[Hacker] Angry Youth God
Chapter 11 Your Name Is Shabi
In fact, Yan Mingfei also understands the truth without pointing it out, but understanding is one thing, and doing it is another.
On the way back to the dormitory, Gu Zhichuan kept thinking about what he should do.
There are two tragedies in this world, one is the failure to achieve anything, the other is the smug.
He can't remember where he read these words, but the memory is very deep.
For him now, these two tragedies are all accounted for.
I am full of expectation and longing for the future of hacking, but when I look back at my current situation, I can hardly even smile bitterly.
He's still young, and he doesn't want to die yet.
He's just a fool, how could he be so coincidental back then - he was just about to imitate others to hack into the website server, and he was able to find such an artifact in it?He still doesn't remember the domain name of this server.
In other words, he played with the artifact for many years like a fool, but he didn't know anything about what he was holding.
Maybe this artifact has its own sniffer and eavesdropping program, and all its operations are fed back to the real controller of this artifact.
So is the artifact he is using safe now?
Gu Zhichuan is a person who cherishes life very much. Although he thinks that death is not so terrible, it is because of his rebirth after all. What will he do if he dies in this life?
He doesn't study biophysics, doesn't know string time theory, and doesn't know a brief history of time. He doesn't care about how he was reborn, he only cares about what he will do after rebirth.
He was going to be a hacker again, a real hacker.
It's just that the road ahead is long and there seems to be no light in sight.
Gu Zhichuan patted his forehead as he walked, but he was thinking about the artifact.
The most urgent task is to find out the origin of the artifact. It has been more than two years since he got the artifact, so who knows if the original artifact has been invented by this time?
Judging from his only knowledge about the program structure, the artifact is just a part of a large system, like a part removed from a large machine, but there is no doubt that the artifact is definitely a very critical part of it. It's still the core.
Who wrote this huge program system, what was their purpose, why was he able to find such a powerful artifact in that small server, and finally, where did the people who killed him come from?
In fact, Gu Zhichuan felt that he could solve this huge mystery as long as he could do one thing, and that was to find out who in this world had the ability to write artifacts.
The artifact is mainly based on intrusion, and most of this method is a hacker, so who are the famous hackers in the world?
In particular, the operation of this artifact is actually controlled in English, that is to say, it is almost impossible for this artifact to be a domestic hacker.
Then the veteran hackers "Yidao", "God of Wealth", and even "Rui Zhe", these talented people in Qianyuan Forum should not be writers, unless they are not only domestic hackers, but also foreign hackers lurking in Chinese hackers. The mole of the organization.
It is also impossible for this artifact to be written out of normal needs. Have you seen any person or organization whose normal activities are to go to the lairs of major international organizations and not be discovered?
correct!International organizations!
Gu Chen was walking, when he suddenly thought of this point, he clenched his hands into fists and waved it, how could he have never thought of it!
Sure enough, he was still poisoned by the artifact back then, so he didn't use his brains at all!
This kind of organization is definitely very large and secretive, and most of them are illegal. If it is legal, then the intelligence agencies of various countries must have their information. Of course, if it is really illegal, then the intelligence agencies should have information. In a word Words—if you want to know the truth, go to the intelligence agency!
He has a magic weapon to enter and leave the US CIA, FBI and even the KGB, it is a matter of minutes! ! !
The premise is just whether he dares to bet.
Whether there is a problem with the artifact, this is a very serious question...
Gu Zhichuan rolled his eyes towards the sky. With his level, he could see what the artifact was like. Why did he bother to study the artifact?It is directly a strange flower in the hacker world, so why are you still thinking about it here!
Gu Zhichuan went all the way back to the dormitory, and there were people who knew him on the way, but they said very aggressively, "Old Gu did a good job" or something like that.In short, Gu Zhichuan became famous this time out of nowhere, and he himself didn't understand why they were so hotly discussed—maybe it was due to the sense of collective honor, after all, Gu Zhichuan apparently picked Yao Jingsheng.
But damn, he's just a scapegoat!
