Chapter 454 OK! Not a single one will escape.
I was so busy just now that I almost forgot about this melon!
Taking the opportunity, Xing Baohua glanced at his email and found nothing. He then switched programs and went into the background to search for traces of Fujiwara Kazuo.
Card!
Can you believe this is still a server?
They are all operation commands, just typing letters, taking up very little space.
It simply allows the oldest attack method, email bombing, to occupy the running memory.
Every instruction requires memory allocation, and right now, several groups of people are controlling the background processes.
With the added email bombardment, it's equivalent to tens of thousands of people online instantly; no wonder it lags.
If tens of thousands of people are online simultaneously, starting up a backup server to expand and distribute the load is effective.
However, it's no longer necessary to start it at this point; once started, the email bombing will extend to the backup server.
Therefore, Xing Baohua wanted to use his own small server as an extension server to redirect the email bombing, giving the server team time to find the IP address causing the email bombing.
Xing Baohua was in a difficult situation, and the hackers were in a difficult situation as well, both trapped inside the server, unable to move an inch.
After much effort, I found Fujiwara Kazuo's hiding place. I kept a close eye on him, just making sure he didn't cause any trouble.
Xing Baohua enabled the firewall on the small server and began redirecting traffic.
Inform the main server to copy the logs and save the logs and registry entries separately.
The actions were all completed in an instant; as soon as Xing Baohua started directing traffic, the small server crashed.
The computing power of the small server can no longer be used to assist in controlling the backend.
Commands can only be entered using one's own device.
However, it got stuck and couldn't be executed.
Before, I could see the cursor blinking, but now it doesn't even blink anymore.
Just five minutes after Xing Baohua redirected the traffic, the large server completed its backup, quickly checked the logs, and analyzed the source address of the attack.
Locate the server from which the email was sent and block it directly.
Early attacks were simple and brute-force, and counterattacks and blocking also require a period of research to find the format of email bombs and then use firewalls to block them.
If it weren't for the outdated equipment, it could have been a classic offensive and defensive battle.
Unfortunately, they were all stuck on the device and couldn't move.
Now Xing Baohua understands why the hidden Fujiwara Kazuo didn't make a move; he was unable to do so at that time.
Xing Baohua had been observing this guy for a long time. The other party only used a computer and didn't have the assistance of a server, so there was no chance to do anything underhanded.
After blocking the attack, the large server recovered and quickly used software to clean up memory junk.
Although he was somewhat passive, he had to continue to be patient for a while and eventually find out who had embezzled his money.
He doesn't move unless the enemy moves.
Hidden in the shadows, Kazuo Fujiwara seemed to have seized an opportunity and began setting up a shop and entering bank card numbers.
Create a menu, unit price, etc. for the store.
Xing Baohua saw the bank card number and asked Huahong Bank to check, which quickly identified the person in Hong Kong.
Send someone to look for him, to see if he's a scapegoat or just a gofer.
After finishing all this, Kazuo Fujiwara didn't rush to place the fraudulent order. Instead, after completing the store template, he simply logged out.
Xing Baohua felt that this was another psychological battle.
He lit a cigarette, pondering Fujiwara Kazuo's next move. Now, he stepped back to observe.
Even though the food delivery company's server was attacked, he dared to create a store template and set prices arbitrarily. All that was left was for customers to log in and place orders through this store, which was the final step online.
The other party wanted to observe whether the food delivery company would discover his methods.
Generally, setting up a business requires approval, one of which is manual approval; you just need to click "approved".
But Kazuo Fujiwara didn't need to do that behind the scenes; he could handle all the processes himself. As long as the delivery companies didn't detect the extra shops, he had the opportunity to take action.
Once the server setup is complete, all that's left is to use multiple devices to log into the client account, place orders, and then withdraw funds directly to the bank account through the backend.
After sorting things out, Xing Baohua discovered the bug.
Yes, he didn't set a withdrawal limit. Not only did the store not set a withdrawal limit, but the client application didn't either.
Pick up the phone and call the data center work group to set the limit and establish an over-limit alarm system.
As Xing Baohua spoke, he instructed the working group to record the withdrawal limits he requested to be changed, which were divided into three tiers: HKD 20,000, HKD 50,000, and HKD 100,000 per day.
Set a daily limit of HKD 2,000 for the client as well.
In this way, even if the card is stolen, the loss will be small.
However, there are still flaws. Once a hacker infiltrates the backend, they can use super administrator privileges to change everything.
Even if you set up an alarm system, the other party can still turn it off if they discover it. For experts, setting up these systems is almost pointless, but they still have some use. They can still serve as a deterrent against hackers who aren't very skilled but still want to show off.
A true master is someone you can't defend against, but you can intimidate.
Tracking system.
We are making every effort to build a tracking system, although it can only provide passive defense and allow us to wait for prey to come to us.
Once the real IP address is found, the hacker will not be able to escape.
Knowing the power of tracking systems, even the most skilled hackers must be careful not to have their real addresses traced back to them.
What are botnets for? No matter how many botnets you use, as long as you don't violently destroy the botnet data, you can retrieve it from where it came from.
Just like Xing Baohua could do some brute-force data destruction in the early stages, but later on, once you hit a firewall, there's no chance to back down. Once the port is blocked and patched, all the data you receive is saved in seconds.
My dear reader, there's more to this chapter! Please click the next page to continue reading—even more exciting content awaits!
Continue read on readnovelmtl.com