Yang with a 'left-root' the ID in, into 13 people have been found, but do not know. Smoking cigarettes, free audio, came from listening to the noise, it seems that they always talk about the incident can not be separated Sina was black.
Look at the time there are less than 20 points the entire 5 minutes, nothing else to find that the voice chat room is used by CGI scripts written in PHP to run, but too many of them mixed with plain static HTML text, read the voice chat room, to the Yang the feeling is only one word, Jane.
Prepared in this way can make those bad thoughts of hackers. The first time he attended such meetings in the network, the heart slightly curious.
Could this country are meeting in HK site?
This is very simple built-in voice chat room, who taking it every wheat can talk. Yang microphone this thing is not the bedroom, he does not commonly used, it never even when configured with a computer.
"Left root?"
"Well? Left root ID Who is this? Little good, you know?"
"Do not know! I still wonder what, and so the tiger came to ask! May be his call came!"
"Left root! Left" in their life
Chat rooms all the people have seen the existence of the ID, are looked speculation. Chat room who is not a technical director in HK Union is the regional director, to get this location, technology, may also have quality.
[Tiger on-line]
[KOK on-line]
20 points the entire night, while the two men on the line. Yang supine body slowly sat up, drawing on a cigarette then snuffed, he is aware that the tiger, as KOK, inside the mouth of the tiger must have guessed that the mysterious person said.
"Well, time! You all here, including myself, attended by 16 people, left my roots and the KOK are invited guests."
To judge from the sound, Yang guess Tiger is a man of about 30. Then all the other people did not speak to waiting for the tiger below.
"This summit, mainly for Sina and FD University is black events. I think we all know black hand behind the scenes, according to previous information we have, tentatively called the snowflake groups."
Paused, tigers and Road "Sina is black for 6 hours, began to recover around 19 pm. In the dark we found that Sina is, the first time to follow behind, but can not track down any clues, as we have snow group do not know much, I call for everyone to talk about snow KOK group on deeds "
KOK? Yang did not mind any of the information on the KOK, squinting out the window looking at the dark, a listening ears.
Then came the sound sizzle, the other as it seems in for wheat, and it takes a while, one can not tell a man or a woman voice.
"Snow group, members of the unknown, set up years is unknown, appeared on the network time is August 2003, the first attack is to undermine the U.S. banking system, the duration of day and night; 2004, the second attack destroyed the German network order, the duration of five days and nights; 2006, the third attack is a sneak into the White House's official website, the duration of three hours; September 2008, the fourth attack the Chinese portal Sina and FD University Forum duration of six hours, this is the time snow group of four attacks and objectives "
"They attacked, whether by the server or the operating system or Web site, have in common is the snow drift, and this organization in the United States ranked third on the FBI list, destructive, and considerable extent of the damage."
"Smack!" Yang lighter in his hand he tried to light a cigarette, was stunned to hear His words stopped, the brain's suspicions instantly dispersed, muttering, "FBI list, snow dancing fingers, I say how so familiar! I see! "
FBI list, is the U.S. government is very tough for some destructive set of organizations. Yang was young, broke into the FBI has an internal system and steal confidential documents some techniques, which also found this list. Memory clear, he remembers this is written on the list!
Name: Snow
Damage: Eight Star, the third
Type: Organization
Features: Paint paint requirements, such as night ... snow ... snow drift fingers dance.
Deeds: sealed!
Comments: The organization is very mysterious, destructive power. Should be closely tracking with, find out immediately upon arrest.
Hesitated a moment, Yang genius slowly spit out a repeated smoke. At this point, chat rooms are heated discussions, we have been brought news to the shock KOK live. Mixed in the black hat circle, knowing FBI has a list of people a lot, but few people know the details, but do not know what tough on the list of roles.
Snow group the third largest in the FBI charts, giving them the shock is not great, they shook the snow group's deeds, four large-scale attack duration as short as four to five hours or as long as four or five days, more frightening is that they can get out, even in the FBI ranked third on the list, they are still so mysterious.
Wait a moment, Yang found that the guy is called KOK not continue, he also inadvertently listening down. After landing a Tiger MSN message said that they have to leave in advance, then, it will exit the chat room.
