HacKer

Chapter 1148: Find out the identity, count again after the fall!

Amd's server cpu has a fatal hardware vulnerability. At present, there are only two hackers who hold this hardware vulnerability. One of them was Shi Lei, and the other was the original discoverer of the loop, Maha Kamal.

The reason why Shi Lei knows the hardware vulnerabilities of amd server cpu, or because in the afterlife, Maha Kamal disclosed the hardware-level vulnerabilities he discovered.

At present, in the era of 2007, Maha Kamal did not disclose this secret. To put it another way, that is, in secret theory, only Maha Kamal knows.

Therefore, Shi Lei is sure that the hacker who invaded the supercomputer lightning is Maha Kamal!

Although Shi Lei knows that it is Maha Kamal, ‘Maha Kamal’ is just a hacker nickname. Shi Lei wants to find the true identity of Maha Kamal.

Maha Kamal is a hacker in Inca. After the end of the first martial arts competition in the brave world, Shi Lei and Tao Wenxian are just going to the Inca to handle one thing.

If you find the true identity of Maha Kamal, Shi Lei does not mind to put this threat in the middle of it.

Shi Lei entered the supercomputer lightning through the No. 1 server. Since the last invasion by Maha Kamal, Shi Lei has not only patched the hardware vulnerabilities of the server cpu, but also made a huge honeypot system.

This honeypot system uses a mirror image of supercomputer lightning, and the entire honeypot system is unparalleled. Even Maha Kamal has the strength of a world-class hacker. However, when faced with an unfamiliar supercomputer, it was directly recruited and caught in the honeypot system without any notice.

Shi Lei looked at the intrusion information of Maha Kamal. Maha Kamal is in the honeypot system, searching for the honeypot system, it seems that I want to determine the details of the supercomputer lightning, to further control the supercomputer lightning.

Poorly, Maha Kamal didn't know that he had fallen into the trap that Shi Lei had carefully arranged. Shi Lei was investigating his real ip address in reverse!

'Humph! ‘Shi Lei observed the unscrupulous scanning behavior of Maha Kamal. The heart snorted, ‘I really thought that mastering hardware-level vulnerabilities, can you be lawless? ’

"Is it. Isn't the secret network resource ready to be completed?" Shi Lei asked about the clothes, because Maha Kamal is currently inside the supercomputer lightning, if you call the resources of supercomputer lightning, you may be alarmed. Let him evacuate from the supercomputer lightning. Thereby losing the target of tracking.

"Already ready to complete!" Yi Zhuer opened the port of iwn secret network computing resources, and opened it to Shi Lei, so that Shi Lei can be easily called.

After obtaining the computing resources of iwn secret network, Shi Lei immediately increased the intensity of anti-tracking Maha Kamal. He quickly and concealed the transfer server used by Maha Kamal.

These transit servers provide Maha Kamal with a hidden protection of the real ip address. If the strength of the anti-tracker is a little worse, it will be resisted by the defense of the transit server, thus giving Maha Kamal. Provides time to clean up traces of real ip addresses.

As an anti-tracker, is Shi Lei's strength poor?

Shi Lei is a hacker at the peak of the world. In the entire hacker world, it is also a small group of people at the top, tracking the real ip address of Maha Kamal, as long as time permits, Shi Lei will never go wrong.

‘There are already 27 transit servers, and each transit server has reached the standard of first-class broilers. The computer industry in Inca is really very developed! 'Shi Lei is processing Mahavi Kamal's twenty-eighth broiler chicken.

After almost ten seconds of treatment, Shi Lei bypassed the twenty-eighth broiler chicken and killed the next broiler without causing the broiler server defense mechanism.

The twenty-ninth broiler chicken did not resist Shi Lei for more than ten seconds. Shi Lei easily broke through the defense of the server. Just as Shi Lei was ready to continue to follow, Shi Lei discovered a weird thing.

The 30th broiler is actually a transit server that he broke before. That is to say, Maha Kamal used a circular broiler network protection system.

Shi Lei once encountered this kind of defense protection scheme. However, the loop transit broiler network protection system that was encountered that time ago only had only three broiler servers, which constituted a small loop.

But this time, Maha Kamal used a circular transfer broiler network protection system, but used a total of 29 transit servers!

At one time, when Shi Lei’s hacking technology was not yet successful, he also liked to use the circulating broiler network protection system to protect his real IP address.

