Chapter 88: Broiler Charming Formation
Chapter 88 Broiler Maze Array
"Xiaofeng, what is the old man looking for you?"
On the way back to school, Yang Cheng finally couldn't help but ask.
"If you want to know, ask him yourself."
Yang Cheng smiled bitterly and said, "If I dare to ask the old man, would I need to ask you?"
Han Feng shrugged: "Then there is nothing I can do. Don't ask me, I definitely won't say it."
"Forget it, it's not rare!" Yang Cheng curled his lips, "But judging from your current virtues, you don't need to guess that you must have gained benefits today."
Is it a benefit?
Han Feng couldn't even explain clearly. If he had to work hard to get four years of quiet university life, it would have benefited, which would have been a bit too sad.
If Han Feng is alone, no matter how old guys do it, it has nothing to do with him and will not have any impact on him. However, Han Feng also has his parents. According to the old guys' usual behavior, if Han Feng does not cooperate, they will definitely put their ideas on his parents, and then his parents' lives will become less peaceful again.
In addition, Han Feng's super system does not know when it will be completely perfected. He hopes to avoid being disturbed by the outside world so that he can upgrade and improve his super system with peace of mind. So when he heard Yang Xinglin make this request, he also made a request.
To be honest, even Han Feng himself did not expect Yang Xinglin to agree to his request. After all, four years are not long or short, and no one could predict what would happen.
Unexpectedly, Yang Xinglin agreed and said that he would convince Shanghai to give Han Feng four years.
Is it because the safety of this American girl named Shirley has unusual significance for both Yang and Han families, or do they think that in four years, they can't make any waves?
Perhaps both?
However, this is not what Han Feng cares about. He only knows that as long as he protects the girl named Shirley, he can at least confirm that he has four years to use as a buffer.
Yang Xinglin also said that he would give him four years. After four years, it depends on whether you have the ability to get rid of your established destiny.
Four years? Han Feng’s face showed a hint of mockery.
Enough! My destiny will be in my own hands!
Yang Cheng sent Han Feng back to school and left immediately without stopping.
This uncle, Han Feng, still doesn't know what he is doing, and it seems that he is leisurely enough every day.
Han Feng did not go back to the dormitory directly, but came to the stand on the open-air stage next to the school's artificial lake to sit down, and then took out the relevant information Yang Xinglin gave him from the file bag.
From the aesthetic point of view of oriental people, Shirley is also extremely beautiful, just like a porcelain doll. If Han Feng guessed correctly, she should be a mixed-race child. Han Feng saw the characteristics of oriental women from her.
An American actually came to China to study in Chinese. It was really interesting. It seems that her Chinese level should be good.
There is very little information about Shirley in the archive, only a few photos of her life, and then some of her main living habits and hobbies.
Other information is some bodyguard training materials, mainly about how to quickly identify crises and how to protect employers' safety as comprehensively as possible. As a bodyguard, protect employers' safety as the top priority, rather than counterattacking the other party and fighting each other... and so on.
Since he has accepted this task, Han Feng will not be perfunctory, not to mention that this matter also involves Han Feng's subsequent life plans.
After reading all these materials and copying them to his own brain, Han Feng returned to the dormitory.
The other three were there, Xu Linhu was sweating profusely, and it seemed that he had just returned from playing the ball. Li Wang was still reading the comics he had just rented back, while Chu Shuai was actively preparing for the upcoming hacking competition.
"You are all here, just right, I have something to tell you." Han Feng said.
Li Wang: "What's the matter?"
"I decided not to live in the school anymore and move outside." Han Feng is no longer in the computer department, so it doesn't matter whether he moves out or not, because in the Department of Neuroscience, with Li Zhongwen's special care, Han Feng is the most special existence in their department. These small things cannot affect him at all. In fact, Han Feng has long wanted to move out. It is not convenient to do anything in the dormitory, so he has to go to the teaching building every time. But he has already had a relationship in dormitory 301, and he has not made up his mind for a while.
Xu Linhu asked: "Do you still decide to move out?"
"Yeah, I've decided." Han Feng nodded.
