became murderous. After being ridiculed by Wei Dongsheng's vest once again, Jiang Wenchen started communication surveillance and other hacker tools with red eyes and angrily, invaded the server of the evil dragon homeland to obtain administrator rights, and obtained the IP address of Wei Dongsheng's vest when logging into the forum.

Wei Dongsheng's vest plays a low-level hacker. Since he understands some basic network security knowledge, he will definitely not use his "real IP" to log in to the evil dragon home. Jiang Wenchen realized that what he had invaded was only a broiler, and then he slowly contacted theory and practice. He passed one broiler and then another broiler, and finally found the real IP address of Wei Dongsheng's vest.

Of course, the so-called real IP address is definitely not real.

143 hacking tools such as communication surveillance came from Wei Dongsheng's hands, how could he fall in front of a novice like Jiang Wenchen. The real IP address Jiang Wenchen obtained was not Wei Dongsheng's real IP address, but the real IP address of Wei Dongsheng's vest. Wei Dongsheng's "real identity" was a member of a small telecom fraud group. Wei Dongsheng deliberately mocked and angered Jiang Wenchen in order to cause Jiang Wenchen and the small telecommunications fraud group to break into conflict, and then use the small telecommunications fraud group as a grindstone for training Jiang Wenchen.

Everything is ready, Wei Dongsheng happily appreciates the wit and courage of Jiang Wenchen and the small telecom fraud group.

Wei Dongsheng believes in Jiang Wenchen's righteous attributes.

Jiang Wenchen did not live up to Wei Dongsheng's trust. Although the intrusion into the nest of small telecommunications fraud groups originated from boring forum quarrels, Jiang Wenchen decided to punish them severely on behalf of justice at the time after eavesdropping on evidence that the telecommunications fraud groups were acting unscrupulously.

This group of telecommunications fraud groups is so angry.

Perhaps because urban students are well-informed and are not good at scams, this group of scammers amazedly targeted those poor rural students who were poorly aware of safety because of difficult family conditions. Jiang Wenchen witnessed a case in which the uneducated father of the victim worked hard at home and went to urban construction sites in the slack. He managed to save up for the college tuition of the victim’s sister and brother. This group of telecommunications fraudsters took advantage of the filial mentality of the brothers and sisters eager to relieve the burden on their parents, bullied the brothers and sisters did not understand the process of grants, and deceived their only hope in life. If Wei Dongsheng hadn't indirectly urged Jiang Wenchen to return the money to them in time, the brothers and sisters might have committed suicide in despair.

The more Jiang Wenchen understands the details of the telecommunications fraud group's evil practices, the more angry he is.

At first, Jiang Wenchen simply thought that reporting a crime would smash this group of telecommunications fraud groups, but the reality gave him a blow, and the local authorities ignored Jiang Wenchen's report. There are many reasons. For example, Jiang Wenchen reported the case anonymously from another place; for example, Jiang Wenchen had already returned the money to the victim and it was inconvenient to file a case; for example, the victims were in five provinces and 27 cities, and it was very difficult to investigate and collect evidence; for example, telecommunications fraud groups had Residents across the strait may act rashly or affect the country’s united front work, etc.

The reason is very good and realistic, but Jiang Wenchen refused to accept it.

Since the local authorities were unwilling to take the initiative to arrest, Jiang Wenchen simply presided over justice by himself.

During the summer vacation of 2015, Jiang Wenchen and the telecommunications fraud group handed over and fought hand in hand, playing with the local authorities as a means of coercing public opinion. Since your local department feels that these small cases are not worth making a fuss, I will try my best to break the veil of harmony and prosperity, exposing the information materials of the poor victims and the rampant telecommunications fraud group to all netizens, and let all netizens see if you should file a case for arrest. This group of telecommunications fraudsters.

If you like to re-take the road of the future, please collect it: (wuxiaspot.com) Re-take the road of the future. The literature is updated fastest.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like