The circulating broiler network protection system, although it can effectively confuse the anti-tracker, it is not without defects. In this protection system, every additional broiler server needs more powerful technical strength.

According to the strength of Maha Kamal, in the circulation of the broiler network protection system, the construction of 29 transit broiler servers, he does have world-class strength.

When Shi Lei discovered Maha Kamal and used the circulating broiler network protection system, Shi Lei temporarily stopped tracking. The circulating broiler network protection system, as the name suggests, is a circular broiler network. The so-called cyclic network can be simply understood as a circular semi-closed network.

To give an example of the image, the real ip address of the loop broiler network protection system will be tracked and described as the starting point and the end point of finding a circular pattern. How should we find it? Obviously, if there are no strict restrictions, it is absolutely impossible to find.

Shi Lei now needs to find a circular broiler network protection system, covering the real ip address.

In addition to the need for strong technical strength, the circulating broiler network protection system has a fatal flaw. It is because of this flaw that the real hacker peaks will never use this method to cover up the real IP address.

The fatal flaw of this circulatory broiler network protection system is that in order to make the loop broiler network protection system protect the real ip address, the real ip address needs to be placed in the loop broiler network protection system.

In other words, the loop-transfer broiler network protection system used to protect the real ip address implies a real IP address. This is like finding a starting point for a circle. It is not easy to find under normal circumstances. But what if the starting point of the circle is marked in red?

The current situation is like looking for a starting point marked in red in a circle. With the strength of Shi Lei, it can really be found easily.

After confirming that it was a circulating broiler network protection system, Shi Lei changed the tracking scheme. As a master who used the circulating broiler network protection system, Shi Lei is very aware of the shortcomings of the circulating broiler network protection system.

In less than 30 seconds, Shi Lei discovered the abnormality of the 21st transit server. In the 21st transit server, Shi Lei carefully searched for it. After a while, he found suspiciousness.

"Ah, grab you!" Shi Lei slightly analyzed the ip address of the transit server, and found that this is a cover address, the real ip address, also hidden inside this broiler server.

After getting the real ip address of Maha Kamal, Shi Lei immediately began to investigate the real ip address, corresponding to the real world address.

According to Shi Lei's speculation, Maha Kamal is very confident about the hardware vulnerabilities of the server cpu. He will not worry about someone tracking his real IP address. Then, in this case, the real ip address used by Maha Kamal is very likely to have not been done, that is, through the real ip address, you can investigate the real identity of Maha Kamal. information.

“Well, search for line information!” Shi Lei told the company to retrieve network line information, and he himself invaded the network service provider in Uttar Pradesh, India.

Maha Kamal's real ip address, corresponding to the real world location, in Uttar Pradesh, Inca. For further detailed information, it is necessary for Shi Lei to invade the network service provider of Uttar Pradesh and combine the corresponding real IP address to be able to query the results.

Uttar Pradesh's network service provider, the defense strength is not high, Shi Lei did not spend much effort, it has entered the UTA's network service provider data server.

Inside the data server, Shi Lei used the real ip address of Maha Kamal as a condition to make a query comparison. After a while, Shi Lei obtained matching data.

Registered address of the network service: 1037 Xiding Street, Lucknow, Uttar Pradesh; registered registrant: Madsen Kamal.

Shi Lei looked at the matching information and smiled on his face. He immediately invaded the network of the Population Information Bureau of Uttar Pradesh and extracted all the information of Madsen Kamal in the network of the Bureau of Population Information Statistics.

These materials, through the joint analysis of Yi Zheer and Shi Lei, came to the conclusion: Madsen Kamal has superb computer technology, he is the Maha Kamal who Shi Lei is looking for!

"It turned out to be you!" Shi Lei chuckled, but did not immediately deal with Maha Kamal, allowing the other side to investigate in the honeypot trap system of the supercomputer lightning.

Shi Lei is now free to deal with him, Shi Lei needs to sit in the city of Shuangqing, personally protect the main server of the brave world, to prevent the main server from being hacked.

The brave world's first martial arts hegemony contest has come to an end, and Shi Lei does not want any problems. Because, if any problem arises, it is a fatal problem!

As for Maha Kamal, Shi Lei has already found his true identity information, read the facial features of humans, wants to pack him, and can settle accounts anytime and anywhere.

At this moment, Shi Lei is more concerned about the battle between Jo Mo and Mu Feng!

(To be continued, please search for astronomical literature, the novel is better updated faster!

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like