HK1148 Find Out the Identity and Count It Later in the Fall!
.
AMD's server CPU has a fatal hardware vulnerability. At present, there are only two hackers who have this hardware vulnerability. One of them is Shi Lei, and the other is the original discoverer of the vulnerability, Maha Kamal.
The reason why Shi Lei knew about the hardware vulnerabilities of AMD's server CPUs was because in later generations, Maha Kamal disclosed the hardware-level vulnerabilities he discovered.
But at present, in the era of 2007, Maha Kamal did not disclose this secret. In other words, this secret is theoretically known only to Maha Kamal.
Therefore, Shi Lei must be the hacker who invaded the supercomputer Lightning, Maha Kamal!
Although Shi Lei knew it was Maha Kamal, 'Maha Kamal' was just a codename for a hacker's vest. Shi Lei wanted to find out Maha Kamal's true identity.
Maha Kamal is a hacker from the Inca country. After the first martial arts competition in the Brave World ended, Shi Lei and Tao Wenxian happened to go to the Inca country to deal with a matter.
If Maha Kamal's true identity is found out, Shi Lei doesn't mind taking this threat and smothering it in his infancy.
Shi Lei entered the supercomputer Lightning through the No. 1 server. Since the last time he was hacked by Maha Kamal, Shi Lei not only patched the hardware vulnerabilities of the server CPU, but also created a huge honeypot system.
This honeypot system adopts the image simulation of supercomputer lightning, and the whole honeypot system is extremely realistic. Even though Maha Kamal possessed the strength of a world-class hacker, when faced with an unfamiliar supercomputer, he was directly attacked and fell into the honeypot system without realizing it.
Shi Lei checked Maha Kamal's intrusion information. Maha Kamal was in the honeypot system, retrieving the situation of the honeypot system. It seemed that he wanted to determine the details of the supercomputer lightning, so as to further control the supercomputer. Computer lightning.
Pathetic. Maha Kamal didn't even know that he had fallen into a trap carefully laid out by Shi Lei. Shi Lei was investigating his real IP address in reverse!
'Humph! ' Shi Lei snorted coldly as he observed Maha Kamal's reckless scanning behavior. ‘Do you really think that if you have hardware-level vulnerabilities, you can be lawless? ’
"Yizul, have the resources of the iwn secret network been prepared yet?" Shi Lei asked Yizul. Since Maha Kamal is currently inside the supercomputer Lightning, if he calls the resources of the supercomputer Lightning, he may be alerted and let him He was evacuated from the supercomputer lightning, thereby losing track of the target.
"It's ready!" Izuer opened the access port of the computing resources of the iwn secret network to Shi Lei, so that Shi Lei could call it easily.
After obtaining the computing resources of iwn secret network. Shi Lei immediately increased his efforts to track Maha Kamal. He quickly and covertly dealt with the transfer server that Maha Kamal was using.
These transit servers provided Maha Kamal with hidden protection of the real IP address. If the strength of the anti-tracker is a little weaker, it will be blocked by the defense of the relay server, thus giving Maha Kamal. Provides time to clean up traces of real ip addresses.
As an anti-tracker, is Shi Lei's strength poor?
As a top-level hacker in the world, Shi Lei is also a small group of people at the top in the entire hacker world. Tracking Maha Kamal's real IP address, as long as time permits, Shi Lei will never make a mistake.
‘There are already twenty-seven relay servers. Moreover, each transit server has all reached the standard of a first-class broiler. The computer industry in the Inca country is really developed! ' Shi Lei was handling Maha Kamal's 28th broiler.
After about ten seconds of processing, Shi Lei bypassed the twenty-eighth broiler without triggering the broiler server's defense mechanism. Kill the next broiler.
The twenty-ninth broiler did not resist Shi Lei for more than ten seconds, and Shi Lei easily broke through the server's defense. Just as Shi Lei was about to continue tracking, Shi Lei discovered a strange thing.
The 30th broiler was actually the transfer server he had broken before. That said, Maha Kamal used a loop-through broiler network protection system.
Shi Lei had encountered this kind of defense protection scheme before, but the loop-relay broiler network protection system he encountered earlier only had three broiler servers, forming a small loop.
But this time, the cyclic relay broiler network protection system used by Maha Kamal actually used 29 relay servers!
In the past, when Shi Lei's hacking skills were not yet complete, he also liked to use the circular relay broiler network protection system to protect his real IP address.
Although the looping broiler network protection system can effectively confuse anti-trackers, it is not without its flaws. In this protection system, each additional transfer broiler server requires stronger technical strength.
