Chapter 56
Since the anti-espionage program implanted in the router was discovered and removed, ANSG has been closely following the dynamics on the Internet. Kevin inferred that the rain must have made some moves, but after waiting for a while, there was still no movement at all. Recently, no major hacking incidents were discovered. However, the team members had no complaints. This is their job, monitoring possible hacking incidents on the network all day long, responding to emergency responses, and giving corresponding solutions.
Two days later, and by the weekend, they finally found a clue.
It was already around 8 o'clock in the evening. According to the time difference, the United States should have caused five or six o'clock. The sudden rain finally started the operation. This operation was directed by Blood Rain personally because the mission lasted for a long time. Their mission this time was to steal an aircraft design software from the US military. The software was relatively large, and it would take some time to completely download it, so the risk of being discovered was relatively high.
The place where they communicate is an encrypted IRC chat channel. There are great differences in IRC's general WEB chat room. Hackers, especially foreign hackers, have an important habit. They all like to set up IRC servers on the websites that have been conquered and use them to communicate and boast about technology. IRC is based on a relatively mature technology. It generally waits on port 6667 and has a special IRC protocol, which follows the RFC1459 specification. In this specification, the communication requirements between the IRC client and the server are specified in detail. Any server that follows this specification can communicate with the client that follows this specification, regardless of whether the developers of the two work together. This is the charm of layered ideas and division of labor in the network. Reading the RFC specification and finding possible vulnerabilities is an important course for hackers. From this aspect, it can be said that RFC is the Bible of hackers.
Compared with traditional WEB chat, IRC has very obvious characteristics, which are very popular among hackers. First of all, IRC refreshes the screen quickly, and the speed is measured in milliseconds. There is no delay or jitter at all, which is very protective of vision:); secondly, IRC has extremely high confidentiality. In a formal IRC server, if you do not talk to people in a public chat room but instead chat with them in a secret (that is, the commonly known as opening a small window), then no one else will know what you are talking about, including the administrator. This is not like in some web chat rooms, administrators can peek at your chat content through some specific CGI or ASP programs. This is also one of the reasons why many hackers also use IRC for communication. In addition, it also has features such as easy management and powerful functions.
The members of the Rain Rain have already done their jobs. If they weren't afraid of alarming the enemy, they would have implanted the Trojan horse into the target computer. Xueyu gave a list of IP addresses. The computers where these IPs are located may be connected to the internal military network of the United States. After assigning tasks, everyone began to invade the system.
At this time, there were only Xue Yu and the other three in the computer room of the University of Defense Technology. Since Xue Yu is the administrator of the school computer room and he has the key to this computer room, they can take action at this time. They have never met other members of Shu Yu and were only absorbed into the organization after rigorous inspection. Shu Yu was not organized by the government, but was spontaneously created by Xue Yu and three other people. Shu Yu and the members have one common feature - they all hope to help the country with their own technology.
The computer room was silent, the sound of the three computer fans rotating was particularly clear, and their crisp keyboard typing sounds. They were all focused on the monitor with black background and white characters. Things were going well. Through layers of investigation, they found what they were looking for. The download process started. Zhiyu and Shiyu were ready. They just waited for the download to start cleaning the scene immediately. The retreat was ready. If someone was tracked, they even considered starting a quick formatting program that had been buried in the broiler.
Pentagon, USA.
The ANSG team members who had just fallen asleep were urgently summoned together, and the staff on duty found the whereabouts of the Rain!
In a daze, the team members immediately woke up and became twelve points, swearing that they would not let the other party escape again this time. The tracking program started, and soon they arrived at the first layer of defense of the invaders. Similarly, they were each in charge of part of the work, scanning, analyzing, and invasion... Everything was tightly organized, and the first layer of defense was quickly broken. They had to track the target before the design software was downloaded, otherwise they could only break the other party's connection at the last moment.
"DiDiDi--" The long-awaited alarm sound came from the speaker. Xu Yi, who was writing a program, shook his wrist and then became a little excited. This was the alarm sound from the intrusion monitoring program he implanted in those broilers during the last time he was tracking the storm. In other words, a machine was invaded at this moment.
"I hope it's a sudden rain, I'm a little impatient to wait!" Xu Yi prayed secretly, checked the address of the server that called the alarm. It was a server in Canada. He immediately connected to the server through the back door and found that the agent was opened on the server. Xu Yi was overjoyed and quickly tracked the target address of the agent and used this agent. This way, he himself added an extra layer of springboard. Then he came to a server in Finland, or a proxy server, and added a springboard to continue tracking...
"There is a door! It seems to be a big move, otherwise I wouldn't be so careful." Xu Yi was about to continue, but suddenly he found that the server he was visiting had many connections. He quickly uploaded a small program to cover the program used to view user commands in the target system and hide himself.
What's going on? It's so lively? Xu Yi found that there are two groups of people in this system besides himself. The reason why he knows it is two groups is because they are completely against each other, with some covering up and some slandering each other. Anyway, one side hopes to continue to break through, while the other side blocks and trys to stop them.
Xu Yi was puzzled and decided to ignore the address of the proxy server and instead track other users in the system. This time, the tracking was very simple, and he immediately chased the Pentagon in the United States.
The cake seller! It seems that the guy who tracked me last time!
Xu Yi was startled. He didn't want to find out which Pentagon computer he was following. Knowing how many brushes the other party had, he immediately put aside it and check out what the target of the invasion was before he was discovered. Although Xu Yi wanted to track down other members of Churai immediately, he was now more interested in their targets.
A software? Why is it so desperate for the software that the other party has discovered that it still won’t give up?
Really, since I was discovered, there will definitely be no chance to download like this. Hehe, let me help you. Xu Yi uploaded a small program from a broiler and ran it, but he did not take action immediately.
Xu Yi looked back and saw that oh! Finland was broken! The Americans were still superior in their skills. Xu Yi found that the invaders had lost several cities in a row and had arrived in Canada.
We should have helped them, right? Xu Yi was about to make trouble in order to delay the invaders, and at this time another force joined in.
He is here! Xu Yi's intuition told him that this person must be the mysterious person who took action several times. With him taking action, the pressure on the American side was obviously increased.
What's wrong with sacredness? Xu Yi thought of this and began to secretly track down this guy.
===========
Ps: There are urgent matters on the 1st, 2nd, and 3rd. I can only take time to update one chapter every day. I hope everyone can forgive me. I will reply to update later.
Recommend friends basketball competition category "I'm crazy for youth"
Chapter completed!