Li Yi, male, 28 years old, a computer major dropout from a certain university, is currently the general manager of the "Feitian Assistant" plug-in platform, with an annual income of millions.

On the Feitian Assistant platform, there are hundreds of plug-ins for commonly used apps on mobile phones.

From games, food delivery, online car-hailing order grabbing software, to video software for advertising, etc., it can be said to have everything.

Not only that, Feitian Assistant has also opened up all the links of research and development, sales, promotion, etc., and created a brand-new aggregation script plug-in platform with the concept of "one-stop service", creating a huge "plug-in kingdom".

As the general manager of Feitian Assistant, the turning point of Li Yi's life was at university.

He studied very hard in high school, and finally succeeded in being admitted to a well-known computer university.

But after being admitted to university, he seemed to want to make up for all the regrets in high school, and started to play games on the Internet crazily.

After one semester, he was absent from almost all classes, failed all exams, and skipping classes was even more commonplace.

Later, after Li Yi was warned by the school to stay in school for inspection, he still didn't wake up, and was kicked out by the school directly.

In desperation, Li Yi met a mysterious master by chance in the game, and after getting in touch with this mysterious master.

The two discussed for a long time, and finally hit it off, and began to prepare to seek benefits in game cheats.

Under the guidance of the mysterious master, Li Yi quickly developed the first dungeon cheat by virtue of his talent.

This plug-in has functions such as locking blood, increasing skills, and no cooling, which can be said to be loved by some dungeon players.

Especially for some dungeon players who like to play PK in the arena, with this plug-in, they can easily beat all kinds of masters, and they can't help themselves.

And Li Yi made a lot of money by relying on this plug-in, and won the first pot of gold in his life, a total of more than 40!

Seeing how profitable cheats are, Li Yi was even more eager to move. Later, he began to recruit troops, and the entire cheating team began to expand rapidly.

Now, the Feitian Assistant team has grown to more than 40 members, with a total of five channels, and each channel is full of 2000 people.

Moreover, these 1 people are all internal members, and all of them bought [-] monthly genuine internal cheats.

In addition to these internal members, there are also hundreds of thousands of peripheral members. These people generally use low-end versions of plug-ins, and the price is very cheap, only a few dozen yuan, or more than 100 yuan.

This is only the money earned from the game sector plug-ins, plus various scripting tools, software and other income, the Feitian Assistant plug-in platform basically has a net profit of tens of millions a year, which is very profitable.

After spending money and squandering money, Li Yi's life is also very enjoyable. Except for daily inspections on the platform, the rest of the time is spent playing games and flirting with girls.

At this time, Li Yi was brushing the dungeon in the dungeon, but the boss who was originally suppressed by him suddenly hit a full-screen skill damage move, which directly gave him a second.

"Huh? The plug-in is out of order?"

Seeing this scene, Li Yi was stunned for a moment, and immediately went to check the game update status in a calm manner.

Generally speaking, the failure of the plug-in is nothing more than a game update, and some loopholes have been filled.

And this time is the busiest time for these cheat authors, because there are tens of thousands of internal members waiting to use the cheat.

However, when Li Yi entered the background of the Feitian Assistant server, he was dumbfounded after seeing the four characters [inaccessible] in front of him.

what's the situation?The platform was hacked! ?

Before Li Yi came back to his senses, a person in charge of Feitian Assistant had already sent him a message: "Yi, Brother Yi, our platform server was destroyed, all the data was gone, and it was in a grid state..."

"what!?"

Seeing this news, Li Yi's eyes widened immediately, and he cried out in disbelief: "This is impossible, this is absolutely impossible!!"

He couldn't believe his eyes, the server of their platform was destroyed in just a short while?

There are hundreds of thousands of script tools and plug-ins in this damn thing, and it's all gone! ?

Those who look at the server are doing nothing! !

Taking a sudden breath of air, Li Yi forcibly suppressed the anger in his heart, and clicked on an independent chat tool called MSN on the computer.

On MSN, there was only one friend. Li Yi opened the avatar of a mysterious man and sent him a message: "Master, the platform has been hacked, all data has been deleted, and the system needs to be restarted."

After 3 minutes, the head of the mysterious man lit up and replied: "How is it possible? The fire prevention I set up..."

However, before the mysterious man finished speaking, under Li Yi's sluggish gaze, the avatar that had just been lit up instantly dimmed.

Li Yi: "???"

Just when Li Yi was a little confused, his computer screen suddenly went black.

A scarlet prompt box appeared in the very center, with seven large red characters clearly written on it.

The web is not chaotic!

Seeing this scene, Li Yi was so frightened that he trembled and his face turned pale.

After doing cheating for three or four years, with the help of that mysterious master, he also learned some techniques about hacking.

He will also be able to manipulate the simplest puppet machine to carry out DDOS attacks.

