Home Goldfinger Novels Blessings of the Qi people: lingering KeyboardSwitching:(10/81)

Chapter 10: The Hidden Dragon Goes to the Sea

18days ago Goldfinger Novels 5
Qin Nan ran back to the dormitory, and he didn't know why he was so excited when he heard the news that Teacher Wu was sick. It was just that Sijia was reserved in front of him.

Instructor Wu has never looked for him, and he has no time to go to the teacher. Yes, now looking back, instructor Wu has indeed reduced a lot. Every time he is depressed and worried in class, he is gone after class.

It seems that the tutor must be thinking about their affairs, he harmed her.

Applying cold water to cool down your messy mood. Qin Nan looked at himself in the mirror, looked up and took a breath and put aside his upset thoughts.

While there is no one in the dormitory now, he decided to practice online

For two weeks, he has been learning computers in CDs and books, and even has not attended a party with his roommates.

All roommates said that he had changed and became very fond of learning. They were happy to see this change, so they did not disturb him anymore.

Qin Nan discovered a strange phenomenon during the learning process, that is, reading books is getting easier and easier. He can easily understand them in textbooks or computer books, which makes him inexplicable.

For example, he can finish a thick stack of difficult computer books in two days, and he can also memorize the above knowledge. What's even more outrageous is that he can clearly remember which page he can remember.

He thought, it might be because he was too familiar with computer knowledge, but he didn't know that it was because the energy bursting in his body transformed his brain nerves.

Because he thought he had learned enough computer knowledge, and as mentioned above in the CD, he should be considered a computer program expert, and what he lacked is practice.

If I used to not understand computer knowledge, then now the dormitory is filled with computer books, and he can know how advanced the computer technology on the CD is. No wonder someone will search it.

He is sure that truly learning the technology on the CD can make a person rampant in the computer world

Beginner attacks are generally divided into reconnaissance, scanning, access, maintain access and erase traces.

When starting an attack, most experienced attackers will discover as much target information as possible

Inexperienced scripts will be direct, indiscriminately searching for fragile systems on the Internet, regardless of who owns them

On the contrary, more experienced attackers will spend some time in detail before launching an attack packet on a network.

To understand why reconnaissance is so important, here is a very vivid metaphor

For example, in the real world, before robbing a bank, gangsters will visit specific departments to investigate the time when security personnel enter and leave, and observe the location of security cameras.

They will judge the manufacturer of the alarm system and may also investigate the security manufacturer

In addition, even if a novice is planning an escape route, they will use white papers to investigate areas around the bank and analyze and investigate map routes.

Computer attackers’ first step is to use public and available information to investigate their targets

By completing a determined and planned reconnaissance technology, a very effective attack plan will be made.

Who is Qin Nan?

How could he do such a simple thing? Although the computer in the dormitory is poor and the configuration is not good, he still disdained to find an easy-to-attack attack. He had already thought about everything.

He first modified the IP address, and then everything was ready

Z University’s campus network, I’m here! Only in this way can my ability be shown. The campus network on campus will be a hot topic tomorrow

Enter the campus network and display the main page to start reconnaissance. Within five minutes, the basic information of the campus network will be clear about the phone number, domain name, IP address, and dedicated connection information.

A good start! Qin Nan smiled and just found a suitable route for attack.

Without spending much time in Qin Nan, he scanned and found nearly a dozen loopholes.

It seems that the campus network is indeed just a campus network. I am afraid that even a beginner can easily hack it.

It hasn't had security patches in a long time

Discover active hosts

Qin Nan used the fastest way to solve the problem in the next few steps. Because he was a first-hand practice, he took it step by step. He easily obtained administrator authority and soon the campus network was emptied.

Next, tamper with the web pages

What should I change the web page to? Why not change it to a devilish picture!

Soon, Qin Nan browsed the pictures of fierce ghosts on thousands of websites and chose the most terrifying one.

So, the homepage was covered with a super large devil's picture, and the hideous face and the whistling blood claws were about to emerge.

Qin Nan looked at his masterpiece for fear of being scared. This is indeed a strange campus network!

The sub-page also changed quickly. Qin Nan put a lot of ghost pictures for it in a mess. When he flipped through these pictures, he suddenly felt monotonous, as if something was missing, and it seemed that it was not enough.

