Reborn Super Hacker

Chapter 359 Dragon's Howl!

Main text [Rise of the Dragon] Chapter 350 Nine Dragon Howls!Since this is Chang Linger's office computer, generally a relatively large company will buy the enterprise version of those genuine anti-virus software (with an intranet firewall, etc.), and Chang Linger's company has purchased a domestic one The old anti-virus software, the enterprise version of Ruix anti-virus software, Huang Fei can not help but feel a little depressed, the update of the virus database of this anti-virus software is relatively slow, many Trojan horses can be passed only by modifying the text or using tools to offset the base address .

For example, the simplest 00 shift (filling) method only needs to add spaces to the compiled code of the program, and then use some 16-prohibited modifiers (like ultraedit, which is relatively well-known in China), and switch to hexadecimal editing after opening mode, you can see it, just modify the character corresponding to the found antivirus software signature code, if it still doesn’t work after modification, add a space, the hexadecimal code character of the space is 16, and then put All 20s are replaced with 20s. In this way, the anti-virus software will be passed. So far, this method is still the mainstream method to deal with this anti-virus software!

Huang Fei shook his head. After opening the browser, the IE browser did not give any notification. This website was obviously invaded by Huaxia hackers, but now it actually shows the status of being attacked by CC. Huang Fei saw the trickiness in it. , the firewall installed on this computer was still unable to withstand the penetration of the Trojan horse, but it was intercepted by a tool bundled with the system by Huang Fei. Binding, as long as there is any file reading or trying to create a new program in it, it must bypass this tool to succeed, but if it is intercepted, this tool will automatically decompose the program and then appear in On the blocking list of the tool, you can open the blocking list, analyze and edit the program, any form of editing, there is no format that cannot be edited, this can also be said to be a simple firewall of Huang Fei.

After the extremely penetrating Trojan virus was blocked, Huang Fei immediately opened the blocking list.Rooting virus means that it will permanently take root in the system and infect all .exe executable programs.Huang Fei immediately used the tool to harmonize the flower instruction of the kindergarten version, and then opened another tool, which is his favorite work, "Cloud Virus Maker", a virus product ten years later, which is more powerful than computer antivirus software. China's "cloud killing" is 15 years late.

The so-called "cloud virus" is similar to the "cloud killing plan", that is, a virus that can be managed in the background!

Huang Fei used the technology of decomposition and transmission to analyze the source of the Trojan horse virus, and found that someone released the virus using the server of the Yasukuni Shrine in Japan. Huang Fei opened the browser again and entered the website again, the one bundled with the system. The human tool intercepted the Trojan horse again, that is, when intercepting, Huang Fei clicked the scan of the "Cloud Virus" maker, and soon an original address came out, a certain server in Alaska.

It was country M who was playing tricks again. Huang Fei frowned slightly. It seems that country M must have encouraged Japan to do this incident. The prime minister of Japan visited China a few months ago and said that he would Great economic cooperation with Huaxia, but now they turn their faces and deny people, saying that they will arrest Huaxia's fishing boats and not release them.

After Huang Fei found out the address, he didn't intend to invade the computer in that IP segment. Huang Fei secretly transmitted the "Cloud Virus" Trojan horse through the network of the National Internet Federation, and spread it to users who are still online all over the country. In the computer, if someone knows about this move, it can drive them crazy.

The online computers in the whole country have become one person's chickens. This number can reach the point of scaring people to death, but Huang Fei will not do such a thing, or more precisely, he should be disdainful. The smoothness of the network in Japan Although it is better than China's, the thinking of Japanese people is too dirty. Huang Fei decided to use it to let people all over the world see how Japan dealt with country M. This is the consequence of angering China's "God" , the dragon's howl is about to erupt.

Huang Fei first created a new virus sample using the "Cloud Virus Creator", and added restrictions on the previous cloud decomposition virus. After successfully creating it, Huang Fei directly opened the Japanese country with multiple windows in the browser. The major websites then secretly replaced the virus, "Automatically exclude Huaxia's ip segment, and when encountering a Japanese access ip, the 'cloud virus' will automatically invade their computer, and then automatically generate a hidden folder on the d drive! "Huang Fei also called this virus "sandwich biscuit"!"

Inside a cybersecurity organization in Alaska.

