Reborn Super Hacker

Chapter 448 Anti-Black Technology

Main text [Rise of the Dragon] Chapter 440 The eighth anti-black technology is very fast, the software has finished analyzing the program of hakctom.exe, Li Hua can't wait to open the result to check, the judgment result of the program is as expected by Li Hua , is just a hacker program, he injected some key system hooks into it, it seems unrealistic to make a special killing tool for such a virus, because this virus has already infected Ding Peng's computer files Even if it is killed, it will be restored.

Seeing that Li Hua was in trouble, Ding Peng immediately said, "Brother Li, why don't you reinstall my system, and I'll move all the data to Kingston's solid-state drive, so it's okay, right?"

Originally thought that Li Hua would agree with his idea, but what he didn't expect was that Li Hua strongly opposed him as soon as he said it, "It's useless, your computer has been infected with a virus, this virus is worse than Panda Burning Incense and AV Terminator Powerful, and from the architecture point of view, it is a modified virus source based on ec source code. Even if you reinstall it, it will automatically associate all executable files on your computer and generate a lpk.dll The hook cannot be cleared after reinstalling, unless you format the entire disk and reinstall, the virus will still resurface." Li Hua said.

"Then reinstall everything, it's fine." Ding Peng just wanted to drive those snoopers away from his computer quickly.

Li Hua shook his head, "This is not the best way. A full reinstall is usually done only when it is absolutely necessary, but the main thing is that even if you clear your computer of viruses, those Huaxia netizens will get infected and lose money. What should I do? The best way is to track down the hacker who distributed the virus and uproot their organization." Li Hua continued.

After hearing this, Ding Peng was taken aback for a moment, and then suddenly realized, "Brother Li, do you mean anti-criminal against them? (It is equivalent to anti-tracking, a hacker term.)" Ding Peng was a little emotional when he said this, After all, Li Hua is also the leader of the Huaxia Honker Alliance, and basically everyone in the Chinese hacker community knows it. Today, Ding Peng was finally able to see a top hacker using anti-criminal technology, and he was so excited.

Li Hua nodded, "I will reconnect to the Internet later, I will use your laptop to go to another room, I will send you a remote control Trojan horse, I will monitor your screen, and we will come up with a fishing plan." Li Hua said.

"Fishing?" Ding Peng was a little puzzled.

Li Hua nodded, "That's right, it's fishing. First, I'll take your laptop and go to your room. Second, you leave your computer. Third, those who wish to take the bait!" Li Hua laughed.

When Ding Peng heard that this was the case, he nodded immediately. He is not stupid, he knows what Li Hua wants to do. By monitoring the permissions of his computer, you can remotely monitor everything on his screen in other places. When the "fish" voluntarily takes the bait, you can immediately call the system log in the remote control, and then track its ip, because Huaxia The network information department of the company has real-time detailed information on 5000 million ip addresses, and it is actually very simple to lock a certain ip.

The next thing to do is to get Li Hua's remote control Trojan horse to Ding Peng's computer. Although the network is disconnected, it is still very simple to transfer the Trojan horse to Ding Peng's computer. There are many ways , can be transmitted through the local area network, can be transmitted through the command prompt, or can let Ding Peng open a port on his computer to transmit directly remotely, but these are not the best methods, because they all need to be connected to the Internet, so Li Hua directly He ran his remote control software on the USB flash drive, and then directly generated the accused. Although Perfect Guard has strong anti-virus capabilities, he still couldn’t find the Trojan horse generated by Li Hua. After generating the controlled end, Li Hua immediately copied it. Go to Ding Peng's computer, and then pull out the USB flash drive.

"Brother Li, get ready. The notebook is already on the bed. The Wi-Fi password is ***xx. You can connect to it." Ding Peng said to Li Hua.

Li Hua nodded, "After you connect to the network, run stup.exe on the desktop immediately, and then you can leave." Li Hua said.

Ding Peng also hummed. At this time, Li Hua inserted his USB flash drive into Ding Peng's laptop, and then connected to the Internet through the wireless network. He opened the USB flash drive and ran the remote control software from it. "Xiaopeng, it's ok." Li Hua signaled that Ding Peng could connect to the Internet.

I saw that Ding Peng opened My Network Places and reloaded the wireless network. Because the wireless network was banned by Li Hua before, he immediately enabled it. As soon as Ding Peng ran the stup.exe program on the control end, the command prompt of the system was loaded immediately. Fortunately, Li Hua modified it to be compatible with the Windows 7 system a while ago, otherwise he must have missed this opportunity. Li Hua's controlled end executed the command Later, the remote control program on the laptop has shown that Ding Peng's computer has been successfully launched.

