Chapter 122 Private Message

Xiang Kun knows that to many people outside the industry, hackers are the most NB programmers.

In general, the title “guest” is the king, what hacker is a red guest, and the hacker is a hacker. The title “teacher” is a master. Any engineer architect who has the title “member” is Pan Kuoshu.

But in fact, the top programmers and top hackers are not at all divided into high and low, but the areas of specialization and expertise are not the same. One is to find ways to meet and implement the requirements and build a system; the other is to rack their brains to mine and exploit vulnerabilities. Invasion of the system; one for building and one for security.

There is no complete boundary between the two. Hackers themselves are a subset of programmers, and programmers can become hackers at any time.

The directions of interest and specialization are different that’s all.

When Xiang Kun was in middle school, he was once obsessed with the handsomeness of hackers in film and television novels, fantasizing that he hacked all the computers in the world, hiding everything behind the screen and controlling everything when he was secret mastermind. Occasionally, according to the tutorial, I have several bad websites with poor password settings and poor maintenance. However, I haven’t done anything. Basically, I take a walk around, peek, and leave a txt or jpg file to show you here It’s just a very good script kid.

Now Xiang Kun is no stranger to the terms such as SQL injection, cross-site scripting, buffer overflow, heap spray, etc., and the principles are well known, but let him attack and invade specific targets. No. Not only different thinking habits, different understanding of many vulnerabilities and application habits, but also lack of a large number of other accumulations, such as many spare broilers, reserved backdoors, different levels of social work libraries, special programs written by themselves or others Tools, etc., are not something that can be done instantly.

Of course, although top hackers are powerful, they are not omnipotent.

Just like someone is going to enter your house, they usually do n’t hit the door directly with a hammer, or they are disguised as delivering courier, checking water meters, collecting electricity, repairing computers, delivering food … When you are not out, or when you are sleeping, you use the imperfect security and building structure problems to sneak in through the windows, unlock with the master key and sneak in, even when you buy food to go home, and follow you insignificantly, and You enter the house together.

Even if you don’t open the door, they can pretend to be your identity, collect the courier service at your doorstep, and send the courier service in your name.

Unless you blow up the road outside your home (interrupted network), otherwise you will always be remembered, which is really a bad thing.

But the premise of all this is that they know the real address (IP) of your home.

On the Internet, the most important information is the IP, which represents your location, and the mac address is your “name”, just like someone found out that you live in a hotel, you must know your name to find you. In which room I caught you.

World is so big. If you do n’t interact with people and no clues are exposed, certain people may not be able to find you because they don’t know that you are the person they are looking for.

But Xiang Kun is now actively sending packages to people who may be malicious and capable of tracking him, so he must be careful and be prepared.

The router in that coffee shop is like a doorman who collects express mail at the door of a certain neighborhood. Xiang Kun asked Xiaoye to send him a parcel in the name of Xiaoming. The old man called the post little brother (network service provider) and delivered the parcel. To him, the post little brother delivered the parcel to Xiang Kun’s little brother A (a springboard), and the little brother A delivered the parcel to the little brother B (two springboards).

Little brother B took the package and gave it to a running brother little brother alliance (TOR). The running brother little brother alliance packed the package outside and gave it to little brother C. Little brother C only knew that the package was delivered to XX city, so it was delivered to Later, I found little brother D to take it over in XX city. Little brother D tore a layer of parcels. Knowing that the next destination was XX Street, I found a little brother E near XX street to take over. Little brother E tore another layer of parcels. , Sent to the front desk of a company number XX (almost know the server).

When the final parcel is opened at the front desk of the company, the address of the parcel sender above is not at all. They have to return the parcel to the sender, which can only be given to little brother E.

Then little brother E found little brother D, little brother D gave little brother C, and after returning all the way, he gave it to little brother B and A, delivered it to the little brother of the post, and went to the guard room of Uncle Grandpa, Xiang Kun Take it in Xiaoming’s name.

So even if the company’s front desk is known to be controlled by “evil people”, the little brother E who sent the mail will be killed. Little brother E cannot tell the sender’s address because he doesn’t know it at all, he only I know it was given to him by little brother D.

Of course, this method is not completely secure and cannot be traced.

For example, the errand little brother has its own “bad guy” informer in the league, or the “bad guy” has made a ruthless effort and paid enough price and manpower to catch little brother D, then little brother C, and then understood little brother A, B, came over and hit, one after another torture.

For example, if a locator is placed in the package sent back, if Xiang Kun opens the package, the locator will work.

For example, sending a parcel of trucks to Xiang Kun made him have to spend a lot of time to move and gave them time to track down.