A man from country M wearing a peaked cap, chewing gum in his mouth, looked at the computer in front of him, because he was notified that after obtaining the permissions of several websites in Japan, he would hang the horse, and he didn't care , Looking at the rapidly refreshed data on the screen, he smiled triumphantly. These are computers destroyed by his virus. In his eyes, Huaxia's hackers can only play hooligans, using ddos ​​to attack other people's websites, There is no big technology, and the most important thing now is that the "God is a fool" who scares him has disappeared. Without him, none of them will be afraid now.

However, the ip displayed by the data has obviously changed slowly. The ip segment that was originally China has now become the ip segment of Japan.With his bewilderment, he reopened those websites, but before he knew it, that heuristic virus had taken root on his computer.

"Brother Wen, the computer in the cloud can't be turned on! Grandma's Japanese have hung up horses on their website!" Qingfeng said anxiously.

"We were caught off guard. My computer was almost hacked. Everyone retreat quickly and listen to my command. Qingfeng, you continue!" Yu Wen shouted into the microphone.

Afterwards, all the websites controlled by Jianmeng returned to normal. As expected, the Japanese people were really insidious.

After learning about this, Xiaorong originally wanted to inform the Hongkes, but someone had already reminded them on the Hongke forum!Seeing that the second wave of offensive was about to be resolved by the Japanese, "God" finally made a move.

Huang Fei lightly pressed the Enter key, and then clicked on the start of the system. He chose to shut down, because his program will not be kept here. As soon as he shuts down, the program will be automatically cleared. Of course, just press the If it is activated, the background on the server that Huang Fei borrowed from Tencent will also be activated, so Huang Fei does not need to operate it at all.With this click, the most harmful and fastest-spreading virus in the world, "Japanese-American Storm", appeared. This name was later given to it by the anti-virus software company in country m! !

"Hey, are you guys asleep?" Huang Fei moved Tao Peixi.

The latter slightly opened his eyes, "Are you done?" Tao Peixi looked at Huang Fei and asked.

At this time, Tao Peixi also woke up Chang Linger, who was also in a daze. Huang Fei looked at the two women and smiled, "Thank you, I'll treat you to dinner next time!" Huang Fei said.

"You're done, right? Will it work on my computer?" Chang Linger asked suspiciously.

"Don't worry about this, I have restored the previous operation, and there will be no files left!" Huang Fei said.

Chang Linger nodded, because she believed Huang Fei's skillful operation of the computer before.

"Shall we go back?" Tao Peixi leaned on Huang Fei's shoulder, looking very tired.

"Hey, okay! Let's go to the five-star hotel opposite!" Huang Fei smiled. .

Subsequently, several people walked out of the company. .

The website of the Ministry of National Defense of M country was the first to sound the alarm. Most of the webpages were hung with Trojan horses. No one knew when the hackers came in.

The hacker in Alaska is still nervously repairing the Trojan horse virus. However, his computer's screen is blurred now, and the pixels suddenly dropped to the lowest level, resulting in snowflakes. My God, this is the latest display screen. How could such a thing happen, but obviously, he turned it off and then turned it on again, the initial screen was normal, but when the progress bar of the windows system was read, a grimace appeared on his screen, which scared him directly fell off the chair.

"How could this happen!" He restarted the machine again, but it was still the same. Now he finally knew that his computer was infected with a virus, but the virus was obviously not his own, and his own virus did not have such a function. It was tested on a virtual machine, and it was not connected to the network of the host. How could it be poisoned? One can imagine how powerful the penetration of this virus is.

"What the hell is going on?" The data from the Internet Center Building in New York, country m showed that a large number of Japanese IPs visited the website of country m, and a large number of Japanese people began to invade or attack the website of country m.

"When did Japanese people become so technologically advanced?" A network officer from country M was a little surprised after looking at the websites with Japanese flags on them.

"Impossible, impossible! How could the Japanese have so many such powerful hackers? Are they crazy?" After receiving the news, Peter's face darkened suddenly, and he shouted at the assistant beside him.

However, it shows that the visiting ip belongs to Japan, and the website cannot be restored after the intrusions one by one. What did this do? ? Netizens in country m are still browsing all the large-scale websites, and after refreshing, they are replaced with a sun flag. Seeing that Japanese people dare to deal with country m, this makes the hackers of country m who have always been proud of themselves angry. A cyber war is about to break out again.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like