The Strongest Hacker

Chapter 216 Unintentionally Inserting Willows (Part 2)

Chapter 216 Unintentional Chā Liu (2)

Chapter 216 Unintentional Chā Liu (2)

After finishing all this, Zhang Yang quickly connected to the mobile satellite base station with his mobile phone number, and directly connected to No. 1 satellite. Some of Zhang Yang's software is distributed and hidden in the network. Although the computers in his school are not turned on, Zhang Yang can still download a few of the software he needs to his pda.

In fact, Zhang Yang doesn't need much software, his main thing is to strengthen the defense of the pda, in case of any unexpected situation, after all, mak is also a computer expert. After returning to the hotel, Zhang Yang went straight back to his room. There was a computer equipped in the luxury suite, but the performance was definitely not very good, and Zhang Yang didn’t bother to modify it. Sitting on the sofa, Zhang Yang quickly started using his pda to hack Hilton The hotel's system.

The rooms in the hotel are all equipped with network cables, but the network cables in ordinary rooms are not provided free of charge, you need to buy a network card, or charge according to the day, the network in these rooms must pass through the Hilton server, and then connect to the Internet with the outside world After scanning Hilton's server, Zhang Yang's heart skipped a beat.

Satellite No. 1 is of course responsible for scanning. The pda in Zhang Yang's hand is just a command transceiver and display, and the main calculations don't rely on it at all. Looking at the results of the scanner, Zhang Yang was immediately sure that Hilton's server had been tampered with, and the person who tampered with it was definitely Mak.

If Zhang Yang hadn't secretly mōmō hacked into Mak's computer, he would never have discovered this well-hidden honeypot, this guy is very sinister. The reason why the honeypot is called a honeypot is because it is a trap. The functions of the honeypot are different, and the positions are also different. Most of the honeypots are so-called traps. When you touch the honeypot, jī After activating it, you will think that you have successfully invaded other people's computers, but in fact, you are a simulated system that has been hit by a honeypot.

And when you touch the honeypot, it starts to record all your actions and send your information. There are also some honeypots that encapsulate unactivated and extremely destructive viruses. Once touched, these viruses will directly infect your machine and start to wreak havoc, or destroy your computer, or destroy what you want s things.

There is also the last type of honeypot that is alarming in nature. It is different from the above two types. It is more secretive. Even after you trigger it, it will not make any changes that attract your attention. Its man sends an alarm, telling him that an enemy has stepped on the trap.

And the honeypot that Zhang Yang discovered was of this alarming nature. Obviously, Mak was very vigilant, it should be said that he was quite vigilant, and he had to do something in these areas just to stay in the hotel. However, a honeypot is like a trap. Once discovered, there is no threat. Zhang Yang has many ways to bypass this honeypot.

Mak is also very smart. He didn't modify anything in the Hilton server system, but secretly placed a few alarm honeypots in it. It seems that such behavior does not match his vigilance. In fact, this is the The smartest choice.

A hotel server, even a five-star hotel server, will definitely not be smarter than the servers of other large enterprises, because the hotel server is just a transit, and the hotel's official website publicity, etc., although there are internal Management system, but compared to other types of enterprises, hotels do not rely heavily on the Internet, which causes the security of most hotel servers in the world to be low.

You know, if you want to improve the security level of the server, the related security costs are not a lot of money every year. so,

In the case that the security of hotel servers is generally not high, if mak secretly modifies the hotel system, perhaps in this way, the hotel system security is high, but it will also cause another result, that is, if someone really hits If the hotel server had the idea, it would be obvious at a glance that the server had been tampered with.

In that way, even an idiot would know what to do, and mak, a few cleverly placed honeypots, if it weren't for Zhang Yang's habit of being cautious, and Zhang Yang had hacked into mak's computer before, he would know his With some habits, I am afraid that Zhang Yang will have a high possibility of being seduced by Mak.

Bypassing the several honeypots found, Zhang Yang successfully entered Hilton's server after about ten minutes. Without any hesitation, Zhang Yang directly placed the infected bug in. The infected bug is in stealth mode by default, the so-called The stealth mode means to try to infect other computers as much as possible, but it will not affect any functions of these computers. Except for secretly opening a back door, computer users will not find any problems.

This does not mean that the infected worm has no destructive power, on the contrary, the destructive power of the infected worm is absolutely unmatched by other computer viruses. The infected worm can not only destroy computer data, but also directly damage the computer hardware, but these functions are publicized Only rarely enabled.

The infection worm quickly spread to all the networks of the Hilton Hotel, and all computers using the network in each room in the hotel could not escape the fate of being infected by the infection worm. Putting the pda on the table, Zhang Yang directly turned on the computer in his room, checked the intranet IP of his computer, Zhang Yang quickly found the address of the next room.

However, there is no data exchange on the network cable in Mak's room. It should be used by no one, and Mak probably did not come back. Turning off his computer, Zhang Yang turned the programs in the pda to run in the background, then called Li Yingjie and Li Keqing respectively, telling them that he couldn't go back today. After the phone call, Zhang Yang also did not modify the Hilton Hotel's system, but began to place honeypots like Mak did. However, before that, Zhang Yang used the simulation system function of the brood to block Mak's honeypot from sending alarms .

Then Zhang Yang quickly started to place his honeypot. Zhang Yang set up a ǎǎo program. He set his honeypot under the mak honeypot. Once someone checks the mak honeypot or touches it, not only Only mak will receive the alert, and the program hidden under the mak honeypot will also send the alert to Zhang Yang's mobile phone.

