The first compromised machine was hacked, and after inspecting it, it was logged out.
Now he needs to quickly modify the other party's tracking virus, because he thinks this one is much better than the tracking viruses he made himself.
They all serve the same purpose and have similar functions. The only advantage is that the splitting mode is very sophisticated.
Once it's done, add another layer of shell to disguise it as a small file within the system.
By placing the compromised computer on the first botnet, Xing Baohua has an 80% chance of finding the target's location as long as the target still controls the email account through that computer.
Xing Baohua doesn't like fishing; he just feels it's a waste of time. This time, he really has to bring out the patience he needs for fishing.
This guy is impatient; patience is simply not in his nature. After installing the virus, he went back to the email server and directly packaged all the files on the server.
It's only a little over 1 megabyte, so you can download it slowly.
Copying and pasting is that simple; all that's left is to wait for the download to complete.
We've already waited so long, what's a few more hours?
This guy's downloading will definitely alert the server's anti-virus system. As long as the other party doesn't unplug the power or network cable, Xing Baohua can continue downloading data.
Furthermore, Xing Baohua was betting that the other party wouldn't immediately cut off the power, but would instead trace his IP address. They would definitely try to find the real address of the intrusion and retaliate.
Tracing Xing Baohua's IP address?
Haha, Xing Baohua has become quite shrewd; he used two message servers to help him get rid of his trackers.
Meanwhile, the other party found a botnet computer, and Xing Baohua installed a tracking virus on it.
Whether activated or silent, it can generally be effective as long as the other party contacts you.
And so, they chased each other, with Xing Baohua using one small server to handle the running around and another small server to receive and analyze the data.
Fortunately, a dedicated server was prepared to handle the main attack. The IP data collected by the virus was concentrated on this small server, which helped identify the compromised machines.
While blindly typing on the keyboard, Xing Baohua also looked at the numerous IPs displayed on another server.
If he hadn't looked closely, Xing Baohua wouldn't have known he was being targeted by a group of people, with at least five groups tracking his IP address.
This is outrageous! They've mobilized their entire team to deal with him.
Let's check the download progress again. Oh, it'll take another hour or so.
We'll continue playing hide-and-seek; we'll have to keep them at bay for another hour.
It's a pity he can't publicize it, otherwise Xing Baohua would proudly announce to the world that he's being chased by a pack of dogs on the internet.
After finally managing to download the data, Xing Baohua decisively activated the circuit breaker mechanism for the botnets.
I'm not playing with you guys anymore, that's how I'm going to be.
Based on the information I had previously gathered, I scanned the downloaded data for viruses.
Sure enough, it was the same virus.
However, the scan only reveals a directory; the contents can only be accessed with a password.
This time, Xing Baohua made multiple backups on floppy disks and hard drives, and found several broken motherboards, ready to burn them out at any time.
There's nothing we can do; the other party is just incredibly unethical.
He was very familiar with the route and handled the baggage.
After obtaining the password, I didn't dare to log in directly, fearing that logging in would activate the virus and allow me to test it on a bare board.
You can burn things here as you please, since they're not worth much money.
Unpack the file, decrypt the password, extract the virus, and then examine the files within the data.
Each email consists of text and images, with largely the same content. The only difference is the content of numbers 1-10.
It has a number, a nickname, and an email address.
Xing Baohua obtained the email addresses and nicknames of nine of the top ten members of the hacker alliance.
Of course, none of these are useful; the only useful thing is the nickname.
It's useless now, but once they become famous, Xing Baohua will know who did what.
After reviewing these documents, save them encrypted, store them on a separate hard drive, label them, and put them in your bag. When you return to Haina, put them in the office safe.
After burning several botnets, Xing Baohua was able to escape. He then used the botnets he controlled to hack into the other party's email server again.
If we already have the data, what's the point of coming here?
burn
If someone burns down his server once, he has to pay them back.
Let's destroy them in our own way, completely cripple their servers, to the point that they're beyond repair.
Xing Baohua has gained experience in doing such despicable things, and he acts decisively. First, he destroys the server's hard drive. This is not just about losing the hard drive and motherboard, but about loading a small program that repeatedly formats the logic program inside the motherboard.
Once powered on, the mini-program is activated, and then it executes commands to format the device.
Repeated formatting will overwrite hard drive data. If files are overwritten many times and then formatted, it will be very difficult to recover the data from the first layer.
However, Xing Baohua did not overwrite the data; it was just a simple format. After three or four formattings, the data could still be recovered, but after more than ten times, the disk was basically ruined.
The mini-program not only sends repeated commands to the hard drive, but also uses the constant oscillator on the hard drive's motherboard to set a number of times. After a certain number of formatting cycles, it instantly increases the power to burn out the chips and capacitors.
Even after the hard drive is burned out, the system still exists. As long as power is supplied, the virus continues to work. Once the hard drive is confirmed to be destroyed, the virus begins the next stage. This process is simultaneous: first, the BIOS is burned out, then the CPU, memory, and video memory.
Not only did it burn out the electrical components, but the most fatal blow was that it punctured the motherboard. Even if the hackers had personally visited their server room, they wouldn't have had a chance to repair the motherboard.
After finishing all this, Xing Baohua carefully withdrew.
I haven't had a proper rest for many days; I've spent most of my time in the server room.
My dear reader, there's more to this chapter! Please click the next page to continue reading—even more exciting content awaits!
Continue read on readnovelmtl.com