As soon as he sat in front of the computer, Gu Zhichuan felt that his blood that had boiled just now began to quiet down, and he realized that he was able to face some things rationally.
Such as my own death and fear of the unknown.
He turned on the computer, only opened the programming environment, and the asp script file was still on the desktop. He suddenly felt that he was really an amateur hacker. I put important documents where others can't see them, but what about him?
Unexpectedly, it was directly placed on the table.
Well, can he comfort himself that it's because he knows his grandson well?The most dangerous places are the safest.
He used to shred the hard drive after analyzing the entire artifact to ensure that no traces were left, but now he seems to have thrown all these habits into Java overnight.
Gu Zhichuan sighed, first silenced the code of the artifact for a while, merged it with the previous code, put it in the virtual server to simulate it again, and found that the function of the artifact at this time is completely close to when he used it in his previous life, He just added an easy-to-operate button to the artifact, which was the same as the only modification he made to it after he got the artifact in his previous life.
Gu Zhichuan only felt the cold air under his feet, the cold sweat on his head began to rage, his hands trembled a little, checked the size of the current program file, and felt that his eyes were dark.
198k.
Pressing his temple, Gu Zhichuan stood up and paced back and forth in the bedroom, restless.
Impossible, even if the code of the artifact becomes garbled, he can still recognize it!Every time he decompiles the artifact into the source code, the number he sees is 327k. Now the artifact he recompiled has only the original three panels, that is, three splicing units, but the function is almost exactly the same as the original!
So - there are more than 100k of code, what is it? !
For the artifact he used, the code of nearly 300 K is enough, but the entire artifact has more than 100 K, and the extra [-] K... What the hell is it?
Gu Zhichuan was cold all over, but he slapped himself hard as soon as he turned his face.
He stood there for a long time, his hands hanging down, his fingers too stiff to move.
Looking at the computer a few meters away, he actually felt very scared.
The artifact he used had a hidden part that he didn't know about.
That part of the code was like bugs crawling into his head, and he immediately wanted to crouch down with his head in his arms.
There, the answer he wanted was hidden, the answer was in his mind, in that code.
He suddenly calmed down, and he didn't know why.
Maybe people are always going from one extreme to another.
Going to the bathroom to wash his face, he touched the five finger prints on his face, and grinned, "Whatever, you want my life, in the next life, you bastards—"
In fact, he didn't know who he was talking to, he just felt that he was going to declare war on that or that group of unknown enemies.
He went back to the computer, opened all the computer's process managers, stared wide-eyed, and opened the artifact, which is an ordinary user interface. Gu Zhichuan's beautification work has always been done very badly.
But being ugly does not prevent it from being powerful.
He wants to take risks.
Wealth and wealth are sought in danger, how can you get tiger cubs if you don't enter the tiger's den?I can't bear to let the child not be caught by the wolf...
He said a lot to himself, and finally ran the artifact in his computer system.
No longer a virtual system, it means that his location may be leaked to some unknown dangerous people by the artifact.
Gu Zhichuan took a deep breath and chose the school's server. Today there is no honeypot, the ports are open normally, and there are still infinite backdoors.
According to the scan that came with the artifact, Gu Zhichuan was able to find more than a dozen major loopholes on this server!
Because he only scanned this one ip, he didn't feel that the computer resource usage rate was too high. This is also the benefit of the artifact. Gu Zhichuan stared at the CPU usage rate, and his heart pumped violently again.
CPU usage is smaller than before.
A powerful scanner can easily detect weak passwords. A weak password is simply a password composed of commonly used numbers, letters, characters, etc., which can be easily guessed by others through simple and ordinary thinking. Now Gu Zhichuan The feedback page of the built-in scanner of Artifact has already displayed the information of many users with weak passwords, and there are even users with relatively high authority, but the administrator account with the highest authority cannot be scanned.
His purpose is not to seize control of the server, but to know whether there is any problem with the artifact.
When exchanging data with the server, he kept staring at the traffic monitor, and he was relieved to make sure that there was no data outflowing beyond the size of his command statement.