However, this is the first time he has seen his computer being hacked without knowing it like now!

How strong is this person's hacking skills, even his own firewall didn't send out any alarms!

Thinking of his computer being hacked and all his relevant information exposed to others, Li Yi was filled with panic.

You must know that those who do cheating are not seen in the light, once their real IP address is exposed, then they will only be greeted with a prison sentence.

Not to mention that all his information is now in the hands of others.

It can be said that his life or death now depends on the thought of the hacker opposite.

Li Yi forced himself to calm down, staring at the monitor, his voice trembling: "You, who are you, as long as you don't expose my information, I am willing to give you 100 million as a seal every month fee."

He knows that when the computer is under control, as long as the hacker wants to, he can covertly turn on his camera or microphone or headset at any time.

----

At the same time, at Su Muyun's house.

At this time, Lin Yu was staring at a window that was constantly being refreshed on the screen. His slender fingers were typing on the cold keyboard, and there were crisp sounds from time to time.

Because Tianyan destroyed the plug-in platform, it also lost a large number of encrypted hidden control Trojan horse programs in its server kernel.

Therefore, as long as someone enters the server to check the situation, the other party's machine will be infected immediately, and a hidden backdoor will be automatically formed on the computer.

And Lin Yu can remotely control his computer through this back door. If the other party has a camera, Lin Yu can see him, and if he has a headset, he can hear the other party's voice.

Not only that, all computers that automatically form backdoors will also be recorded in the form of notepad documents on Tianyan.

Soon, a window popped up on the Sky Eye, and a back door approach appeared in it.

Seeing this, Lin Yu clicked in, began to connect to the computer remotely, and checked various encrypted files and related information in the computer.

Tianyan is secretly monitoring every move of the computer.

5 minutes later.

"Tsk tsk, I didn't expect it to be a big fish."

After reading all the owner's IP address, detailed information and other information, Lin Yu had an interesting smile on his face.

This Feitian Assistant plug-in platform is quite strong, and the business expansion is so wide, there is something.

Unfortunately, they met themselves.

Thinking of this, Lin Yu smiled unscrupulously, and planned to send all Li Yi's information, cheating evidence, appearance, and address to the network supervisor.

At this moment, he suddenly saw that Li Yi on the monitoring window was texting a man named Master.

Good guy, it turns out there is someone behind.

Seeing this, Lin Yu suddenly regained his energy. He opened several windows and pulled out all his attack, encroachment, defense and auxiliary tools, ready for remote tracking.

"I want to see who is behind the scenes."

Holding the mouse, Lin Yu was inexplicably excited.

This is the first hack he has encountered in real life, and hopefully he won't let himself down.

Through Li Yi's puppet machine, Lin Yu quickly found the IP address of the other party's mysterious person.

Of course, Lin Yu knows that this is the other party's virtual IP, because veterans have this habit.

Whether it is on the Internet, or on various microblogs, forums, and post bars, hackers will use virtual IPs to access.

It is not like those computer noobs who will use their real IP to query by default when browsing the website.

Like this kind of real IP address, hackers can basically check one by one, without any operation, they can get the detailed address of this person in real life.

However, no hacker would be bothered to do such a thing, because it simply doesn't make any sense.

Of course, if there is hatred, then that's another story.

Turning on the scanner, Lin Yu threw in the virtual IP he had just found, and instantly analyzed a large number of fake IPs, that is, chickens.

The progress bar on the scanner increased at a speed visible to the naked eye, and the IP address was still increasing. More than 1 broilers were scanned in one minute.

"This guy has a lot of chickens, but he will take advantage of me later."

Looking at the broiler that was still refreshing, Lin Yu gave a smirk, opened his chicken catching tool, typed in a piece of malicious code, typed [LIUNX] in the tool type column, and clicked to run.

This chicken catching tool is an auxiliary tool that he edited a long time ago. Enter any IP through this tool, and then the broiler will be automatically obtained.

Moreover, after obtaining the broiler, the chicken catching tool will automatically implant a backdoor Trojan horse on the computer of the broiler, and automatically list it.

Lin Yu is still very satisfied with this tool, because the types of chickens caught by this tool are all servers he chooses and is familiar with, such as LIUNX, UNIX, etc.

Not only that, but this chicken-catching tool will automatically update vulnerabilities.

That is to say, if you choose a LIUNX type computer, it will invade the system loopholes, and then continue to gain control based on the loopholes.

In other words, even if the broiler system is updated, this tool can continue to control the broiler.

Ten minutes later, the opponent's broilers had increased to more than 10, and the scanner stopped working.

Lin Yu moved all the more than 15 broilers to the analysis tool, and then a row of data was displayed on the window.

[General: 10, Privates: 15. ]

Seeing this information, Lin Yu quickly understood that this person had a total of ten auxiliary machines and 15 puppet machines.

From the aspect of DDOS attack, this configuration can be said to be very good.

