Chapter 47: Unexpected Harvest (Part 2)
Yang Yawei hesitated for a moment and did not immediately try to crack this area. The server resources occupied by the two hackers hiding in this area were not small, who knows what was placed inside, if a large number of explosive honeypots were placed inside, once Yang Yawei cracked the outer shielding system, the honeypot inside would thoroughly explode, and the entire system would be messed up, it's very difficult to repair the entire server system.
It's estimated that in three to five days, some security systems using closed-loop systems may still be operating normally, but the overall security system will definitely be full of loopholes. Yang Yawei not cracking this area does not mean that Yang Yawei did nothing, using the mechanical mouse's analytical and computational capabilities, Yang Yawei analyzed this shielding system, and the results came out quickly, in just over ten minutes.
It's too rough! This was Yang Yawei's first feeling, this system to be honest is not impressive, it's just the simplest method of hiding system resources. If it's such a method, let alone Hu Bing that kind of expert, even Ye Yulin as long as he is careful enough can discover it. During this period of time, Xing Meng has been paying great attention to security systems and network security on servers, if it's just like this, it's impossible that it hasn't been discovered until now.
Although Yang Yawei's own strength may be ordinary, his current vision is high. Although he can't understand the program written by the biological modification instrument for the mechanical mouse, he can understand a part of it, which is enough to make Yang Yawei's vision rise to another level. The current Yang Yawei is a typical example of having high vision but low practical ability.
After analyzing all the results, Yang Yiwei did not come to any different conclusions. He scratched his head in frustration, wondering if these two hackers were just lucky? But that couldn't be it. On the day of the server invasion, there were three hackers who invaded the server - these two hackers and a hidden super hacker. Since the three people were together, they shouldn't have done something so basic with little concealment ability.
Yang Yawei suddenly slapped his own head, he just analyzed the way to cover up the resource area of this system, forgetting that those security personnel could not see the server resources being occupied like Yang Yawei. Other security personnel in the entire server system can only check the performance through system-related statistical functions, and if they do something inside the system, it is easy to hide this area.
After careful consideration, Yang Yiwei decisively shifted his target and re-examined the server system's functions. He soon discovered an anomaly - a small program operating within this function. The tiny program was extremely subtle and posed no threat to the server, making it nearly impossible for firewalls or security personnel to detect, unless someone like Yang Yiwei, with a clear purpose and knowledge of the issue, deliberately searched for it.
After carefully capturing this small program on the biological modification instrument, Yang Yiwei re-decompiled it with CH language. After the decompilation was completed, he carefully looked at the source code of this small program and couldn't help but praise it. This program doesn't seem like the previous one at all. Although this small program is small, its technical content is extremely high, and it's absolutely not something that an ordinary master can write.
Don't look at this small program with only one simple function, which is to modify the server's statistical information about its own resources. Although it has a simple function, it has very powerful capabilities. First of all, its concealment, this small program can disguise itself as a system program and perfectly disperse its files, making some antivirus software unable to detect it. Moreover, when simulating the operation of system programs, it can perfectly possess the functions of specific system programs, which makes its disguise almost reach the extreme.
In addition, this small program also has the ability to self-delete, copy and mutate, which is a standard function of computer viruses. It can improve itself according to the modifications made by security personnel to this part of the system, making it adaptable to new systems, which is quite abnormal. It can be said that this small program, with just a slight modification, could become a super virus, but it's only for such a simple function. The author who can write such a virus is probably one of the few in the world.
Yang Yawei now knew why no security personnel had discovered that area, and he was a bit conflicted. He didn't know what to do for the time being. Should he just let the other party mess around here? That wouldn't work either. After all, this was his turf, and if someone messed up his first job, it would be too embarrassing! Although this wasn't Yang Yawei's fault, as a member of the next generation of the motherland, he couldn't lose face like that!
But the gap between this small program and the previous occlusion area program is too big, right? It feels like one is a Ph.D. student and the other is an elementary school student taking the same middle school exam questions, and they're even paired together as a team. What's more, the Ph.D. student can answer all the questions but gives some of them to the elementary school student and doesn't even care. This awkward feeling makes Yang Yawei unable to understand.
Forget it, Yang Yiwei quickly threw this question to the back of his mind and once again chose a new function for the experimental mechanical mouse - tracking! Tracking and anti-tracking is an art that every hacker must master, because only by mastering tracking and anti-tracking can you avoid being found by security personnel.
Yang Yawei's target this time was the two high-level administrator accounts hanging there, anyway, these two accounts are not currently being operated by anyone. Yang Yawei wanted to see where the real addresses of these two people were, and at the same time test the new capabilities of Mechanical Mouse. Okay, actually Yang Yawei mainly wanted to see if Mechanical Mouse could track the true IP of these two accounts as he had imagined.
The code on the screen refreshed extremely quickly, and soon a new IP address popped up on the screen. However, this was the opponent's meat chicken, which Yang Yiwei could still see through. What surprised Yang Yiwei was the speed at which Mechanical Mouse tracked it down. At such a rapid tracking speed, even if a super hacker wanted to react, they would probably find it difficult.
About five or six minutes later, two IP addresses appeared on Yang Yawei's screen. At the same time, Mechanical Mouse no longer had new data to refresh, which means that these two IP addresses were the real addresses of the other party. Mechanical Mouse automatically displayed the physical addresses of these two IP addresses on the screen.
One of the IP addresses is not in S city, but another IP address, Yang Yawei's eyes suddenly narrowed, if he didn't remember wrong, this IP address is located in a district that seems to be where Ye Yulin lives? This point Yang Yawei dares to confirm that he did not remember wrong, once when he and Ye Yulin were eating together in the cafeteria, Ye Yulin had mentioned that this district was also rented by Xingmeng Jewelry for some employees.
Don't be stingy with your votes! Update is here!!!!!