The layout of the artifact has three parts. The upper part is the scanner, which is no different from ordinary scanners. There is a start ip input box and an end ip input box, which are used to scan ip segments within a certain range. The current configuration of this computer simply cannot support such a huge resource occupation and computing speed.
The middle part is an attack tool, the window on the left is the broiler manager, and there are only a few ip input boxes on the right, one of which is the adapter used by Gu Zhichuan, and the other is a super intrusion artifact, so far Gu Zhichuan does not know how it works As long as you enter the ip or network URL, you can connect to the server or personal pc platform of the ip.
Probably some very powerful general-purpose vulnerabilities.
Now the world is basically using the tcp/ip protocol for network data exchange, which is essentially a dod model. The U.S. Department of Defense is based on the osi design. This four-layer model seems to be controversial, because more and more computers are used in the world. However, the number of IPs is restricted by the agreement, and this agreement must be changed and upgraded. There may be loopholes in this agreement, so the artifact can easily invade any server.
Of course, these are Gu Zhichuan's own guesses, whether this is true or not needs to be verified in the future.
It's just that with such a powerful intrusion function, apart from finding loopholes in the rules, Gu Zhichuan himself doesn't know what loopholes are common.
As for the lowest part of the artifact, it is the virus database and injector. Obviously, Gu Zhichuan's virus database is just a decoration, because his entire artifact is so big that it is impossible to accommodate a large number of viruses.
Every hacker has his own virus, some are written by himself, some are widely collected, but these are harmless to their own computers, the more advanced the virus, the bigger the size, the powerful but small virus Gu Zhichuan Haven't heard of it yet.
Many people write viruses to set the infection method according to the pedigree diagrams of many bacteria in organisms, especially some highly infectious viruses, such as panda burning incense. This type of virus pursues rapid infection to cause powerful damage. In various pedigree diagrams, Gu Zhichuan knows one—the pedigree of the HIV virus. At this time, no research institution in the world has been able to study the transmission mode of HIV infection.
This should be Gu Zhichuan's sharp weapon in the future.
He checked again for a while, and carefully probed the school's server. After confirming that there was nothing suspicious, he cleared the footprints with one click and exited.
Gu Zhichuan's eyes were bright at this moment, and there was a smile on his lips.
This mood change is too fast, but it is normal.
He has gained the upper hand in the contest with the unknown opponent.
The artifact is now safe.
The remaining part may be safe, may be dangerous, may be a sniffer, or may be a powerful virus, but he will never dare to touch it now, and he will not be able to open it until he is strong enough.
Then he shook the mouse again, advanced to the Abyss Forum as usual, and found that someone had already replied to his questioning post in the technical area.
And the id of the reply made Gu Zhichuan gasp, "Nimma's God of Wealth?!"
The reply time was just 3 minutes ago, and now the id of God of Wealth is still online!
Gu Zhichuan was in a mess, looking at the short sentence "Where did the code come from?" in the post, he felt like thunder was going off on his head!
What does it mean?
On the other side of the computer, someone stared at the post on the computer screen and fell into deep thought.
On Gu Zhichuan's side, the more he thought about it, the more wrong he was. At first he thought he was lucky, but when he thought about it again, his scalp became numb. This kind of tone is really weird!
Does he know where the code came from or does he recognize the code?Or is there something wrong with the code?
Without even thinking about it, Gu Zhichuan decided to nip the danger in the bud. Is there anyone in the hacker world who is absolutely clean?Even if the God of Wealth has a good reputation in the domestic hacker community, he still can't believe it.
He originally wanted to use the delete post function in the forum, but found that this post had been locked, and he felt even more wrong.
Just right, anyway, the post was deleted in the forum, and the post can be found again by doing a data recovery.
At this time, he wanted to beat himself again, making you crazy at the beginning!
Gu Zhichuan hastily opened the artifact and directly entered Qianyuan's URL, and clicked "Confirm Connection" next to it, and a background control interface was displayed on his desktop after a few seconds.