As for DDOS attack, it is also called denial of service attack.

To put it bluntly, many computers just besieged a computer and kept sending useless data packets to it.

For example, an attack software on a computer can send 3000 attack packets per second, but a computer and network bandwidth can handle 10000 attack packets per second, so the attack will have no effect

Therefore, DDOS attacks came into being. Since one computer can’t work, then ten, hundreds, thousands, or even tens of thousands of computers can be used.

Faced with such a huge attack, if there is no firewall or server specially designed to prevent DDOS attacks, then the computer crash is the only result.

DDOS attack is the most commonly used method by hackers, it is divided into four parts,

The fourth part is the computer being attacked.

The third part is the puppet machine, which is the computer used to attack, which is equivalent to the private soldier in Lin Yu's analysis tool.

The second part is the control machine. This computer is not used for attacking, but for issuing orders, which is equivalent to the chief of the private army.

The first part is the auxiliary machine. This computer is used to manage the control machine and the puppet machine. Generally, the computer with the best configuration is used, which is equivalent to the general in the analysis tool.

If you want to continue to push forward, it is this machine.

Therefore, a qualified veteran hacker will hide very deeply, and ordinary people can't catch them at all.

What can be found are various artificial IPs, fake IPs, and even fake IPs. It is difficult to find the real IP address.

"Well, kill the general first, and take a look at their configuration by the way, and then come over by hand."

Lin Yu nodded his head. After making up his mind, he took out the 15 puppet machines in the analysis tool, put them in the "flood" filter, and handed them over to the chicken catching tool.

The Flood Filter is a half-filter and half-attack tool. After it works, the attacked bots will disappear.

At the same time, it will also track the address of the IP connection, then attack, and then continue to cycle until it finds the real IP address of the other party.

Of course, now that the flood filter is connected to the chicken catching tool, all the broilers that would disappear after being attacked will be taken away by the chicken catching tool, and will be planted with a backdoor Trojan horse to become Lin Yu's broiler.

Now everything is ready, only the east wind is owed.

Lin Yu brought up the intrusion tool, and confidently, he directly used his own machine to start drafting the data flow.

Soon, [-] carefully crafted fake data streams appeared in the intrusion tool.

Seeing this, Lin Yu turned on the flood filter without hesitation, and at the same time manipulated [-] virtual data streams to attack the ten auxiliary machines in the analysis tool with all-pervasive intrusion methods!

Facing the perfect level of computer technology, relying on all-pervasive intrusion methods, port scanning, finding the other party's system vulnerabilities, breaking through the other party's firewall, planting backdoor Trojan horse programs, etc., can be quickly completed within 3 minutes. Breakthrough by Lin Yu!

Without time to check its specific IP address and related configuration, Lin Yu continued to invade the next sub-computer without stopping.

Time passed slowly.

With the operation of the water supply filter, the attack program started directly, and the broilers inside began to decrease at a speed visible to the naked eye.

Especially with the disappearance of the auxiliary machine, the reduction rate of broilers is even more exaggerated, basically tens of thousands.

The broiler in the chicken catching tool grows at a speed visible to the naked eye.

Ten minutes later, Lin Yu successfully swallowed eight of the ten auxiliary machines, leaving only the last two.

At this time, the other party also reacted, but what surprised Lin Yu was that the man ran away without hesitation!

Yes, the other party relies on the last two auxiliary machines and tens of thousands of broilers, and the original data flow is constantly shuttling between the broilers and the springboard.

Lin Yu was surprised to see how fast he escaped.

However, how could Lin Yu let this big fish go.

After calling out the tracking and analysis tools, Lin Yu found the virtual IP based on the simulated IP in the other party's data stream, and then found the broiler IP that sent the virtual IP.

Lin Yu kept following up, shuttling between broilers and springboards one after another, and followed the mysterious man closely, chasing after him.

Generally speaking, if the other party's fake IP is caught and the other party immediately disconnects from the Internet, then it will not be traceable.

But as long as you catch up to the virtual IP through the virtual IP, and then follow the virtual IP to find the broiler IP, even if the other party is disconnected from the Internet, you can still track the other party's real IP!

However, if you want to continue the investigation, you need to follow the opponent's springboard layer by layer. This is an endless cycle.

Of course, the top players will attack the opponent's broiler at this time, and shorten the tracking time by reducing the number of the opponent's springboard.

For example, the flood screening tool made by Lin Yu is constantly attacking the opponent's broilers.

When Lin Yu was investigating, Tianyan suddenly popped up a monitoring window automatically, and Li Yi's trembling voice came from inside.

"You, who are you? As long as you don't expose my information, I'm willing to pay you 100 million a month as a hush money."

After hearing this sentence, Lin Yu couldn't help laughing.

Good guy, give yourself 100 million hush money?

Why does he feel a little offended...

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like