Chapter 478



Times change, and so do configurations.

Moreover, as things have progressed over the past few months, Xing Baohua has noticed that the defenses in many places have been strengthened, and it's no longer as easy to move around freely on other people's servers as it was at the beginning.

Start the auxiliary mini-server.

Knowing that the hacker alliance's email server was difficult to hack, he prepared two machines: one for causing damage and the other as a backup plan.

Prepare thoroughly, call a few students over, and let them watch a live demonstration.

Xing Baohua pulled out several commonly used tools from the computer to prepare, and then entered the address.

The email backend page is now displayed.

Instead of immediately entering the login password, I first used the scanning software to check for any hidden tracking viruses.

Don't accidentally trigger it and let the other party find you by following the trail.

Sure enough, it's better to be careful. One scan revealed a hundred or so.

Of course, I can't remove viruses for others; I can only use another tool to disguise the tools I use as normal files.

In this way, the email server system will not issue an alarm.

Generally, backend management passwords are 6 digits, with a maximum of 8 digits. It's not that longer passwords can't be designed, but there are usually limitations when setting them up.

Cracking it was also very simple; the 8-digit password was cracked without much effort with the help of a small server.

Xing Baohua logged in using the displayed password.

This is just the first step; there are even more difficult steps to come.

Email server space is limited, but the text content is extensive.

Bring up the background and find the logs directly.

Just as Xing Baohua had imagined, the other party was very careful, and had even cleaned up all traces of the logs.

If we continue, we'll need to recover the deleted logs.

It's very difficult. The most limited method is to retrieve the hard drive and restore it directly. Remote restoration is also possible, but the success rate is relatively low.

If the data is recovered remotely, it might alert the experts in the hacker alliance.

At this moment, Xing Baohua didn't rush to the next step. Instead, he explained to the trainees the steps he had taken during the intrusion, where to be cautious, what traps were involved, and so on.

After finishing his explanation, he added, "It's getting complicated now. Once I initiate remote recovery, I have to implant recovery software into the other party's hard drive, which is equivalent to downloading a program there. If the other party has traffic monitoring software, it will alert them."

"Either grit your teeth and continue, or run away as fast as you can and prepare to block the flow."

As he spoke, Xing Baohua began uploading hard drive repair software to the email server.

The server-to-server download speed is quite fast.

The software, which was about 2MB, was transferred in just a few minutes, and Xing Baohua installed it on the server system as quickly as possible.

Once the installation is complete, simply click "Progressive Scan".

At this moment, Xing Baohua stared intently at the screen, watching the scanning progress bar move little by little.

He was also a little nervous. He had already come this far, and he couldn't back down just because he had been discovered. He didn't have any better options than to force his way through.

Even though the progress bar is slow and it only takes about ten minutes, everyone feels that those ten minutes are very long.

Once the scan was finally complete, Xing Baohua immediately packaged all the scanned files and transferred them to a botnet computer.

Transitional storage file.

Xing Baohua then attempted to recover the email service, using a hard drive recovery tool to click on each of the gray data packets, which contained the log content he wanted.

Each gray data point represents a file deleted within a different time period.

Once recovered, it is transferred to the transitional botnet machine.

Although it's just a computer, once it's used, it's essentially called cloud storage.

This was initially used to store files temporarily via the internet. Later, as technology improved, hard drive enclosures became larger and cheaper, leading to the development of cloud storage.

Hard drives are only one factor; the network must also be up to par.

Xing Baohua was merely making some simple conveniences using the existing resources.

When there were still a few data packets that hadn't been fully recovered, Xing Baohua suddenly displayed a page that couldn't be connected.

Move your mouse, close the page, reopen it, and continue entering the address.

Xing Baohua initially thought the connection had dropped, but when she tried to log in again, she still couldn't connect.

He immediately exclaimed, "Holy crap. Did you unplug it?"

There was no time to explain; we quickly moved the botnets to the cloud storage location and started implementing blocking measures.

There was no time to clean up the traces, so the data had to be transferred step by step.

At this point, Xing Baohua put the small tool written by Geng Xin to use. It was a very large software program, and it couldn't be crammed into the program, so it could only be used as a remote add-on.

The software was large and located remotely, so the fans inside the small server were running at full power, humming and spinning.

After taking precautions and implementing blocking measures, Xing Baohua repackaged all the recovered data and transferred it again to prevent any accidents.

Time was of the essence, and he didn't know how long it would take for the other party to track him down.

Once the data transfer was complete, Xing Baohua used his most common tactic: a destructive retreat.

After finishing, I breathed a sigh of relief and immediately used a compression tool to compress the data packet.

Controlling the new botnet, accessing an email website, and sending out compressed data packets.

More than an hour had passed by the time I finished all of this, mainly because sending emails was a waste of time.

Although Geng Xin had clearly seen through all of Xing Baohua's methods, she asked at this moment, "When there is no way to stop the intrusion, is disconnecting the wire the only solution?"

"This is one of them. They didn't want me to restore too much, so they just disconnected me. I think they noticed me the moment I logged into the server, wanting to see what I was up to?"

This chapter is not finished, please click the next page to continue reading!

Continue read on readnovelmtl.com


Recommendation



Comments

Please login to comment

Support Us

Donate to disable ads.

Buy Me a Coffee at ko-fi.com
Chapter List