Chapter 453 Email Bombing Patterns



With merit comes responsibility, and the three of them also studied how to use scanning software to find viruses on the hard drive.

The theory is actually quite simple: scanning software is designed to scan file formats, but viruses come in many formats. Some viruses disguise themselves as normal formats, while others cannot be recognized at all.

Then the only solution is to have the scanning software add a new scanning format. This is difficult because you don't know what format an expert would use when developing a virus.

Only after you discover the other party's format can you add it to the virus database and find it. Before you discover it, no one can do anything about it.

If the machine can't detect it, then manual inspection is required, bit by bit, which is the most accurate way to find it.

Manual labor is too laborious! Therefore, we need to use machines to solve most of the problems.

At this moment, Xing Baohua's phone rang. When he answered, he was told that the server room administrator privileges had been taken.

Xing Baohua immediately activated the backend management system, but it wasn't the usual management; it was surveillance under a virus-like mode.

"Prepare to initiate IP tracing," Xing Baohua said to another assistant who was still working.

"Ready!"

Xing Baohua typed some code on the computer and then told his assistant the IP address.

Having a server is great; the processing speed is incredibly fast. Just by providing an IP address, it can analyze whether a machine is a botnet.

The room was filled with the sound of rapid keyboard typing, and lines of code appeared on the screen.

For someone who doesn't understand it, it's dizzying to look at; they won't understand anything. That's computer language. Only those who understand it can see the displayed code and instructions.

The programmers in the server room were working on offense and defense, and the firewalls they built were being cracked one by one.

Xing Baohua could see from the backend which port or backdoor the other party used to enter, and then call them to tell them which port had a vulnerability and to plug it.

What agreement has a back door? Block it.

The hackers who had entered were quickly surrounded and cornered.

Xing Baohua is also working hard to trace the other party's real IP address. As long as the other party doesn't unplug the power cord or the network cable, Xing Baohua believes that he will be able to find it soon.

"Damn it, how many botnets did they use!" Xing Baohua complained, not having time to count how many ways the other party had accessed the server system.

Despite complaining, he kept typing rapidly on the keyboard, issuing commands.

The assistant said to Xing Baohua, "Boss, we've traced it to the bottom. The logs and server are clean; there are no signs of intrusion."

"Where is the address?"

Ottawa!

"Based on the address, determine the other party's environment, starting with the server. Is it using a switch or a power modem? If it's a standalone power modem, then check if there's a power splitter?"

Xing Baohua hurriedly spoke, then told the server, "Surround them on three sides and leave one open. Let's see what they're up to. Be prepared to disconnect at any time!"

After receiving a response, Xing Baohua asked his assistant, "How is it?"

"Immediately, in one minute."

Perhaps the sound of the two typing on their keyboards woke up another assistant who was sleeping. After waking up a bit, the assistant saw the boss and his colleague busy at work.

Without saying a word, he went to the restroom to relieve himself and wash his face before rushing back to work.

“The boss uses an electric modem; there’s no router or splitter,” the assistant said.

"Wang, you take charge of the analysis for me. I'll hack into his computer," Xing Baohua said to his assistant who had just come to help.

They were all racing against time. Xing Baohua was also afraid that the other party would go offline and shut down their computer. While he could still hack in, he hurriedly used tools to scan the other party's computer.

With the server's assistance, the speed is much faster, but the network speed is still so slow, and the feedback percentage slowly dwindles on the progress bar.

In about five minutes, a number of port vulnerabilities were found. The other party had not set up a firewall, which saved Xing Baohua a lot of time and trouble.

Bypassing a firewall also takes time to operate.

After hacking in, I checked the drive letters on the other person's computer. Wow, they're loaded! The computer specs are pretty good; the hard drive alone is huge, at 2GB. This is the total disk space accumulated using a hard drive array.

There's a lot of data on the hard drive, and I don't even know if this thing has been backed up. What if a virus were to damage it, and the other person has any important data on their computer? I wonder if they'd be devastated?

Of course, Xing Baohua isn't that unethical. He might have done it without knowing the truth, but if he did it now, the other party would definitely be able to guess who it was.

What if they also face retaliation?

In this way, Xing Baohua suffered far greater losses than his opponent.

You can use your skills, but you can't do things that hurt each other.

As usual, copy the file over.

Once a virus is installed and activated, it will send all files to the recipient's email address as soon as the recipient turns on their computer to attend school.

The hackers seemed to have realized something and wanted to back out, but suddenly found that all their escape routes were blocked. They kept scanning ports with scanning software, trying to retreat.

A major battle is raging in the server room, with various operations converging into three waves of control, involving multiple threads and programs. This has caused the CPU to almost smoke.

When people tried to order food, the webpage loaded very slowly, taking almost forever to load half a page. It was incredibly slow, and I initially thought there was another website problem. I even shut down my computer, fearing someone might steal money from my bank account.

Fortunately, the server withstood these waves of manipulation; otherwise, it might have crashed.

Xing Baohua finally finished setting up his layout, pressed the last Enter key, and breathed a sigh of relief.

"Boss, someone's come in again. No, it's an attack!" The assistant quickly told Xing Baohua after checking the server firewall alerts.

“Analyze the attack methods!” Xing Baohua said.

"The food delivery website's email account has been attacked using email bombs! There are so many now, thousands of spam emails every second," the assistant hurriedly said.

This chapter is not finished yet. Please click on the next page to continue reading the exciting content!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List