Font
Large
Medium
Small
Night
Prev Index    Favorite Next

Chapter 34 Web Albums

In fact, Han Feng had already thought of N ways to obtain Huang Zicong's information from Sun Le, such as through email, chat software, or mobile contact list, etc. Of course, it is more complicated. Han Feng can find Sun Le's information from the school, and then according to his family genealogy, go to the Civil Affairs Bureau database to find Sun Le's relatives' relationships. Finally, he followed the melon and found Huang Zicong's home...

Obviously, this method is the most direct and simplest now. Huang Zicong is online, and Han Feng can directly use technical means to find his actual IP address.

Now, Huang Zicong and Sun Le are chatting. From the perspective of technicians, they are currently exchanging data, and the exchange of data must be known to the IP addresses of their respective parties, so that the data packets sent to each other can accurately reach the destination.

This process is invisible and is hidden by the chat software. Because these things are useless when users see them. All they care about is the other party’s chat content, and other details are filtered.

If you want to find Huang Zicong's IP address, Han Feng also has N methods, but in the final analysis, it is actually analyzing QQ data packets. Some chat software plug-ins already have this function, which can directly display the other party's IP address. However, Sun Le's version obviously does not have this function.

Hanfeng can use packet capture software to capture IP packets that are being exchanged on Sun Le’s machine. However, this method is too complicated. Hanfeng has a simpler method, which is to directly view Sun Le’s firewall.

QQ uses the UDP protocol to transmit information, which is a connectionless protocol. Many firewalls have UDP listening functions.

The firewall used by Sun Le is Kingsoft Firewall. It has this function. Han Feng directly adjusted his firewall and looked at it. It was very easy to find the UDP connection. On it, Huang Zicong's IP was clearly displayed.

With Huang Zicong’s IP, this is easy to deal with.

Han Feng was about to invade immediately, but he glanced at him, but saw the topic they were talking about at the moment, which was exactly what happened this afternoon.

Feng Liu Titan: "My father had already warned me very harshly just now, not allowing me to mess with Han Feng, but also asked me to apologize to him."

Lele: "No, I'm so dying!"

Feng Liu Tae-spoken: "That kid is not a small person."

Lele: "How is that possible?"

Feng Liu Tishang: "I don't know the specifics, so be careful, don't provoke him for the time being. That kid seems to have practiced, and even the police can't handle him..."

…………

Lele: "Cousin, he is really that powerful?"

Feng Liu Tishang: "I don't believe it either, but this is what just happened today."

Lele: "Then do you really want to apologize to him?"

Feng Liu Tae-spoken: "Tell me! I won't go! Damn, sooner or later I will find someone to depose him!"

…………

Han Feng sneered, no longer watching them talk nonsense, and invaded Huang Zicong's computer very smoothly. His security configuration was much worse than Sun Le's. In Han Feng's eyes, he was simply a rookie who could successfully invade.

Of course, the difference between a rookie and an old bird is that after the rookie invasion is successful, it may not be able to do anything and cannot further expand its results. However, after the old bird discovers a loophole, it will make full use of this loophole as a breakthrough point and slowly increase its permissions until it completely controls the target computer and can do whatever it wants.

Han Feng invaded Huang Zicong's computer. In fact, he didn't know what to do now. He didn't know what was in Huang Zicong's computer, but this didn't matter.

Excellent hackers are all powerful intelligence analysts. They usually have very meticulous thoughts and can fully explore even the subtle intelligence information they find. This is to figure out "finding a subtle loophole and then expanding the results of the battle".

A hacker who is not good at information and intelligence analysis is not a qualified hacker.

Therefore, when a hacker determines an invasion target, at the beginning, he often doesn't know how to do it, nor does he know what valuable things are in the target machine. The way he adopts may be to keep wandering around and scanning constantly, which seems to have no purpose, but often in the end, he can find a suitable invasion method and then successfully conquer the fortress.

Han Feng wanted to deal with the Huang family, but he didn't think about how to give the Huang family a strong counterattack. With his current ability, he could only use hacker methods to retaliate.

So he wanted to invade Huang Zicong's computer, or even the computers of everyone in the Huang family, to find a breakthrough from their computers.

According to the user's habit of using computers to save information, Han Feng began to look through Huang Zicong's computer hard drive.

Han Feng searched almost every corner, but still couldn't find anything of interest. Judging from the things in this computer, it is very likely that this computer is a new computer. Its configuration is one level higher than the mainstream configuration of Han Feng. The system disk is also very clean and there are not many redundant things. Although the things on other disks are huge in size, they are very few in types. In addition to games and movies, of course, more are AV. Han Feng even took care of hidden files. It turns out that Huang Zicong seems to have no awareness of hiding things.

It seemed that there was no useful thing on the hard drive, so Han Feng focused his attention on the Internet and began to check Huang Zicong's online records.

There are many records of Internet access in the browser, and Korean styles are flipping through them one by one, search engines, school forums, game websites, and online photo albums...

kindness?

Han Feng swept over all the way, and suddenly felt that there was something strange, so he looked again from the beginning. He found that Huang Zicong seemed to have a special liking for an online photo album and had to log in to the photo album almost every day.

This strange phenomenon made Han Feng feel a little strange. When he opened the album, he found that he needed a password. Han Feng also discovered an abnormal phenomenon. Huang Zicong usually remembers the password when he went to other websites, but this online album did not remember the password.

Something weird!

This abnormal phenomenon aroused Han Feng's interest. Although there seems to be no useful information in a photo album, he is in a professional and keen sense of smell, so he decided to crack the album and try it.

The username of the album is displayed on the path above, called "fengliu99", so Han Feng just needs to get the password.

How to get the password?

Han Feng started from the remembered passwords, and from the asterisks, he could see that his passwords were almost all 8 digits.

Since some websites remember passwords, it's easy to do. Han Feng put in a widget, which can clearly display the asterisk passwords that are remembered.

According to hacker psychology, most people use the same password for all accounts, and only a very small number of people have the necessary security awareness and use passwords of different security levels according to the account security level.

Using the asterisk password tool, Han Feng got the password "19910725".

Seeing this password, Han Feng felt a little contempt for Huang Zicong in his heart, and he didn't have to think about it. This password must be Huang Zicong's birth date. His safety awareness is really low.

At this time, Huang Zicong and Sun Le had already finished chatting. He seemed to have something happened temporarily and turned off the phone directly. Han Feng disconnected from his computer.

But it doesn't matter. Anyway, Han Feng has already got what he wants, so he can go online albums from other places.

I used the agent to go to the online album, filled in the username and password, and confirmed, but Han Feng was slightly stunned because the "password error" was displayed on it.

This online photo album actually uses another password!
Chapter completed!
Prev Index    Favorite Next