Home Goldfinger Novels Blessings of the Qi people: lingering KeyboardSwitching:(16/81)

Chapter 16 Making money online

18days ago Goldfinger Novels 5
Qin Nan wrote another tool on the computer, which is a program that remotely controls the computer.

First, the tool was transferred to an ordinary computer in the United States, and then turned on DOS in your own computer and started the remote command. Immediately, the screen of the American computer appeared in front of Qin Nan.

Successfully, the broiler is obtained!

Qin Nan didn't have time to be happy and quickly transferred the remote control tool to computers in five countries: Japan, Germany, Italy, Canada, and Australia.

Then he quickly made a fake screen on the computer controlled by each country, and Qin Nan would not notice any movements in their computers.

Of course, the use of Qin Nan's broilers with their computers is no different from usual. If they know that they have become other people's broilers...

Then Qin Nan used an American computer to connect to a German computer, then connected to Italy with a German computer, and then connected to an Italian computer...

Finally, we went to Japan to form a powerful tandem springboard

He divided these serial computers into more than 20 groups, with the purpose of diverting the attention of those administrators. Even if people find out, he would just touch them and use another group to go.

If anyone wants to check it, start from the last one...

Maybe I found Japan...

Maybe I found out about Germany...

Check it slowly!

Even after the end of the search, he had already deleted the IP in the remote log. Besides, after checking, it was just a blank check. His IP was originally fake, double insurance!

Qin Nan controlled the Japanese computer and entered the backstage of Swiss Bank

Enter your account password, but it was not the same as he expected. Passwrd mistake Yur IP has already given a record.

Strange?...How come this is it! It's obviously this password

There is no way, I can only crack the password again...

The password this time is different from the last time...

Qin Nan later thought carefully about the springboard for the first and next two hours. It should be that the Swiss Bank would modify the password every time, which means that there will be different passwords entering each time period. It is really worthy of being the Swiss Bank Ah!

However, I'm afraid only a few people with permission know that in order to seize the time to enter the password at the valid time, Qin Nan must invade his server as soon as possible.

The Japanese computer I controlled has been recorded, and even if I have a password account, I can't get in...

Moreover, someone would soon follow the other party. Qin Nan made a quick decision, gave up this group, transferred the target, and used another group to top it up...

In less than ten minutes, Qin Nan entered the backstage of Swiss online banking... Humph! Finally, he got in as he wished.

But this is not a happy time, and it is still far from what he wants...

Quickly analyze the structure and code of the background. The composition of a computer system has different composition structures, so hacker intrusion is also different.

After careful analysis, Qin Nan found that invading the Swiss Bank's computer system was not as easy as expected, although he knew it would be such a result.

Because if it is so easy to invade, it will have been attacked by hackers long ago, and it will not be in the world without losing money. The most touching thing is!

Entering the other party’s backstage is completely useless. You can just write XX to visit here!

I was very depressed and unexpectedly, the backend system I had spent several hours working hard to get in would be so scrapped...

It's over, I really can't think of a solution this time!

The other party’s system is almost a service system with zero defects, super advanced!

Just when Qin Nan was about to give up, the computer disk on the desk attracted him, Qin Nan thought maybe there would be some good idea here.

Quickly input disk to find the technology to invade the server system, but he has basically tried these

When Qin Nan was no longer confident, he suddenly saw an article about the ultimate HACKER technology that attracted him very much!

I have never made this technology public, and I don't want it public, because when it is public, there will be another storm on the Internet.

Whether this technology is good or bad depends on the user... Hacker: Chen Guowen!

Seeing the warning at the beginning, Qin Nan looked at this technique very seriously from beginning to end, read it again, and read it again. Qin Nan almost raised his palm and clapped his hands and shouted happily!

He even invaded Swiss banks and successfully stole a sum of money by this senior hacker Chen Guowen.

Senior, really senior!

This ultimate HACKER technology is almost unheard of

But it is undeniable that with this technology, it can indeed cause a storm on the Internet, or even unprecedentedly huge

He can say with certainty that if he learns it, he can travel freely in this online world!

According to the experience of this senior, he immediately pointed the finger at the Swiss bank haha. He could just do an experiment for me to verify this technology. Is it you or me?

Qin Nan's eyes were full of excitement

Controlling the computer, I found a place where I could add articles in the background. Immediately, Qin Nan entered the place where I wrote the article. One of the subtle loopholes mentioned in the Ultimate HACKER technology that no one knew about, but it could cause a loud loophole.

Because this vulnerability is too subtle, once this vulnerability is exploited without uploading or backup in the background, the user's computer will not be able to withstand the data packets sent within 5 minutes, causing the system to crash. This designer gave the vulnerability a very interesting name called "One Creation" for the vulnerability.

Anyway, it is not Qin Nan's computer, so Qin Nan is not polite. He believes that even if it crashes, as long as it succeeds, it will be considered a glorious collapse.

Qin Nan wrote the code in the place where the article was added, just like a time bomb was tied up. Qin Nan gently clicked the mouse

Unexpectedly, the server information and version will be released immediately in the background, as well as the server personnel and the file address that stores the client's account and password.