This function of the artifact can only be used for intrusion and short-term operations, and complex operations are required to turn this server into your own bot.
He searched for his own post, and deleted it completely, so only a few seconds later, the Qianyuan forum was full of ghosts and wolves. He was still surprised at the appearance of the great god, but in the blink of an eye, the post disappeared completely. What happened? !
So there was a lot of discussion, even the God of Wealth who replied to the post felt strange, sent a message to ask his acquaintances in Qianyuan if Qianyuan deleted the post, and the result was natural, Qianyuan was also surprised, At first, I thought it was God of Wealth who couldn't understand that rookie, and he used administrator privileges to delete the post, but they also understood the question of God of Wealth, mother, who the fuck deleted the post?
There is a problem with this search, no one has deleted this post of Nima!
Qianyuan was hacked!They still don't know anything!
Nima's Qianyuan is the largest hacker forum in China, and now it has been hacked!All the outstanding domestic hackers are diving here, who else will invade the abyss?Hackers from abroad?Came here just to delete a small post?
The smart people immediately felt that something was wrong here. Could it be that some hacker they didn't know made the move?
But why?
What exactly is the code in that post?
They ran to ask the God of Wealth, but the God of Wealth only said that he did not remember.
……
Naturally, Gu Zhichuan didn't know what was going on over there. After he deleted it, he decided not to show the code in the artifact to others easily. But after a while, he was still browsing Qianyuan, but suddenly countless in-site codes popped up. The text messages all asked very vaguely, "Where is the master?" "Can you send the code again?" "Friends..." and so on.
Gu Zhichuan thought it was funny, probably they found out that there were even famous masters who sent him short messages, and of course there were many small vests, probably the masters had this habit.
Gu Zhichuan pretended to be stupid with them one by one. When encountering a webcam from a master, he pretended to be a novice and confessed his love to the master. In this way, there must be an exchange of information between them, and one can tell at a glance that this kid is dishonest and definitely a rookie, which will definitely reduce the suspicion of him.
But when he went back, he saw an unexpected short message.
"Master, you are so amazing! I was wrong before! I was able to get the master to reply to your post, please hook up~"
At that time, Gu Zhichuan was naming the already safe artifact, but when he saw the short id, he made a typo, so the artifact was named "Shabi".
The corner of Gu Zhichuan's mouth twitched for a long time, damn it!This is an artifact, and it was actually named "Shabi"!
wipe!Is this intentional?
For a moment, Gu Zhichuan looked at that wretched id, his teeth itched.
On the way back to the dormitory, Gu Zhichuan kept thinking about what he should do.
There are two tragedies in this world, one is the failure to achieve anything, the other is the smug.
He can't remember where he read these words, but the memory is very deep.
For him now, these two tragedies are all accounted for.
I am full of expectation and longing for the future of hacking, but when I look back at my current situation, I can hardly even smile bitterly.
He's still young, and he doesn't want to die yet.
He's just a fool, how could he be so coincidental back then - he was just about to imitate others to hack into the website server, and he was able to find such an artifact in it?He still doesn't remember the domain name of this server.
In other words, he played with the artifact for many years like a fool, but he didn't know anything about what he was holding.
Maybe this artifact has its own sniffer and eavesdropping program, and all its operations are fed back to the real controller of this artifact.
So is the artifact he is using safe now?
Gu Zhichuan is a person who cherishes life very much. Although he thinks that death is not so terrible, it is because of his rebirth after all. What will he do if he dies in this life?
He doesn't study biophysics, doesn't know string time theory, and doesn't know a brief history of time. He doesn't care about how he was reborn, he only cares about what he will do after rebirth.
He was going to be a hacker again, a real hacker.
It's just that the road ahead is long and there seems to be no light in sight.
Gu Zhichuan patted his forehead as he walked, but he was thinking about the artifact.
The most urgent task is to find out the origin of the artifact. It has been more than two years since he got the artifact, so who knows if the original artifact has been invented by this time?
Judging from his only knowledge about the program structure, the artifact is just a part of a large system, like a part removed from a large machine, but there is no doubt that the artifact is definitely a very critical part of it. It's still the core.