Li Hua has an enviable 15 foreign broiler chickens, and they are all permanent. They are usually used for internal attacks of the Hongke Alliance. The last time they attacked Japan, it was these 15 chickens that played a role. Basically, it kills any website in Japan in seconds, and the effect is invincible, but this time Li Hua monitors port 8888, that is, after changing the port, he only monitors Ding Peng's computer, which is also for convenience.

"Xiaopeng, you are online. You can leave the computer now." Li Hua whispered, and Ding Peng responded at this time, and then quickly came to Li Hua's location, observing the system with him.

At this time, Li Hua has already turned on the screen monitoring. After Ding Peng left, Li Hua clicked on the remote video test, but it was prompted that the camera was occupied by other programs. Needless to say, after reconnecting to the network, the other party's Bian also reminded Ding Peng that he was "online", which meant that the other party had already started surveillance.

One minute passed, and there was no movement on Ding Peng's computer, while Li Hua and Ding Peng were still watching quietly.

Five minutes later, Ding Peng's computer will automatically load the energy-saving mode in seven minutes, and at this moment, the mouse on the screen suddenly moves, "Brother Li, there is a situation." Ding Peng said immediately, his voice was suppressed. very low.

Li Hua naturally also noticed that the mouse on the desktop moved, because he did not execute the operation command, which meant that the other party had already moved.

Sure enough, the mouse clicked automatically and opened the browser, only to quickly enter a line of URL from the browser.

"The background address of the forum!" Ding Peng exclaimed.

"Okay." Li Hua said softly, and then quickly executed another tool in the USB flash drive. Li Hua immediately loaded the tool into the remote control. This tool is actually a plug-in for Li Hua's remote control, which can execute Check the operation log of the system remotely, and immediately input a bunch of codes, which are assembly language. At this time, a progress bar is displayed on the remote control, "Copying the target system logs!"

On the screen monitoring Ding Peng, he suddenly successfully accessed the background, and saw that he opened the column management function, and then clicked on the information. He entered the del command in the custom code, that is, delete, "Brother Li, They want to delete the Trojan horse." Even if Ding Peng doesn't understand hackers, he still understands the meaning of the English code.

At this time, the progress bar has reached 90%, and it seems to be successful, but the other party clicked the button on the management page of confirming to execute the code at this time. If the other party deleted it, it must have disappeared. Sure enough, the other party successfully deleted Trojan horse, and closed the browser page, and then the other party actually opened the computer management, system log, when the mouse was pressed to delete the recent operation, the progress bar on Li Hua's side has reached 100%, which means success copied the system operation log, and the other party also deleted the recent log records, and then moved the mouse to the original position, and the mouse stopped moving. It seems that the other party's purpose has been achieved, and there is no need to continue to hang the horse, because This group of hackers can at least make millions from it today.

"Did it work?" Ding Peng asked.

At this time, Li Hua did not speak. He opened the system log. Although it was a hexadecimal mask, Li Hua still had a way to convert it into text. After some operations, Li Hua finally cracked an IP address. That's where the guys are.

Li Hua put the IP address on the Internet and checked it, and it turned out to be somewhere in Tongzhou, not far from here.

"I see." Li Hua said thoughtfully, with a sneer on the corner of his mouth.

Ding Peng was confused at the moment, "What? Brother Li, did you find it?" Ding Peng asked.

"Okay, I'll go back first. You remember to reinstall your system and rebuild the c drive, and then run the software I sent to your email now. Knowing the principle of this Trojan horse, it is not very difficult to remove it , so you have to pay attention to that, after installing the system, restart immediately and enter the non-networked security maintenance mode to kill viruses!" After Li Hua finished speaking, he opened his mailbox and successfully uploaded the "criminal evidence" that was successfully copied. , and then sent a software called "Trojan horse scavenger" to Ding Peng.

When Ding Peng saw this software, "Hey, this is not..." Ding Peng hesitated to speak.

"It's different. This is our internal cleaning software. It can't be compared with the software on the market. I'm leaving. I have something urgent to do." After Li Hua finished speaking, he pulled out the USB flash drive and went downstairs.

As soon as he reached the building, Li Hua took out his mobile phone and made a call, "Hi, I, Li Hua. Chief, I need help. Well, send a few people there, yes, to Tongzhou Xuming University..."

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like