Chu Shuai suddenly said, "Crazy, it doesn't matter if you want to go out and live. Keep this bed. Just come and gather with your brothers when you have nothing to do in the future."
Li Wang echoed and said, "Yes, the accommodation fee this year has been paid."
Han Feng agreed to this plan.
He cleaned up a little, then carried his computer back to the place he rented.
Turn on the computer and connect to the Internet, Han Feng began to investigate the specific information of the American girl "Sherley Seprano".
The information provided by Yang Xinglin is too limited and has little help to Han Feng. Han Feng is interested in why this girl can bother Yang Xinglin to worry about what position her family lies in the United States.
Everything was like after thousands of drills. Han Feng easily found more than a dozen broilers around the world. This was the springboard he would use for invasion later. In order to make himself safer, he spent some time to strengthen several of the key broilers to safely and repair some loopholes.
Then, Han Feng used these broilers to form a multi-springboard defense network.
This is a method of anti-invasion tracking created by Han Feng. He formed a mesh topology structure for these broilers, then picked one from them to connect them, and then set off from another broiler to connect them to the invasion target.
The advantage of this is that if the invasion operation is discovered by the other party and the other party conducts counter-invasion tracking, it will fall into the "Broken Chicken Maze" arranged by Han Feng. He will face hundreds of possible tracking routes, which greatly delays his tracking progress.
The principle of the broiler maze array can actually be abstracted as the "shortest path problem" of the "circulating graph" in graph theory. These broilers are connected to each other, which is equivalent to forming a "circulating graph". Some nodes in this cycle graph are bidirectional, while others are unidirectional.
If the anti-invader wants to track Han Feng, he must go from one node (invasion target) to another node (Han Feng's computer). If he wants to find Han Feng in the shortest time, he must find the shortest path between these two nodes.
But is this shortest path so easy to find? The answer is obviously no.
Among the 100 people tracked, only ten people could continuously break through the broiler that had been reinforced by Han Feng's hands. Among the ten people, facing so many possible tracking routes, only three people would choose to continue tracking. Two of them would be dizzy by Han Feng's "Broken Chicken Maze" and the remaining one might find an effective path to reach another node. However, at this time, Han Feng had long disappeared without a trace.
Han Feng's principle of "Broken Chicken Maze" seems simple, but it is almost impossible to introduce this principle through those broilers, because the other party could not see the whole picture at the beginning. It was just a blind man touching an elephant and peeking through the leopard. After breaking through several broilers in a row, he might find himself back to his original place. Even if he became interested in this way of confusing enemies and wanted to study it further, Han Feng would not give him a chance, because before he found all the broilers, Han Feng must have wiped out the traces on the broilers, and what was left was only a few scattered broilers that seemed to have no connection.
Since Han Feng's broiler maze formation was invented, all invasion actions have been invincible, greatly reducing the chance of being discovered by the other party.
After the preparations were done, Han Feng logged into one of his emails and pulled out a broiler list. The broiler on this list were all computers found by Han Feng that were connected to the Announcement Network and the US military network. These computers were the bridge for Han Feng to enter the US internal military network.
There is quite a lot of broiler data in this list, and it is not difficult to find. As long as you find one of them, you may find another large string, because many such computers have some connection with each other. Han Feng can find a large string as long as he follows the clues.
After twenty years, many of the broilers inside had failed, but in the end, Han Feng found a few that were still alive.
After the preparations were completed, Hanfeng successfully invaded a computer in Arlington, Florida, USA that could be connected to the US military's dedicated network. This computer was not on the Korean Feng's broiler list, but it was on the same network segment as a certain broiler on the list.
Twenty years later, Han Feng once again saw the familiar US defense database login interface.
This interface has not changed much in decades. Han Feng still clearly remembers that he was found by the FBI because of invading this database. Six months later, he was finally secretly extradited back to China.
This national defense database stores the information of all legal citizens of the United States. Han Feng is very familiar with it because he used to visit almost every once in a while. I believe that this database is also a place that other hackers around the world like to visit, so the security performance of this database will be improved to a certain extent every once in a while, but in this way, it still cannot avoid the fate of being hacked eventually.