Think about it, if you add a few charming beauties, it will probably be much more perfect

Yes, there are just a few beauties

If there is a bloody ghost picture on one side and a charming beauty who is coveting lust on the other side, then this will definitely attract countless people's attention.

The administrator of the campus network found no abnormalities at all

Qin Nan added a few beautiful pictures that he thought were enough to arouse men's desire. The clear and excellent shooting location, and the expression of pity for you deeply touched the heart of the boy.

As Qin Nan looked at it, he couldn't help but think of the slut Yu Sijia. He fucked the mouse and slowly moved without thinking, imagining Yu Sijia's mèi face.

When he looked at the picture, he suddenly came up with a wonderful idea in his mind, and he smiled evilly

All the images were changed to Yu Sijia's appearance based on the impression in my mind, and used computer skills, and changed them to seven points in similar ways.

I guess those who meet Yu Sijia will think it is Yu Sijia. Yes, because their charm is so similar, I'm afraid only Qin Nan has this ability

It took only an hour to change. When those naked and provocative expressions were enough to satisfy him, he stopped modifying them. There was a painting that he was particularly satisfied with.

I made a very hidden application-level Trojan horse backdoor, modified the log, hid myself, and wrote a firewall program by myself. He confirmed that the campus network had fallen into his hands and that he could be unobstructed here in the future. He would do whatever he wanted to modify it. I guess the experts would not be able to drive him away.

Hidden traces, safely exit and complete the task, just as I was about to exit, my own specially designed programming prompted me that someone was reconnaissing my computer

Qin Nan smiled. It seemed that someone had also "visited" his computer. Suddenly, he had the idea of ​​competing with him (her) to see how good his skills reached.

In a quiet manner, Qin Nan wrote his own tracking program and easily followed his IP. Unconsciously, the program invaded the other party's computer, and then stuffed a virus program with low-end intelligence designed on the CD into the other party's MSN program. The size of the program did not change at all.

In this way, a super terrifying virus that has been studied for 30 years was accidentally released by Qin Nan.

Most software codes have a lot of gaps, and many things can be stuffed in these gaps, including viruses. Many hackers use this to turn it into the parent body of the virus and parasitize it. As long as the program is run, the virus will be started at the same time and entertain its tasks.

In this way, as long as the other party restarts the computer, the program will start to run automatically

Taking advantage of the system vulnerability, Qin Nan began to attack the other party's computer again. This time he deliberately exposed the target and sent a caterpillar squirming picture he had chosen, obviously telling him that his computer was attacked and then asked the other party to restart the computer himself.

The man, as Qin Nan expected, immediately found someone attacking his computer and hurriedly started to block it, but it was too late. Seeing that the control of the computer was about to be lost, he resolutely turned off the power of the host computer

Qin Nan looked at the IP that could not be connected and he smiled

After a few minutes, the system finally restarted in the hands of an angry hacker.

Qin Nan also plans to retire successfully and prepares to turn off the computer

According to what the CD says, his virus will automatically settle everything for himself

Someone deserves to be unlucky. Just after Qin Nan turned off the computer, the hacker checked his computer and found no abnormality. He only found a strange IP address in his log.

So he immediately looked for this strange IP and prepared to teach him a lesson. Unexpectedly, the IP address was actually in Japan, which made him even more angry.

So he entered Qin Nan's fake IP address, attacked the computer, and launched a huge change inside.

It was a coincidence that the virus was spread and a huge change was brewing in Japan.

The IP address Qin Nan chose turned out to be the computer of a senior Japanese official. Therefore, with him as the starting point, a sudden tsunami-like electronic storm quickly swept across the entire four islands of Japan.

In just a short time, Japan's years of achievements in electronic computers have instantly destroyed most of them.

The caterpillar with a full board squirming on the screen is well known in Japan and has become a star painting that is obvious. The cyberspace is being occupied by a virus named caterpillar.

What makes Japanese computer experts headache is that this virus is like life, and it actually knows how to hide it. For a moment, all antivirus tools are powerless to it, and the firewall can't stop it.

Because it can automatically identify what operating system the target machine on the network uses, so that targeted scanning and attacks cannot withstand its attacks.

As a result, the caterpillar virus spreads rapidly along the Internet. As long as the computer is turned on and connected to the Internet, no computer can be spared.

A super hacker of computers, half a month after it was born, the virus spread to China!