Chapter 122 Private Message

Xiang Kun knows that in the eyes of many people outside the industry, hackers are the best programmers.

Generally, those with "guest" in the title are kings, those with "hacker" and "teacher" in the title are masters, and those with "members" in the title are all dicks...

But in fact, there is no difference between top programmers and top hackers. They only specialize and excel in different fields. One is to find ways to meet and implement needs and build systems; the other is to rack their brains to dig and exploit vulnerabilities to invade the system; One is studying building, and the other is studying security.

There is no complete boundary between the two. Hackers themselves are a subset of programmers, and programmers can turn into hackers at any time.

Interest and specialization are in different directions.

When Xiang Kun was in middle school, he was once very obsessed with the handsomeness of hackers in film and television dramas and novels. He fantasized about hacking computers all over the world, hiding behind the screen and manipulating everything, and he was behind the scenes.Occasionally follow the tutorial to black out a few bad passwords and poorly maintained websites, but I didn’t actually do anything. Basically, I just walked around, spied, and left a txt or jpg file to show that I was here. That's it, just a very good script kid.

Now Xiang Kun is not unfamiliar with terms such as sql injection, cross-site scripting, buffer overflow, heap spraying, etc. He also knows the principles, but he does it for a while to let him attack and invade specific targets. Less than.It is not only the difference in thinking habits, but also the different understanding and application habits of many vulnerabilities, as well as the lack of other large accumulations, such as many spare broilers, reserved backdoors, different levels of social work libraries, and special programs written by yourself or others Tools, etc., can not be done all at once.

Of course, although top hackers are powerful, they are not omnipotent.

Just like someone coming into your house, they usually don’t use a hammer to smash the door directly. They either pretend to be a courier, check water meter, collect electricity, repair a computer, or deliver food... or just take advantage of it. When you are away from home, or when you are sleeping, use the imperfect security and structural problems to sneak in through the window, unlock the master key and sneak in, and even follow you trivially when you go home from grocery shopping, and You enter the house together.

Even if you do not open the door, they can pretend to be your identity, collect couriers at your door, and send couriers and order takeaways in your name.

Unless you blow up all the roads outside your house (disconnect the internet), it is indeed a very bad thing to keep thinking about it.

But the premise of all this is that they know the real address (IP) of your home.

On the Internet, the most important information is the IP, which represents your location, and the mac address is your "name", just like when someone finds that you live in a certain hotel, you must know your name to find you In which room, caught you.

The world is so big, if you don't interact with people, and there are no clues exposed, certain people may not be able to find you, because they don't know you are the person they are looking for.

But now, Xiang Kun wants to actively "send packages" with people who may be malicious to him and have the ability to track him, so he must be careful and be prepared.

The router in that coffee shop is like the uncle of the doorman who collects express mail at the gate of a certain community. In the name of Xiaoming, Xiang Kun asked the uncle to help him send a package, and the uncle asked the postal brother (network service provider) to deliver the package. Give it to him, as requested, the postal brother handed the package to the errand boy A (a springboard) contacted by Xiang Kun, and the errand boy A handed the package to the errand boy B (two springboards) as required.

Brother B took the package and handed it to an errands league (TOR). The errands league packaged the package outside and then handed it to brother C. Brother C only knew that the package was delivered to XX city, so it was delivered Later, I found a little brother D near XX city to take over, and little brother D tore a layer of parcel, and knew that the next destination was XX Street, so he found a little brother E near XX Street to take over, and little brother E tore another layer of parcel , Sent to the front desk of a company on XX (knowing the server).

When the company's front desk opened the final package, there was no address of the sender. They had to send the package back to the sender, so they could only hand it to the younger brother E.

Then, brother E finds brother D, and brother D gives it to brother C. After returning all the way, it is handed over to brothers B and A, sent to the postal brother, and then to the security room of the guardian. Lead away in the name of Xiao Ming.

So even if the front desk of the company (Zhihu) is controlled by the "wicked" and beat the sender E to death, he can’t tell the sender’s address because he doesn’t know at all, he just Knowing that it was given to him by Brother D.

Of course, this method is not completely safe and cannot be traced.

For example, there are "bad guys" informants in the errand brothers league, or if the "bad guys" have been ruthless, they paid enough price and manpower to catch brother D and beat them, then catch little brother C, and then found out about him. Brothers A and B both caught them and beat them and tortured them one by one.

For example, put a locator in the package sent back. If Xiang Kun opens the package, the locator will start working.

For example, to send Xiang Kun a truck of packages, he had to spend a lot of time to carry them, and gave them time to track down.