Oh my God, this hacking technology is so amazing... Qin Nan is almost completely excited, he almost saw the green dollar and became a billionaire!

Qin Nan calmly passed these continuous information to his computer and said that it was a coincidence that the broiler was sacrificed gloriously in just 5 minutes, and Qin Nan did not feel sorry for him at all.

I found a broiler on top again... Qin Nan is about to attack the area where the customer account password is stored... Use this computer to launch an attack on the Swiss bank firewall

After more than an hour of firewall struggle, Qin Nan finally successfully entered the bank. Here, he also learned a lot of experience.

Originally, it would take less than 5 minutes to destroy the firewall, but in order not to fall into the corner, you can only use the warm fire attack carefully to enter safely.

Because the large number of data packets are easily discovered by administrators, those people are also advanced computer talents, and maybe they are still top hackers.

He doesn't want to create a hacker war, so Qin Nan can only add points to these data packets that have special effects on the firewall to crash the firewall bit by bit

In the internal network, Qin Nan kept looking for the host to manage the bank, and finally found it. But when he was happy, he found that there was a firewall in the host.

faint!

It's still a double protection, but it's relieved that the bank's management host is so important

Qin Nan is a little scared now, because this firewall is not like an ordinary firewall, and the password is probably not valid for too long.

The data packets in the host are all irregular, or not. I'm afraid only the internal technicians in Switzerland can see the rules. This is really a test for Qin Nan.

Qin Nan also found that even if the firewall is broken, there is a strict protection program in the host, which is also the world's top protection program.

Qin Nan was very worried now: the firewall is not regular and if it is a random attack, it will definitely be discovered!

But the US dollar is right in front of me, so Qin Nan is not willing to give up!

But the firewall in front of you is not as broken as expected

There was no way, so I had to check the port open to the host to see if there was any use, but once again disappointed Qin Nan. Except for some necessary open ports of the server, the rest of the host was not open.

If you want to intrude from the necessary ports of the server, the host's firewall is not a vegetarian.

What should I do?

Qin Nan was stunned when facing the computer. The hacker senior Chen Guowen only said that he had entered the Swiss banking network and successfully stole a sum of money. Apart from the ultimate hacking technology, he did not tell any inside story.

This is so troublesome to Qin Nan. In fact, the hacker Chen Guowen just happened to enter, and it also left a lot of trouble. Therefore...of course... he would not put the incomplete technology into the CD.

no!

Since seniors can enter, why can't I?

Since there is nothing that can be used by the main server, I will go to another server to see if there is anything that can be used. I don't believe it has no loopholes.

After searching, Qin Nan finally found an indirect server connected to the main server and was responsible for receiving and withdrawing external deposits and then passing them to the main server.

Qin Nan quickly entered this server. After analysis, he found that the deposits and withdrawals to the main server were all 1KB and 1KB transmissions.

But this is not a problem for Qin Nan. He immediately wrote a Trojan horse that was only 1KB in size.

Let this 1KB Trojan be sent to the host with a full try attitude

The host's firewall just let him pass after he stopped another packet immediately after 06 seconds.

YES! What should I do now?

Qin Nan smiled, showing a proud expression

Not long after the Trojan entered the host, it sent a spoofed packet to the firewall and opened one of the ports, but the firewall thought it was not opened. Qin Nan immediately used this port to enter.

Qin Nan was so scared that he was found out when he entered.

The port Qin Nan entered has been protected by his Trojan horse. The firewall has no idea that it has opened this port, just like a tunnel opened, but Qin Nan almost made all sweat.

After entering, I didn't expect that I was facing a more abnormal protection system than the firewall just now

Qin Nan really regrets having to make money like this. After making up his mind this way, he will never do it again.

But now, no matter whether it is BT or not, the money is right in front of him. No matter how difficult it is, he will make it come true.

The firewall only manages external connections. I have now opened a port that is invisible to the firewall and entered the main server, so the firewall will not find what I do here.

Maybe it is because the insiders of Swiss Bank are very confident about this protection system, so they didn’t do anything to return to the computer!

OK, I'll bet on you!

Qin Nan analyzed this protection program on the main server of Swiss Bank. He found that what he did was really seamless. With his current ability, it seems that he really couldn't break it. I guess the person he made was also a very amazing person.

Since this protection program is like a city wall, if you want to attack, there will be a firewall!

Didn't I open a port?

You can use the opened port to bypass the firewall to attack this protection program...

Yes, Qin Nan didn't want to use the port opened by the Trojan to launch a bombing attack on the protection program immediately.

Sure enough, the firewall was not managed, and under Qin Nan's 10-minute bombing, the protection program finally collapsed.

Soon all the information in the host appeared on Qin Nan's screen. Next, Qin Nan built 4 bank accounts with different names on the host, and saved 25 million in them, which totaled 100 million.

Deposit of 5 million on June 3, 2003

On October 9, 2004, a deposit of 10 million yuan...

Then the transaction records of these 4 bank accounts were also faked

Haha, I'm a rich man!

Qin Nan wanted to scream... At this time, the rooster crowed at dawn!