To put it simply, Zhang Yang made another trap under the trap placed by mak. The trap of mak is to deal with the enemies who try to enter the system, while the trap of Zhang Yang is aimed at mak. After finishing all this, Zhang Yang quickly untied the iron plate tied to the otuǐ, and then went to bed to catch up on sleep.

Anyway, if Mak comes back, Zhang Yang will get the information, and he is not in a hurry. Lying on the bed, Zhang Yang quickly fell asleep. After an unknown period of time, Zhang Yang was awakened by the vibrating sound of the PDA in his hand. Sitting up quickly from the bed, Zhang Yang went into the bathroom to wash his face, and then picked up the pda to check.

It was already dark in the room, and it was obviously already night. When checking the news, Zhang Yang checked the time reminder on the pda, it was after 9 pm. Open the prompt message of the pda, the information is sent by the honeypot, someone just checked and scanned those honeypots, needless to say, mak must have returned.

And there is another feedback message sent by the infection worm. After opening it, Zhang Yang waved his fist. The computer before Mak was not turned on, so Zhang Yang had no choice but now, the infection worm has successfully infected Mak. among computers.

With the help of the infected bug, Zhang Yang immediately used the mō and then sneaked into Mak's computer. Mak's strength is quite strong, even if it is not as good as Zhang Yang's, but the overall strength may not be found anywhere, it's just that Zhang Yang has too many artifacts , so he is not an opponent at all.

After entering Mak's system, Zhang Yang did nothing but quietly monitored Mak's desktop. Obviously mak just came back, he is constantly logging in to his springboard, scanning the information of each springboard, and resetting the honeypots and traps in each springboard at the same time.

Mak, who was extremely careful, would never have thought that no matter how careful he was, a pair of eyes had already entered his computer, silently watching all his actions. Zhang Yang is not worried about being discovered by Mak. When the infection bug enters Mak's system, it means that he will be in tragedy.

The infection worm has been completely simulated as a key file of the mak computer system, and the infection worm will hide all the login information that is advertised, and the information fed back to mak by the system is not true at all.

Soon, Mak circled around the world under Zhang Yang's gaze, and then he logged into a ǎǎo program, which should be a contact tool, even though he didn't know who Mak was contacting. After logging into this program, mak quickly sent a message to a person named among the few friends in it to ask for information.

:"How are you?"

mak: "I'm fine here, what did f say in the last incident?"

: "The people who sent the past have sent back news that the clues have been completely interrupted. From the mouth of the Chinese who died last, the possibility of things being damaged and lost exceeds 95%. China's waste recycling market It’s too húnluàn, and I can’t find any useful information at all. There are thousands of waste recycling stations in the whole city of H, and many used hard drives will be dismantled directly after returning to the furnace.”

Seeing this, Zhang Yang's heart skipped a beat. Although they were talking about the hard disk, for some reason, Zhang Yang thought of his own server and the important partition hidden in the server. The encryption software extracted from that server, Zhang Yang unlocked a program in the laboratory system of Pan Asia Group, so there must be an inevitable connection between the two.

And the words of this gold coin made Zhang Yang's heart beat wildly. If it was connected between the two, then the murderer of Liu Liping's death would be obvious, and it was also sent by these people.

Mak: "How about the investigation about it?"

: "No results, it's very mysterious, but the above analysis is seriously inconsistent with our opponents, or people who defected from us, the strength is very strong, but these are not the most important, no matter how powerful the network is, it is useless , but the loss of No. 9 data made us lose the chance to become the world's hegemony! That was an accidental invention across the ages!"

Mak: "What the hell?"

: "If we knew, it wouldn't be so mysterious. More than ten years of investment and hundreds of billions of dollars in the laboratory disappeared overnight. If it wasn't for the backup system we set up to prove that there was information left, we would You don’t even know what’s going on in the lab.”

Mak: "Then do I still need to stay here? The stronghold of the Japanese intelligence agency and a dozen important agents have all been lost, and they have not obtained the information on China's latest stealth aircraft."

: "I asked f for instructions. Besides, it is not suitable for us to intervene in the affairs of the US government fǔ. You can go back to work tomorrow. If f has the latest instructions, I will notify you. I will start sending documents now. You Let's start accepting, is the environment confirmed?"

\u003c

br\u003emak: "Confirmed, I am safe here."

The conversation ended here, and then mak began to accept a file with a size of more than 200 m. But Zhang Yang looked terrified. From the mouths of these two people, Zhang Yang could already hear that these people are not only powerful in the Internet, but their real power may be even more terrifying. The investment in a laboratory is as high as hundreds of billions of dollars!

What is that concept? How many people in the world can come up with hundreds of billions of dollars? Although this investment is not a one-time investment, apart from the power of the state, Zhang Yang really can't think of anyone who can make so much money back and forth. But these people are obviously not a national power, nor are they the US government that is speculated.

The Hilton Hotel's broadband is a 100M optical fiber, and the speed of receiving files is very fast. Mak quickly accepted the files. Then Mak started to clean up his own traces, obviously his work was done, riding Mak to clean up his own traces, and when he exited from various facilities, Zhang Yang quickly started to copy the files in his computer.

Because of the help of the infested bugs, Zhang Yang concealed himself, so the alarm measures in the mak system became decorations, which were useless to Zhang Yang. In less than five minutes, Zhang Yang copied all the files that Mak had just obtained to Satellite 1, and then Zhang Yang quietly left Mak's computer. When leaving, Zhang Yang did not clear the files in his computer. The infestation worms just wiped out all the infestation worms in other places.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like