HK1192 Powerful Broiler!
.
Summer time, July 5th, it was close to nine o'clock in the evening. Converted to Lijian country time, it was only after eight o'clock in the morning.
Raphael was attacked and tracked by mysterious hackers early in the morning. After getting the help of Shi Lei's incarnation vest, he traced an important clue.
The eleventh relay server of the mysterious intruder is the web server of the official website of nhk TV station!
What is the most famous thing in the hacking world in recent times?
The answer is definitely two top hackers in the world. Using nhk TV as the battlefield, they have launched many exciting hacker duels!
These two world-class hackers are Raphael and Mr. M. The web server of the official website of nhk TV station was just hit by a gun.
Today, the web server of the official website of nhk TV station has suddenly become the eleventh relay server controlled by the mysterious hacker who invaded Raphael. Even without Shi Lei's reminder, Raphael himself will have an association with Mr. M.
"It's not that I don't believe you. It's just that you know my relationship with Mr. M, so... Forget it, let's not talk about this, do you have a log for your anti-tracking? Can you show me the log?" Phil asked.
Raphael is not too impulsive. Hearing the web server of the official website of nhk TV station and Mr. M, he is going to fight with Mr. M arguably.
The anti-tracking log proposed by Raphael will definitely generate a log automatically recorded by the system during the anti-tracking process.
Shi Lei agreed without any hesitation, and then passed the system log to Raphael through the voice communication channel. "Mr. Feeney, about your affairs with Mr. M, we, Mirui Technology Group, know everything clearly. Now, Mr. M has a bad relationship with our Mirui Technology Group. Therefore, Mr. M is our common enemy. ."
Raphael quickly browsed the past anti-tracking log sent by Shi Lei, and personally confirmed the eleventh relay server of the mysterious intruder. It is indeed the web server of the official website of nhk TV station!
"Do you suspect that Mr. M is behind the scenes?" Raphael asked Shi Lei.
Shi Lei thought about it for a while, and took the initiative to put forward an uncertain opinion, "I don't know! However, according to what I know about Mr. M, his defensive skills can't be this bad. So, I don't think it should be Mr. M."
Although Shi Lei took the initiative to say that the mysterious intruder was not Mr. M, such a statement. Better than directly saying that the intruder was Mr. m. If Shi Lei took the initiative to say that the mysterious intruder was Mr. M, Raphael would instead suspect that the mysterious intruder was not Mr. M.
But Shi Lei took the initiative to say that the mysterious intruder was not Mr. M, and Raphael's heart would be more inclined to the mysterious intruder being Mr. M.
This behavior is called antagonism. The human heart usually refutes the views of other people involuntarily, especially in the case of only two people, and usually does not agree with the statement of the person who speaks first.
Shi Lei took advantage of this mentality and designed a pit for Raphael to let Raphael jump in.
"Maybe it's really not Mr. M!" Raphael replied, "This bitch who invaded me. His method of intrusion is different from Mr. M."
Shi Lei was a little surprised. Did he speculate that Raphael's psychology was wrong? Or was Raphael too trusting?
"However, I also feel that it is Mr. M! The less the hacker who hacked this time is like Mr. M, the more suspicious Mr. M is. I really can't think of it. Which hacker has shown enough in me? After your strength, you have to fight with me to the end." Raphael spoke again.
Shi Lei breathed a sigh of relief in his heart. He thought that Raphael really agreed with his statement and did not doubt Mr. M!
If Raphael doesn't doubt Mr. M. With such a good opportunity to frame Mr. M, Shi Lei could only reluctantly give up.
"Mr. Finney, whether the mysterious intruder is Mr. M or not, we don't know for the time being. However, as long as we keep track of it, we will have a chance to know the other party's real IP address, and then analyze the other party's identity." Shi Lei suggested .
"That's right!" Raphael agreed. "Let's continue to track the real IP address of the intruder. Let me handle the defense."
Shi Lei responded affirmatively: "Okay, Mr. Fini, once I find any useful clues, I will notify you immediately." After finishing speaking, Shi Lei cut off the power of the voice changing microphone again.
"Yizure, analyze the IP address of the web server connection to the official website of nhk TV station!" Shi Lei gave an order to Izuer, and he himself was thinking about how to use this matter for the greatest benefit.