But in the end, even if the understood they sent from the post little brother was in a certain neighborhood, they even found the janitor, and learned that the person who sent the parcel was called Xiaoming.

But their immediate response must be to search the entire community for this guy named Xiaoming.

When Xiang Kun spied on it, he took off the mask on his face, destroyed all the packages (virtual machine), and hurriedly retreated.

Xiang Kun had heard before that when police investigated a malicious hacking incident, the Vice-section Head of the Ministry of Public Security personally supervised it, and the telecommunications operator opened the partition in the middle of the night to determine the location of the attack. One computer room and one computer room were connected for inspection. The police Uncle blocked the suspect’s door before dawn.

Although it ’s okay to judge the other party ’s high probability, Xiang Kun has always been used to thinking of fictitious hostility, and when the other party can find his access IP to make a plan.

When I was thinking that there was nothing I didn’t think about, I knew “Kasumi in August” and responded to the private letter.

“You are also a vampire? How can you prove?”

Xiang Kun had already anticipated this problem and replied: “It is more hungry during the day than at night. If there is no blood to drink when hungry at night, it is easy to get manic.”

When he considered answering, he thought about how to prove his vampire identity without revealing his identity. The less information he disclosed, the better.

It’s as if he didn’t say he was bald, molted, changed his teeth, nor did he say that he became stronger and better eyesight. After all, he was not sure if other “vampires” had the same changes as him, at least that “giant owl” But no hair loss and baldness. Once he said that, he would probably let the other person know that he was bald, and this was an obvious feature.

“Kasumi in August” replied:

“Are you afraid of garlic?”

“I’m not afraid, but I can’t eat it. Besides water, I can’t vomit anything else. The cross is not afraid, and the Buddha statue is not afraid.”

“Wow! You are really a vampire! I finally found a similar, so happy!”

Xiang Kun looked at the screen indifferently, and sneered under his heart: pretend, then pretend.

Then he replied: “Yeah, I’m so excited! I finally encountered the same kind!”

Kasumi in August: “Let’s chat with QQ. I know that the private message is not safe. Maybe the administrator can see our chat! What is your QQ number? I add you!”

Pipikakachuqiu (Xiang Kun’s newly registered ID): “What’s your QQ number, I’ll add you.”

Kasumi in August: “424423 ****”

Xiang Kun just wrote down the QQ number in his head and didn’t even search, let alone open QQ. After a while, he replied: “Aiya, I forgot my QQ password, why not try it? Come out, forget it, and say it directly in the Zhihu private message, people should not have time to peep at our chat. “

Of course, he knows the purpose of the other party to use QQ to chat. He knows that the private message is on the server he knows. The other party has less permissions, but when using QQ, it is easy to find the P2P method. Then Knowing the IP of the other party in the chat is equivalent to removing the company’s front desk when sending the package, and directly delivering it to the other party. The little brother E who sent the package will be caught directly.

Of course, under the guise of Xiang Kun, using tor to open QQ to chat with him, it was not so easy to find the real IP. It is just that Xiang Kun did not prepare a new QQ number temporarily, and he was too lazy to change his way.

After a while, Kasumi in August replied, “Why not add a WeChat, what is your WeChat signal? Don’t tell me you can’t remember the WeChat password again?”

Pipikakachuchu: “What’s your WeChat signal?”

Kasumi in August: “Hey! I ’ll ask first, OK?”

Pipikakachuchu: “Forget it, I think we should talk like this first. How did you become a vampire? When did you find out?”

Kasumi in August: “Why aren’t you a gentleman like this person? / Poor expression.”

Pikakachuchu: “I’m not a gentleman, I’m not sure if you are the same.”

Kasumi in August: “Not sure why you sent me a private message? Is that my answer written clearly?”

Pipikakachiu: “So how did you become a vampire, and when did you change?”

Kasumi in August: “I don’t want to say a lot of things in private messages, either adding QQ, adding WeChat, or talking directly.”

Pipikakachuchu: “What’s your WeChat and phone number?”

Kasumi in August: “You this person is too alert, and you only got a vest to send a private message? You keep asking me for information, but I do n’t say my situation? You need to know when I become How did a vampire become a vampire? You have to tell your story first? / Anger expression. “

Pipikakachiu: “You say first, I’ll tell you.”

After a while, Kasumi in August gave a sigh expression, and then replied:

“Well, I became a vampire a month ago. I don’t know how it changed. It just happened suddenly when I woke up. What about you, who was your first food?”

Xiang Kun raised a brow, and this response revealed too much information, probably so much that the other party didn’t realize it.


Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like