Who wrote this huge program system, what was their purpose, why was he able to find such a powerful artifact in that small server, and finally, where did the people who killed him come from?
In fact, Gu Zhichuan felt that he could solve this huge mystery as long as he could do one thing, and that was to find out who in this world had the ability to write artifacts.
The artifact is mainly based on intrusion, and most of this method is a hacker, so who are the famous hackers in the world?
In particular, the operation of this artifact is actually controlled in English, that is to say, it is almost impossible for this artifact to be a domestic hacker.
Then the veteran hackers "Yidao", "God of Wealth", and even "Rui Zhe", these talented people in Qianyuan Forum should not be writers, unless they are not only domestic hackers, but also foreign hackers lurking in Chinese hackers. The mole of the organization.
It is also impossible for this artifact to be written out of normal needs. Have you seen any person or organization whose normal activities are to go to the lairs of major international organizations and not be discovered?
correct!International organizations!
Gu Chen was walking, when he suddenly thought of this point, he clenched his hands into fists and waved it, how could he have never thought of it!
Sure enough, he was still poisoned by the artifact back then, so he didn't use his brains at all!
This kind of organization is definitely very large and secretive, and most of them are illegal. If it is legal, then the intelligence agencies of various countries must have their information. Of course, if it is really illegal, then the intelligence agencies should have information. In a word Words—if you want to know the truth, go to the intelligence agency!
He has a magic weapon to enter and leave the US CIA, FBI and even the KGB, it is a matter of minutes! ! !
The premise is just whether he dares to bet.
Whether there is a problem with the artifact, this is a very serious question...
Gu Zhichuan rolled his eyes towards the sky. With his level, he could see what the artifact was like. Why did he bother to study the artifact?It is directly a strange flower in the hacker world, so why are you still thinking about it here!
Gu Zhichuan went all the way back to the dormitory, and there were people who knew him on the way, but they said very aggressively, "Old Gu did a good job" or something like that.In short, Gu Zhichuan became famous this time out of nowhere, and he himself didn't understand why they were so hotly discussed—maybe it was due to the sense of collective honor, after all, Gu Zhichuan apparently picked Yao Jingsheng.
But damn, he's just a scapegoat!
As soon as he sat in front of the computer, Gu Zhichuan felt that his blood that had boiled just now began to quiet down, and he realized that he was able to face some things rationally.
Such as my own death and fear of the unknown.
He turned on the computer, only opened the programming environment, and the asp script file was still on the desktop. He suddenly felt that he was really an amateur hacker. I put important documents where others can't see them, but what about him?
Unexpectedly, it was directly placed on the table.
Well, can he comfort himself that it's because he knows his grandson well?The most dangerous places are the safest.
He used to shred the hard drive after analyzing the entire artifact to ensure that no traces were left, but now he seems to have thrown all these habits into Java overnight.
Gu Zhichuan sighed, first silenced the code of the artifact for a while, merged it with the previous code, put it in the virtual server to simulate it again, and found that the function of the artifact at this time is completely close to when he used it in his previous life, He just added an easy-to-operate button to the artifact, which was the same as the only modification he made to it after he got the artifact in his previous life.
Gu Zhichuan only felt the cold air under his feet, the cold sweat on his head began to rage, his hands trembled a little, checked the size of the current program file, and felt that his eyes were dark.
198k.
Pressing his temple, Gu Zhichuan stood up and paced back and forth in the bedroom, restless.
Impossible, even if the code of the artifact becomes garbled, he can still recognize it!Every time he decompiles the artifact into the source code, the number he sees is 327k. Now the artifact he recompiled has only the original three panels, that is, three splicing units, but the function is almost exactly the same as the original!
So - there are more than 100k of code, what is it? !
For the artifact he used, the code of nearly 300 K is enough, but the entire artifact has more than 100 K, and the extra [-] K... What the hell is it?
Gu Zhichuan was cold all over, but he slapped himself hard as soon as he turned his face.
