Urban Denon

Chapter 108 The Birth of the Heavenly Dragon

I don't know how the defense of the Tianlong system is?Thinking of this, Xiao Yihan used Xia Xiaoyu's computer to hack into his own computer. Xiao Yihan copied the Tianlong system and installed it in Xia Xiaoyu's computer. Xiao Yihan wrote a small program to hide the Tianlong system so as not to Xia Xiaoyu accidentally activated the Tianlong system and was discovered by others.

Xiao Yihan set the start-up program to be controlled by five irrelevant buttons. When Xiao Yihan finished all this, he quickly clicked those five buttons, and saw that the Tianlong system replaced the original windows operation on Xia Xiaoyu's computer desktop. system, Xiao Yihan quickly clicked a few buttons with his fingers, and the Tianlong system began to scan his computer.At this time, Xiao Yihan could be said to be his own spear attacking his own shield. Xiao Yihan wanted to use this method to test the attack power and defensive performance of his Tianlong system.

Seeing that 1 minute passed, the scanning program in the Tianlong system did not scan out the vulnerabilities of the Tianlong system installed on Xiao Yihan's computer, 2 minutes passed, and 3 minutes passed, and Xiao Yihan was complacent about the Tianlong system he wrote for himself. Suddenly, at 5 minutes, the scanning program showed that it had found two loopholes in the other party's system. Xiao Yihan looked at the scanning results of the scanning program, and felt as if someone had poured cold water on his head at this moment. , There are loopholes in the program I carefully wrote.But knowing that Xiao Yihan's original wish was to write a perfect system, now that his shield has been pierced by his own spear, why not make Xiao Yihan feel annoyed.

In fact, Xiao Yihan's Tianlong system is rigorous enough, but the scanning program of the Tianlong system should not be underestimated. Other scanning programs may not be able to scan the loopholes of Xiao Yihan's Tianlong system.

At this time, Xiao Yihan suddenly thought of American scholar Steve.A sentence in Levy's book: There is more than one road to a computer, that is to say, there is no perfect program in the world, and almost all hackers just try to make their systems as perfect as possible, as long as they are human, they will not Make something perfect.

Xiao Yihan went to his computer and patched the two loopholes he found, but just after patching, the scanning program in the Tianlong system in Xia Xiaoyu's computer found three loopholes.As time went on, within two hours, a total of fifteen loopholes were scanned in Xiao Yihan's Tianlong system, and Xiao Yihan filled them up one by one.Another hour passed, and the scanning program did not find any loopholes in Xiao Yihan's Tianlong system. At this time, Xiao Yihan understood that the fact that the scanning system did not find any loopholes did not mean that there were no loopholes in his Tianlong system, even if Kevin Mitnick, the number one hacker in the world, was not caught by the FBI in the end. He is now working for the FBI. As a hacker, if he loses his freedom, his inspiration will be affected, so to be honest A real hacker is free. Only in a free environment can he give full play to his skills and instant inspiration. When a top hacker cracks some difficult passwords or systems, he relies entirely on the sudden change in his mind. The string of characters that came out of nowhere, even he himself didn't know why there was such a string of characters in his mind after the incident.

Of course, these characters did not jump out of thin air, but a situation that only appeared under the premise of the hacker's superb technology and a proficient grasp of a large amount of knowledge about electronic computer theory.

When Xiao Yihan used the scanning program of the Tianlong system and could no longer scan the vulnerabilities of the Tianlong system in his computer, how could Xiao Yihan use the Tianlong system installed in Xia Xiaoyu's computer to invade his computer?

Xiao Yihan sent a large amount of information to the Tianlong system of his computer, hoping to slow down the running speed of the Tianlong system on his computer by sending a large amount of information, so that he could take advantage of it, but now Xiao Yihan only has Xia Xiaoyu's computer in his hands. There are not a large number of network zombie computers, which means that Xiao Yihan is now a poor commander. Half an hour after Xiao Yihan used the first method to invade, Xiao Yihan had no choice but to give up.

Now Xiao Yihan chooses the only port, the port connected to the network to launch an attack on his computer, Xiao Yihan chooses the ipc intrusion method, first puts a program he wrote in a directory of his attack program, and then intrudes this program into the port , and then use another small program to start the program at the port, so the program at the port creates a shell on port 99 in Xiao Yihan's computer. Although Xiao Yihan can telnet to it, the program just written is One-time only, you will have to activate it again next time you log in!So Xiao Yihan set up a telnet server.up

At this time, Xiao Yihan used the copy command to upload the program just now to the host, and started the program again. At this time, the word "done" appeared on Xiao Yihan's monitor, which meant that the program had been started normally.Then Xiao Yihan used that program to open the telnet service, and then entered the user name and password to enter the other party. In this way, Xiao Yihan successfully invaded his computer equipped with the Tianlong system.This is simply a few words, but it took Xiao Yihan nearly half an hour to implement it.

At this time, Xiao Yihan closed his eyes, lay on the chair, recalled the intrusion just now, and thought in his heart: No, my intrusion speed is too slow, my computer is left unattended, and I have used it for so long. Someone is watching, and if the other party is a master, wouldn't I be slower? No, the Tianlong system is still not perfect and needs to be improved. However, the improvement needs to be done through continuous practice. It seems that I can go online for simple hacking now. Active, Xiao Yihan muttered in a low voice.

Don't you know that it took Xiao Yihan such a long time to successfully hack into his computer because the system in his computer was too perfect, maybe after Xiao Yihan hacked into someone else's computer, he would not know how abnormal his Tianlong system is.

Knife for collection

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like