Chapter 67 Electronic Warfare
The moment Lan Tian passed through the gateway, he was noticed by several consciousnesses resident in the system. However, no one reacted to this uninvited guest, because this place was originally a completely uninhabited land, and there were nine people every day.
Hackers supported by various gangs in the area invade the system to obtain information or tamper with the system for other purposes.
If all these intrusions are responded to one by one, this intranet will become a chaotic battlefield with no peace. I don’t know if they have already experienced similar situations or have been avoiding similar situations. Most of the people who are active in this intranet
Hackers adhere to the principle of not interfering with other people's actions as long as it has nothing to do with themselves. Of course, it would be a different matter if a newbie stepped on the back door of the trap they laid.
As a senior hacker, Lan Tian obviously guessed the complex situation in the intranet, so she did not hide herself but openly passed through the gateway to make herself look like "another gangster hacker who came to the cesspool to dig for gold." As expected, no one was attracted.
excessive attention.
Next she needs a lair of her own, and there is never too much to prepare.
The so-called nest refers to a complex composed of junk data, logic mazes, trigger viruses, offensive firewalls and other messy things. It is named because it is as dangerous and disgusting to visitors as a spider's cave."
"Lair". Every qualified hacker has his or her own unique nest layout skills and habits, which allow them to ensure the security of their own data while ensuring rapid response to external data flows, and build an attackable nest before taking intrusion actions.
It is the consensus of hackers to have a retreatable lair. Only when they are extremely confident or have no choice but to do so will hackers launch a direct invasion without building a lair.
In the messy intranet system, Lan Tian immediately found her own "comfortable corner". This is the traffic light signal control program. It is a redundant spare product outside the country where automatic driving has been fully popularized. However, it is still widely used in the world.
Area 9 of human-driven vehicles is still a critical system.
After entering and gaining the highest authority over the program and its blocks, Lan Tian began to use it as a base to build her own nest. The reason why she did not choose a key monitoring program group to settle in was because she noticed that in the messy system, only
That monitoring program group is clean. Probably to the hackers here, that program is the high seas in the virtual world. Anyone who needs it can fish in it, but if anyone dares to designate it as their own exclusive economic zone, they must think about it.
Consider whether the navies of other powers will agree.
The nest was quickly set up. After checking that there was no abnormality in the protection function of the nest, Lan Tian began to slowly penetrate into the monitoring program group and paid close attention to the reactions of other nests in the system. She knew very well that one of those nests was probably hers.
If the murderer he is looking for has the means to crack the neurotransformation project, then he must be at least an opponent of the same level as himself. Lan Tian always deals with such opponents with caution.
There is still no firewall, and it is so open that people feel seriously insecure. Moreover, there are no traps that can be discovered in this large program group, which is allocated a large amount of storage space and saves many records of the system's establishment for decades.
, it seems that all hackers who have ever set foot here have some kind of awe for this "pure land".
Is this really the case? Lan Tian doesn't think so. She thinks the cleanliness here just "looks clean". There must be countless hidden traps among the countless information records, some of which she doesn't want to be discovered by others.
Some of the dark history is deliberately fishing bait waiting for others to discover it. Lan Tian is not sure what monsters and monsters are waiting for her behind the data she wants to touch.
But what needs to be done is still done. Isn’t this the reason for all the preparations?
The searcher of the program group itself cannot be used. It is too easy to be used as a trigger for Trojan horses. There are two feasible alternatives. One is to make a new searcher yourself and implant it into the program group to temporarily replace the unreliable original search.
The other is to separate multiple detection programs to perform violent retrieval of the data here. Of course, doing so will definitely alarm everyone who is still resident in the system, but it may also be regarded as a novice with poor skills and let go.
After a brief thought, Lan Tian decided not to gamble her face. Her luck has never been very good, and the nest she built was too beautiful, which did not fit the impression given by a novice.
Programming a searcher is not complicated, and it is not difficult to replace the original searcher with it. The real difficulty is where the new searcher should be connected to the program group so that it will not trigger the alarm mechanism that may exist in the original searcher. Originally, this was
It’s an adventure that requires careful preparation and bold attempts. Fortunately, Blue Sky is half the home field here. If you don’t understand questions, you can intuitively ask the administrator of this system.
"Officer Chen, help me ask how to replace the system retriever so as not to trigger the alarm." Lan Tian established an encrypted channel to the outside.
"Sending this key to sector 45 can open the system backdoor disguised as a bad sector." Aaron immediately replied from the outside.
"Sure enough, ginger is still hotter than old." Lan Tian, who got the backdoor key, sighed and sent the key according to the returned information. Sure enough, the sector that was originally detected as physically damaged immediately became readable.
The temporary pure land is enough for Lan Tian to perform any small actions on the system.
The retrieval was immediately implanted, and the original retrieval filled with various trigger scripts was bypassed and turned into nothingness. Even so, Lan Tian was still very cautious in retrieving the stored data. She did not immediately detect the three most suspicious people.
, but technically selected the dead killer whom Aaron had not investigated on the spot.
"Should I say it is unscrupulous or something better?" Almost immediately, the searcher called up more than ten GB of image data. These are the data that the system determined that there may be illegal activities during the recording process and therefore automatically and permanently archived them. If
The killer who committed suicide still has a chance to go to court, and these are all the evidence he presented in court.
However, Lan Tian is not interested in the evidence of deceased people. Her goal is to investigate who has accessed these data like herself. According to Aaron's reasoning, the criminal should have used some method to infect the victim after seeing these image data.
The reappearance in the brain causes hallucinations that affect the mind, thereby inducing the victim to commit suicide.
"...Well, this person must be very hateful." However, the subsequent investigation results disappointed Lan Tian. It was not that there were no clues but that there were too many clues. It's just that there have been thousands of visits to this data in recent years.
, it is simply unrealistic to check them one by one.
After hitting a snag with the killer, Lan Tian had to expand the search to Zhang Feng's subordinate Dahei. This person's criminal record was no less bad than that killer's, but the number of investigations on him was obviously less than that killer's. Maybe it was because he had
He has a fixed target of effectiveness and most of the things he does can be found without secret investigation through the intranet.
Suddenly a trace caught Lan Tian's attention. Before the district chief unplugged the hard drive and read the records of Huzi's murder and came to investigate, someone had visited this sector. The other party did not specifically retrieve the data, but just
The data call situation in this sector was checked, which means that the other party wanted to know who called what in the hard disk when it was pulled out.
"Finally caught your tail!" This discovery made Lan Tian extremely excited. Although he was not 100% sure, the possibility of this sudden visitor being the murderer was also very high. Next, he only needed to compare the interview records of A Hong and the killer.
Whether there are similar traces in the body can completely determine whether it is the murderer.
Chapter completed!