Chapter 35 Key Figures
You Xiaoqiang has guessed that it is a nude photo scandal, haha
When you use your password, be as complicated as possible, otherwise your QQ number will be brutally cracked by others.
The ideal combination is that the password includes numbers, letters (case-based) and special characters
************************************
Since Huang Zicong's online photo album uses different passwords, Han Feng can only find another way.
There are also many ways to enter the online album. For example, Han Feng can wait for Huang Zicong to go online again and implant a monitoring Trojan in his computer to specifically monitor his behavior of logging into the online album. As soon as he logs in, the Trojan will monitor his keyboard input and then send the password to the designated email address.
You can also change the angle and not look for this password, but invade the server of this network album. After the intrusion, the data will be on this server anyway. How to view it will be as you wish.
However, since the servers on the network are oriented to the entire network, the natural protection is much tighter than that of personal computers, and there are usually specialized technicians to be responsible for the security of the server, it is not so easy to invade.
In order to save time, Han Feng now plans to try it out by brute force cracking. Of course, this is under the premise that he assumes that Huang Zicong’s password is not complicated. If his password security factor is very high, then the time spent on brute force cracking is likely to take longer than any other method.
Brute force cracking is to constantly submit data to the input box until the correct password is found. Although it is a very cliché and stupid method, it is very practical. It has been loved by hackers since its birth, and this method has lasted for a long time.
For brute force cracking, corresponding protective measures have also appeared. For example, after Han Feng’s online photo album is now opened, a verification code input box appears after several errors in the password, requiring the verification code to be entered before continuing. This avoids the automatic submission of data by the brute force cracking software and avoids the chance of brute force cracking well.
However, there is defense and attack, and the technologies between invasion and counter-invasion are constantly advancing.
Of course, this small verification code is not difficult for Han Feng.
Although almost twenty years have passed, the data stored on the Internet in Han Feng's previous life still exists. He downloaded a brute-force cracking software he wrote from one of his network hard drives, which comes with a verification code recognition function. However, in order to identify the verification code of this network album website, improvements still need to be made.
Han Feng spent more than ten minutes to improve the verification code recognition function.
The next thing to do is to generate a "hacker dictionary", which is a password library used for brute force cracking. Usually, it is a text file with all possible password combinations. Generating this hacker dictionary file requires another tool to complete. The function is very simple, just combine characters that can be entered on the keyboard according to your own requirements, and then generate a text file.
The rules for generating hacker dictionaries can be set by yourself, usually including how many digits the password you want to generate, all of which are combined by numbers, letter combinations or mixtures of the two, of course, more complex, and special characters.
Usually, a hacker dictionary file can reach a size of several G, depending on the rules.
According to password psychology, Han Feng collected some information about Huang Zicong, such as common nicknames, birthday dates, etc., and then put these in the hacker dictionary to generate a hacker dictionary of more than ten M. The reason why it is so small is that Han Feng narrowed the range and the number of combined passwords is relatively small. If it is large, it will take a relatively long time.
When Hanfeng pressed the Start button to import this hacker dictionary into the brute force cracking software, Hanfeng pressed the start button and the software ran at full speed. Since Hanfeng used relatively advanced algorithms, this cracking software is very efficient. Passwords with less than five digits can be handled in a short time. The higher the digits, the longer the time. Of course, it also depends on whether the password still contains special characters and other factors.
The rules for Han Feng to use are very simple, because he doesn't want to spend a lot of time because of this, but just hopes to use the collected information to try his luck.
Facts have proved that Huang Zicong's safety awareness is very low. Han Feng ran out his password in less than a minute. The combination is very simple, it is a nickname + birthday, "cong725".
Log in to the online album, Han Feng saw very wonderful photos.
Han Feng smiled: "It turns out that Feng Liu is so handsome!"
There are a large number of pornographic photos stored in this album. The protagonists of pornographic photos are Huang Zicong and several beautiful women. The reason why they are called women is because of their age and they look quite young. At least they cannot see the shadow of students from them.
How to use these photos? I will publish them directly to embarrass the fat man?
Han Feng estimated that with the fat man's personality, he might not be ashamed of it or proud of it, and there was no punishment.
While browsing the fat man's ugly appearance casually, Han Feng suddenly saw a more special photo in his heart.
This is a photo taken in the bathroom. There is a huge mirror on the wall. The fat man was hugging a woman in the shower. The heat of air blurred the mirror, but Han Feng saw a shadow inside.
This is the shadow of the person who is taking the photo. Han Feng suddenly remembered that many of the photos inside seemed to be taken by a third person, that is, there was a third person present. The blurry figure in the mirror now proves this.
Han Feng continued to look for the shadow of this person in other photos, and finally saw one of the man's hands in another inconspicuous photo. He stretched out his hand, as if he was directing something.
From this hand, Han Feng discovered a lot of information.
First of all, this is the hand of an older man, and secondly, there is a ring on this hand, and this ring is worn on the ring finger.
Han Feng had an intuition that this person was a very critical figure.
So he downloaded all the photos in this online album to the local area.
Then, we continued to use hacking methods to investigate all the information of the Huang family.
______________________
Two books are recommended. Since they cannot be copied, please search for them by yourself based on the "book title" or "book number":
"The Emperor of Han"
Magic Shuai's overview history book number 1005016
Introduction:
The story of a modern man who traveled through time and became Liu Rong, the prince of the Western Han Dynasty.
Wake up and hold the power of the world, and lie drunk on the beautiful knees.
A man's path to heaven.
"Arriving in the Abyss"
Science fiction, book number 1001663
Chapter completed!