"FBI list?" Laugh loudly, Yang leisurely smoking a cigarette, looking at the ceiling. Others may not know this FBI list is what, but his heart is very clear, he knew more than one FBI list, the specific number is not clear, but not less than three.
As for other countries, every government department has on the hackers list.
"China? Presumably Security Council should be!" Yang did not invade the National Security Agency's system, not his patriotism, but not flawless Security Agency's defense system.
He was born in China, pregnant at the bottom of my heart for the national respect, not to mention the State has not touched his bottom line. Whether national or individual if he touched the ground, he would not hesitate to kill its H!
Economy is the backbone of a country, many countries in this age of science and technology of the network path. Now what is the most terrible, the thieves? Police countries; thugs? Countries have armed forces, the most terrible knock on the keyboard to behind the scenes is harmful to the national economy can be a hacker.
They are a special existence, is a mysterious and terrible power. Therefore, each country is very concerned about hackers, to receive the income, the state has a number of highly destructive hackers, groups or individuals included in the list, if the network order in their country is destroyed, then immediately delivery check list to filter Finally, catch the culprit, direct action.
Thought, squinting Yang points to the window looking out the window, spit out a repeated smoke, look up at the night sky the little stars, muttering, "hackers can not see the light, like the stars at night, can feel it touched !, "paused, pumping cigarette, then said," around the nest, can stand on top of the black domain it? "Then, draw the curtains, and turned to the machine before.
"Solitary, may be a habit!" Yang said something strange, then shook his head, his hands instantly appear in black paint on the keyboard.
Turn off the useless tools on the desktop, pull out the IP address of the previous 10 months, he started to chase.
ZT opening the scanner, enter the 10 IP, tools began to run.
After the third, the IP address of the type, configuration, port open and set the protocol, all results presented in the declaration forms.
Yang careful analysis of the moment, removed from the 4 IP, 4 IP from the scan this situation is entirely a personal machine, configure the general, a lot of open ports, either chicken or a springboard to do is not suitable.
The remaining 6 IP, one is in Beijing, four British, one American. Yang may have been aware of these chicken or a springboard to the other side you want to find the real IP, is indeed difficult.
Open the 'Floods' filter, the IP address of the United States entered into, before he was ready to pursue a single IP, because IP 6 IP Access in the United States, the most frequent, that is the biggest suspect.
This time, he was elected by spike-type attacks, so the chicken hands together at the U.S. bombing of IP were endless, if the U.S. IP system crashes behind the left rear door is fully exposed, this time, 'flood' filter Fast track to the IP connection with the U.S. chicken, followed by cycle.
Time gradually passing away, and 'flood' is still continuing pursuit of the filter.
And the lion in the last World War, Yang repair the damaged 15 and auxiliary machinery, but regret that three of them can not connect, the only answer is the other's network security personnel found a back door, and remove the marked patch.
Yang subordinates 'military force' is now only 12 generals, and 380,000 foot soldiers, while the number of soldier every day on the decline, because 38 million chickens and a large server, it completely fixed, as long as the other re- loading system, Yang left the back door will disappear.
21:30, 'flood' the filter to run a full hour, chasing the IP for another change. Every half an hour Yang lit cigarette, squinting stare filters, often leisurely spit smoke.
"Springboard for many, has been chasing the 36! No wonder so mysterious, just a springboard for his mother with so much the cover of the old black king is not necessarily the United States can catch you!" Yang quiet voice himself.
Then, abruptly, 'flood' the filter to stop running, trying to sail Yang puzzled, but to hear the 'Great Wall' firewall alerts sent!
Drop -! Bit sound constantly, 'Great Wall' firewall pop up a window.
[Illegal IP intrusion 3 and auxiliary machinery, whether to prevent]
Interval of 5 seconds and a window pops up [the illegal invasion 4 slave IP, whether to prevent]
Yang to come forward to take the side of a straight, quickly click to stop the invasion, and then from the 'flood' to stop before the filter to find the IP address is being pursued.
ZT detail pulled into the scanner scans. After 30 seconds, the feedback the result declaration, Yang stare eyes, the scalp burst suddenly felt numb, stunned present.
"Shit! U.S. defense aviation center!" Little did he think will be used behind the U.S. defense aviation center server springboard.
M not a steal, anti be macrophages.
A war is going green!
No comments:
Post a Comment