The US military network has its own network communication and data transmission protocol. Since this protocol is strictly confidential, it is very different from protocols such as tcp/ip. It also uses encryption and encoding technology with relatively advanced security performance. Hackers who are only familiar with public network protocols have zero chance of successful intrusion in the face of this network.
However, vulnerabilities on the network are hard to guard against, because the biggest vulnerability exists in people. No matter how secure your network is, if the person using the network does not have a high sense of security, from this perspective, the network is equivalent to being open.
For example, the computer that Han Feng is now invading, the owner of the computer is obviously a member of a department of the US military, and has quite a lot of authority, so you can log in to the national defense database to query information.
Han Feng did not spend time looking for loopholes in the national defense database system, but focused on cracking the password of the computer owner.
In order to obtain a person's password, in addition to analyzing its password characteristics from the perspective of password psychology, thereby obtaining possible password combinations, and then using brute force cracking machines to run out, there are many other methods, such as social engineering, monitoring and monitoring, etc.
It is the daytime and the prime time of work in the United States. The owner of this computer is working hard on the computer at this moment, and his every move is under the monitoring of Han Feng.
Han Feng discovered that his work required frequent query of various American databases, and the one that triggered him to make such a move was emails sent from outside.
e-mail?
Han Feng was a little strange about this discovery. Is this guy’s job similar to a data queryer, who specifically provides data to others?
In order to verify his ideas, Han Feng checked the security configuration of this computer to ensure that there was no very abnormal security protection software inside. According to his system type, he uploaded a data sniffer that matched it. This sniffer can sniff the data exchange content specified in this computer and then send it to Han Feng's designated email address.
After intercepting several emails entering the computer and several emails sent out, Han Feng entered the email address and checked it out, and immediately understood the guy's work.
It turns out that he is an intelligence officer who provides basic data queries to other spies and intelligence personnel!
His job is to provide information to intelligence personnel who need various data they need. Of course, these information are very basic, such as information about the owner of a certain car, all accommodation records of a certain hotel, etc.
Han Feng once again uploaded a small software written by himself - a keyboard recorder. This little thing can be run in the background. Under normal circumstances, it cannot be found whether it is running. Its function is also very simple. It automatically records all the keyboard input characters of the computer user, and then sends these records to a certain place on the network quietly.
After running this software, Han Feng started to wait, waiting for the keyboard recorder to automatically send his password to one of his email addresses.
But after waiting for about ten minutes, he found that the other party still had no intention of logging into the national defense database.
Han Feng decided not to wait any longer, but took the initiative to let the other party log in.
So, based on a keyword, he found the email related to the defense database and downloaded several messages. The information required by these emails must be logged into the defense database, but this has already happened.
Han Feng imitated the format of one of the emails and wrote an email asking for information. He was about to send it to the owner of the broiler, but stopped again.
"wrong."
Han Feng looked at the last string of codes that seemed meaningless in the emails. At first, he thought it was garbled code or something, but now he suddenly remembered that this might be a special code similar to identity verification.
Han Feng picked a random string of codes from it and attached it to the end. Then he sent his email.
In this email, he asked the intelligence officer to find all the information of Joseph Bonanno, the "godfather" of the American mafia last century, and then send the information to the designated location.
The email sent by Han Feng did not have a sending address, but only indicated the email address to be sent in the content of the letter.
Han Feng monitored that his email successfully arrived at the intelligence officer's email. After waiting for a while, he began to log in to the national database and search for information about Jojoseph Bonanno.
"Have it!"
Han Feng received the recording information transmitted from the keyboard recorder as soon as possible.
In this way, Han Feng obtained his login name and password.
He removed the keyboard recorder and completely deleted the running records in the system.
After the other party logs out, Han Feng opens the US defense database login interface, enters the user name and password, and the login is successful!
Enter Shirley Sepulano's name in the search box and found that there were many records with the same name and surname. Then Han Feng added an age condition and filtered these records to only a dozen, then entered the location to filter, leaving only three records.
Chapter completed!