"Sir, the system retrieved the web server of the official website of nhk TV station. There are more than 110,000 IP addresses connected to it. After the system automatically scans and analyzes it, the following suspicious connection IP addresses are listed." Izuer responded to Shi Lei.
Reverse tracking of IP addresses is not a simple task, it can even be said to be quite complicated.
For example, a hacker has five transfer servers as broilers, of which the a server is the springboard for the terminal, and the ip address of the hacker's terminal connection is all the ip address of the a server.
Then, if you want to track down the hacker hidden behind the five transit servers, you must first find the IP address of the connection to the b server in the a server.
Don't think this is a simple job, just find the connection IP address of server a and server b. If you know the address or label information of the b server in advance, and then find it in the connection ip address of the a server, it is indeed an easy task.
But what if you don't know in advance?
The connection IP address of the a server, under normal circumstances, is definitely not only one b server, but thousands, or even tens of millions of connection IP addresses.
It is really not easy to find the correct connection IP address among so many connection IP addresses! If you want to accurately determine the connection IP address you need to find, you need to analyze the connection data, and track it to the upper-level server according to the data flow at the end of the a server. Thereby, it is traced up level by level, and finally the source point of the data flow is found.
With the help of Izuel, Shi Lei traced the data flow of the mysterious intruder step by step. At the same time, it is necessary to avoid being discovered by the intruder, lest the mysterious intruder directly cut off the data flow.
Although the method of directly cutting off the data flow is a bit rude, disconnecting the intrusion in this way will be used by powerful anti-tracking personnel to find the final source. But if the real IP address of the source is irrelevant to the intruder, it is meaningless.
In order to ensure that the mysterious intruder can be traced, and the identity information of the mysterious intruder can be identified as much as possible, Shi Lei's anti-tracking is very careful.
More than ten minutes later, Raphael asked, "Are there any new clues?"
Shi Lei turned on the power switch of the voice-changing microphone and replied: "Mr. Finney, I'm sorry, I'm still tracking. The defense of the intruder's relay server has increased a lot. If there is any latest news, I will notify you immediately. of."
"Okay!" Raphael responded a little discouraged.
Regardless of what Raphael thought, Shi Lei turned off the power switch of the voice-changing microphone again, and continued to track the clues of the mysterious intruder with Izuer.
Almost ten minutes later, Shi Lei finally met the powerful broiler!
All of Shi Lei's tentative attacks were resisted by the powerful broiler of the mysterious intruder. This powerful broiler, through Shi Lei's query, achieved at least 10tflops of computing performance!
This computing performance is already the same as Izull's parent server, which is the origin of supercomputers. Among the top 500 supercomputers in the world in the first half of 2006, it can also be ranked 59th.
Facing a powerful broiler with a computing performance of 10tflops, Shi Lei did not mobilize more powerful computing resources to directly break through the opponent's defense, but cautiously probed for system vulnerabilities.
Shi Lei has a lot of system loopholes, and they are loopholes that have not yet been announced. Shi Lei now needs to test whether the unannounced loopholes he has mastered can enter this powerful broiler.
Shi Lei couldn't help but be a little surprised that there was no response from this powerful broiler server system after testing more than ten unannounced loopholes in a row.
You must know that Shi Lei is a reborn person, and the loopholes he has mastered will only be announced in the future. However, this powerful broiler with a computing performance of 10tflops has no loopholes that Shi Lei has tested.
This shows one thing!
The mysterious invaders are really powerful! He has at least mastered more than ten unreleased vulnerabilities that Shi Lei had tested before, and at the same time, he has filled up the corresponding vulnerabilities in the core program of the Linux operating system.
'I don't believe it, this damn intruder has all the vulnerability information! ' Shi Lei snorted coldly in his heart, and decided to come up with a trump card.
This killer was a loophole discovered by Shi Lei himself, and it was an unpopular low-level code loophole in the system. It belonged to a loophole with very high permissions.
It means that this kind of attack is like a spike that suddenly emerges from the ground, and it is difficult to defend against it.
Through the loopholes in the underlying code level of the system, Shi Lei finally entered a powerful broiler with a computing performance of 10tflops. And among this powerful broiler, Shi Lei found some information.
Some info on the identity of the mysterious intruder!
.
ps:
Thanks for the support