But in the end, even if they knew from the little postal brother that the place they were finally sent to was a certain community, they even found the doorman, and learned that the person sending the package was named Xiao Ming.

But their immediate reaction was definitely to search the entire community and find this guy named Xiao Ming.

When Xiang Kun, who was spying on the side, found out, he took off the mask on his face, destroyed all the packages (virtual machine), and quickly retreated.

Xiang Kun had heard that when the police were investigating a malicious hacker attack, the deputy minister of public security personally supervised and handled it. In the middle of the night, the telecom operators opened the gates to determine the location of the attack, and then the engineer drove the protocol analysis equipment in a computer room. A computer room was connected for testing, and the police uncle blocked the suspect's door before it was up.

Although it is determined that the opponent has no relationship with the official, Xiang Kun has always been accustomed to thinking about the imaginary hostility, just as the opponent can find his access IP to make a plan.

When I was wondering if there was anything I hadn't considered,

"You are also a vampire? How to prove it?"

Xiang Kun had already anticipated this problem, and replied: "You can go hungry more during the day than at night. If you don't drink blood when you are hungry at night, you will be easily manic.

When he was thinking about answering, he thought about how to prove his identity as a vampire without revealing his identity. The less he revealed, the better.

It's as if he didn't say that he was bald, molting, or changing teeth, nor did he say that he became stronger and his eyesight improved. After all, he wasn't sure if other "vampires" had the same changes as him, at least the "giant owl". But there is no hair loss or baldness.Once he says this, he will probably let the other party know that he is bald, which is an obvious feature.

"Kasumi of August" replied:

"Are you afraid of garlic?"

"I'm not afraid, but I can't eat. Except for water to drink, I'm not afraid of anything else I eat. I'm not afraid of crosses and Buddha statues.

"Wow! You are really a vampire! I finally found the same kind, so happy!"

Xiang Kun looked at the screen indifferently, sneered in his heart: pretend, then pretend.

Then replied: "Yes, I'm so excited too! I finally met the same kind!"

Kasumi in August: "Let’s use QQ to chat. Zhihu’s private messages are not safe for me. Maybe the administrator can see our chat! What is your QQ number? I add you!"

Pipika Kachuchu (new registered ID to Kun): "What is your QQ number, I will add you."

Kasumi in August: "424423****"

Xiang Kun just wrote down the QQ number in his head, and didn't even search for it, let alone open QQ. After a while, he replied: "Oh, I forgot my QQ password, so I can't try it. Come out, forget it, just say it in Zhihu's private message, people shouldn't have time to peek at the content of our chat."

Of course, he knows the purpose of the other party using QQ to chat. The private message on Zhihu is on Zhihu's server. The other party has less authority, but when using QQ, it is easy to find a P2P method, and then Knowing the IP of the other party in the chat is equivalent to removing the company's front desk when sending the package, and directly handing it over to the other party. The younger brother E who sent the package will be directly caught and beaten.

Of course, under the disguise of Xiang Kun, using tor to open QQ chat with him, it is not so easy to find the real IP.It's just that Xiang Kun didn't prepare a new QQ account temporarily, and he didn't bother to change the way.

After a while, Kasumi in August replied: "Why don't you add a WeChat account? What is your WeChat ID? Don't you tell me you can't remember your WeChat password?"

Pipika Kachuchu: "What is your WeChat ID?"

Kasumi in August: "Hey! May I ask first!"

Pipika Kachuchu: "Forget it, I think we should talk like this first, how did you become a vampire? When did you find it?"

Kasumi in August: "Why are you not a gentleman at all? Poor expression."

Pipika Kachuchu: "I am not a gentleman, I am not sure if you are of the same kind."

Kasumi in August: "Not sure why did you send me a private message? Is my answer very clear?"

Pipika Kachuchu: "So how did you become a vampire, and when did you change?"

Kasumi in August: "A lot of things I don't want to say in private messages, either add QQ, or add WeChat, or talk directly."

Pipika Kachuchu: "What is your WeChat and phone number?"

Kasumi in August: "You are too defensive. You also went to get a vest to send private messages? You keep asking me for information, but don't tell me about my situation? You want to know when I became Vampire, how did you become a vampire, do you have to tell your situation first? An angry expression."

Pipika Kachuchu: "You speak first, I will tell you later."

After a while, Kasumi in August made a sigh, and then replied:

"Well, I became a vampire a month ago. As for how I changed it, I don't know how it happened. It just happened when I woke up. What about you, who was your first food?"

Xiang Kun raised his brow. This reply revealed too much information, and the other party might not even realize it.