According to the strength shown by Maha Kamal, twenty-nine transit broiler servers have been constructed in the cyclic transit broiler network protection system. He does possess world-class strength.
When Shi Lei discovered that Maha Kamal was using the Circular Relay Broiler Network Protection System, Shi Lei temporarily stopped tracking. The Circular Relay Broiler Network Protection System, as the name suggests, is a circulating broiler network. The so-called recurrent network can be simply understood as a circular semi-closed network.
To give a visual example, the real IP address of the broiler network protection system in the tracking loop is described as finding the starting point and ending point of a circular pattern. How should I find it? Obviously if there are no strict restrictions, it is absolutely impossible to find.
Shi Lei now needs to find the real IP address under the cover of the circulating broiler network protection system.
In addition to the need for strong technical strength, the network protection system for cyclic transfer broilers also has a fatal flaw. It is precisely because of the existence of this flaw that real top hackers will never use this method to cover up the real IP address.
The fatal flaw of this circulating broiler network protection system is that in order for the circulating broiler network protection system to protect the real IP address, the real IP address needs to be placed in the circulating broiler network protection system.
That is to say, the real IP address is implied in the broiler network protection system used to protect the real IP address. This is like looking for the starting point of the circle, which is not easy to find under normal circumstances, but what if the starting point of the circle is marked in red?
The current situation is like looking for a starting point marked in red in a circle. With Shi Lei's strength, it is really easy to find.
After confirming that it was a circular transfer broiler network protection system, Shi Lei changed the tracking plan. As a master who used to use the broiler network protection system of loop transfer, Shi Lei is very aware of the defects of the network protection system of loop transfer broiler.
In less than thirty seconds, Shi Lei discovered the abnormality of the No. 21 relay server. In the No. 21 relay server, Shi Lei searched carefully, and after a while, he found something suspicious.
"Aha, I caught you!" Shi Lei analyzed the IP address of the relay server a little, and found that it was a disguised address, and the real IP address was also hidden inside this broiler server.
After obtaining Maha Kamal's real IP address, Shi Lei immediately began to investigate the real IP address and the corresponding real world address.
According to Shi Lei's speculation, Maha Kamal is very confident in the hardware vulnerability of the server's CPU, and he is not worried that someone will track his real IP address. Then, in such a case, the real IP address used by Maha Kamal is very likely to have not been manipulated. That is to say, through the real IP address, the real identity of Maha Kamal can be investigated. information.
"Izuer, retrieve the line information!" Shi Lei instructed Yizuer to retrieve the network line information, and he himself invaded the network service provider in Uttar Pradesh, the Incan state.
Maha Kamal's real IP address, corresponding to the real-world location, is in Uttar Pradesh, Inca state. For further detailed information, it is necessary for Shi Lei to invade the network service provider in Uttar Pradesh, combined with the corresponding real IP address, to be able to query the results.
The network service provider in Uttar Pradesh has a low defense strength, and Shi Lei has already entered the data server of the network service provider in Uttar Pradesh without spending much effort.
Inside the data server, Shi Lei used Maha Kamal's real IP address as a condition to query and compare. After a while, Shi Lei obtained matching information.
The registered address of the network service: No. 1037 Westding Street, Lucknow, Uttar Pradesh; Registrar: Madsen Kamal.
Shi Lei looked at the matching information obtained with a smile on his face. He immediately hacked into the network of the Demographic Statistics Bureau of Uttar Pradesh, and extracted all the information of Madsen Kamal from the network of the Demographic Statistics Bureau.
These materials, through the joint analysis of Izuer and Shi Lei, came to a conclusion from the side: Madsen Kamal has superb computer technology, and he is the Maha Kamal that Shi Lei was looking for!
"It turned out to be you!" Shi Lei said with a chuckle, but he didn't immediately take action against Maha Kamal, leaving him to investigate everywhere in the supercomputer Lightning's honeypot trap system.
Shi Lei has no time to deal with him now. Shi Lei needs to sit in Shuangqing City and personally protect the main server of Brave World to prevent the main server from being invaded by hackers.
The Brave World's first martial arts competition has come to an end, and Shi Lei doesn't want any problems. Because, if any problem occurs, it is a fatal problem!
As for Maha Kamal, Shi Lei had already found out his real identity information and read human facial features. If he wanted to deal with him, he could settle accounts anytime, anywhere.
At this moment, Shi Lei is more concerned about the battle between Qiao Mo and Mu Feng!
.