Chereads / SUPER NET DISK / Chapter 24 - Secret

Chapter 24 - Secret

The tarantula soon received the connection hint, and he mixed a rebound Trojan horse in his email to the second master.

This kind of Trojan horse is most effective against the kind of intranet IP of Polytechnic University. As long as it is hit, the Trojan horse will take the initiative to apply for a connection to the tarantula, thus bypassing the restrictions of the intranet and successfully evading the pursuit of the firewall. Most firewalls are stronger externally than internally, and the control of connection requests generated by themselves is not so strict, not to mention that this Trojan horse is meticulously crafted by tarantulas, even if it is a top firewall, it may not be able to detect anomalies.

The tarantula can't help feeling proud. He thinks his phone call is simply a masterstroke, which is a model of the application of hacker social engineering. This second-in-charge looks very good, and now he has also been hit.

When hackers are technically unable to achieve their goals, using social engineering may be a good way to achieve unexpected results. In the last century, there was a man who knew nothing about calculation but was proficient in social engineering. Taking advantage of the loopholes in the working mechanism of the bank, he made only two phone calls to the head of the bank and took a huge sum of tens of millions of dollars out of the bank. He was hailed as "the best bank hacker in history", and of course he was also the "best bank robber in history".

The tarantula runs the control end of the Trojan horse and establishes a connection with the second master's computer. Soon, he sees everything on the other's computer.

"er." The tarantula uttered a sound of amazement. The other side didn't look like a computer used by a master at all. Antivirus software clearly shows that it is out of date, and the virus database is still half a year old. Why does he not talk about renewal and upgrade? the shortcut icons on the desktop are all about games, QQ, video players, and there are no basic network tools or programming tools.

The tarantula is a little puzzled. Is it possible that it is connected to the wrong computer? He quickly typed in the command, checked the results displayed by the other party's IP, and told him that this is the 10.50.0.120 in the morning. Since the IP of the University of Science and Technology is bound to student information, it means that IP cannot be easily modified.

"Strange!" The tarantula was a little confused about what was going on, and for safety's sake, he decided not to turn off the phone, or at least confirm the identity of the computer, lest the shameless second-in-charge would not admit it.

"Xiao Li, why don't you agree to go out and get a room with me?" Melancholy Duan Yu was a little angry at this time and issued a final cry to the tough Lady Xiaoli, "the condoms I bought are almost out of date!"

"there's nothing to be afraid of when it expires. I'll keep it and blow it up as a balloon for the baby!"

The tarantula burst into shame and accidentally saw this thing, and he didn't know if his eyes would have sores tomorrow. He quickly withdrew from the remote screen monitoring and flipped through it carefully on each other's computer to see if he could find anything that could prove the identity of the computer.

In disk D, the tarantula turned to a folder called "photos" and looked at it. It was basically full of pictures of a little girl. The tarantula guessed that this was the Xiao Li on QQ just now. Further down, there are several photos inside, and among them is a guy who makes faces and pretends to be cool, and Hu Yifei, whom he saw in the student file, is obviously the same person.

Wolf Spider nodded, it seems that this computer should be Hu Yifei.

When the tarantula turned to the E disk, the tarantula quickly noticed that something was wrong: the E disk had 120g of capacity, which showed that 118G had been occupied, but there was nothing on the E disk except for a game folder showing Diablo.

The tarantula checked the size of the game folder and found that Diablo, which was only about 2G, was 118 gigabytes here. The tarantula immediately understood that there must be something else hidden in the folder. He opened the hidden properties and found two new folders in Diablo.

"Secret Book Book?" The tarantula immediately felt a light in front of its eyes, and the heart said that it must be something good inside, and quickly ordered it in, and soon the tarantula withdrew in shame. Unexpectedly, it was full of articles such as "detailed explanation of the old man's cart" and "how to make a perfect first time". It's really a secret book.

Looking at the other folder, "my Collection", the tarantula was a little timid and did not dare to click in rashly, but in the end, he could not resist curiosity, and he took a quick look.

"it's over. I'm sure I'm going to have a sore in my eyes this time!" Tarantulas regret, this folder is actually a large number of porn, quite spectacular, it is rare that the computer owner also made a very detailed classification, clear at a glance.

The tarantula hated and cursed twice, and finally went to disk C. unexpectedly, as soon as it was opened, his computer was prompted to be attacked by a worm. Tarantula hurriedly retreated, even rolled and crawled, and finally withdrew from this excellent computer.

The tarantula is completely speechless. What kind of computer is this? In the morning, I couldn't take it down. I seemed to have super security performance, but now I did, but I found that it was not the case at all. In addition to my own Trojan horse, there was a considerable number of viruses. Apart from that, there was nothing left.

When the tarantula landed in the wolf's nest, the tarantula took another look at the second master's IP,. It was unexpected that the second master's IP was exactly the same as in the morning, and it was still shown as the public Internet IP of the University of Science and Technology.

Hu Yifei's IP address has not changed, but his way of surfing the Internet has changed for a while. Now he has learned to be smart. Instead of looking for any agents or Internet cafes, he directly connected to the school's Internet server with an artifact, and then logged in to the Langwo Forum on that server. The display of the IP address naturally will not change.

"Ha! No wonder you don't get dizzy this time! " Hu Yifei also saw the tarantula online at this time, so he smirked in front of the computer.

"second in charge!" Duan Yu was over there urging Hu Yifei, "are you ready?"

"all right!" Hu Yifei casually sent a compressed file to Duan Yu's QQ, "put this thing away!"

Duan Yu received it and asked, "what is this?"

Hu Yifei hurriedly reminded: "Don't order!" That is my elaborate Trojan horse program, you will pass it to Xiao Li later, as long as she opens it, it is guaranteed to be hit. "

Duan Yu was overjoyed and relayed the document to Xiao Li.

Hu Yifei smiled in his heart. In fact, there was no Trojan horse in the document. It was just a very ordinary picture. However, this surface work had to be done. Otherwise, how could people be fooled?

The tarantula over there has figured it out at this time. Is it possible that he has found the wrong person? He carefully recalled the process of the attack in the morning, when he controlled the public Internet server of the University of Science and Technology, and found no traces of intruders other than himself, so he judged that the second master should be hidden in the intranet of the University of Science and Technology, but which machine it was on, he needed to analyze and find it from the data of the Internet server.

Thousands of people share an Internet server, and you can imagine how huge the data has to be. The tarantula has been looking for it all morning, but there is no way to confirm which intranet computer the second owner is on. Just as he was ready to give up, the second master sent a forum short message saying he was going to eat, and the tarantula found out where the computer was.

When the tarantula thought of this, she suddenly realized, "sure enough, I was fooled by the second master!" . Now, when I think about it, the news from that forum in the morning is really too strange. The second master must have made arrangements on Hu Yifei's computer beforehand, and then sent a message to himself, luring him to attack this computer. At that time, he actively defended in front of the computer. Of course, he couldn't get in. When he mistakenly thought that this computer was his real place, the second owner retreated. And got rid of all the defense deployments on this computer.

"really, how could I be so stupid!" Tarantulas regret, these two masters are obviously playing with themselves, or the sugar fried chestnuts on the forum was right, this guy is an expert, specializing in playing tricks on rookies.