He stood there for a long time, his hands hanging down, his fingers too stiff to move.
Looking at the computer a few meters away, he actually felt very scared.
The artifact he used had a hidden part that he didn't know about.
That part of the code was like bugs crawling into his head, and he immediately wanted to crouch down with his head in his arms.
There, the answer he wanted was hidden, the answer was in his mind, in that code.
He suddenly calmed down, and he didn't know why.
Maybe people are always going from one extreme to another.
Going to the bathroom to wash his face, he touched the five finger prints on his face, and grinned, "Whatever, you want my life, in the next life, you bastards—"
In fact, he didn't know who he was talking to, he just felt that he was going to declare war on that or that group of unknown enemies.
He went back to the computer, opened all the computer's process managers, stared wide-eyed, and opened the artifact, which is an ordinary user interface. Gu Zhichuan's beautification work has always been done very badly.
But being ugly does not prevent it from being powerful.
He wants to take risks.
Wealth and wealth are sought in danger, how can you get tiger cubs if you don't enter the tiger's den?I can't bear to let the child not be caught by the wolf...
He said a lot to himself, and finally ran the artifact in his computer system.
No longer a virtual system, it means that his location may be leaked to some unknown dangerous people by the artifact.
Gu Zhichuan took a deep breath and chose the school's server. Today there is no honeypot, the ports are open normally, and there are still infinite backdoors.
According to the scan that came with the artifact, Gu Zhichuan was able to find more than a dozen major loopholes on this server!
Because he only scanned this one ip, he didn't feel that the computer resource usage rate was too high. This is also the benefit of the artifact. Gu Zhichuan stared at the CPU usage rate, and his heart pumped violently again.
CPU usage is smaller than before.
A powerful scanner can easily detect weak passwords. A weak password is simply a password composed of commonly used numbers, letters, characters, etc., which can be easily guessed by others through simple and ordinary thinking. Now Gu Zhichuan The feedback page of the built-in scanner of Artifact has already displayed the information of many users with weak passwords, and there are even users with relatively high authority, but the administrator account with the highest authority cannot be scanned.
His purpose is not to seize control of the server, but to know whether there is any problem with the artifact.
When exchanging data with the server, he kept staring at the traffic monitor, and he was relieved to make sure that there was no data outflowing beyond the size of his command statement.
The layout of the artifact has three parts. The upper part is the scanner, which is no different from ordinary scanners. There is a start ip input box and an end ip input box, which are used to scan ip segments within a certain range. The current configuration of this computer simply cannot support such a huge resource occupation and computing speed.
The middle part is an attack tool, the window on the left is the broiler manager, and there are only a few ip input boxes on the right, one of which is the adapter used by Gu Zhichuan, and the other is a super intrusion artifact, so far Gu Zhichuan does not know how it works As long as you enter the ip or network URL, you can connect to the server or personal pc platform of the ip.
Probably some very powerful general-purpose vulnerabilities.
Now the world is basically using the tcp/ip protocol for network data exchange, which is essentially a dod model. The U.S. Department of Defense is based on the osi design. This four-layer model seems to be controversial, because more and more computers are used in the world. However, the number of IPs is restricted by the agreement, and this agreement must be changed and upgraded. There may be loopholes in this agreement, so the artifact can easily invade any server.
Of course, these are Gu Zhichuan's own guesses, whether this is true or not needs to be verified in the future.
It's just that with such a powerful intrusion function, apart from finding loopholes in the rules, Gu Zhichuan himself doesn't know what loopholes are common.
As for the lowest part of the artifact, it is the virus database and injector. Obviously, Gu Zhichuan's virus database is just a decoration, because his entire artifact is so big that it is impossible to accommodate a large number of viruses.
Every hacker has his own virus, some are written by himself, some are widely collected, but these are harmless to their own computers, the more advanced the virus, the bigger the size, the powerful but small virus Gu Zhichuan Haven't heard of it yet.
Many people write viruses to set the infection method according to the pedigree diagrams of many bacteria in organisms, especially some highly infectious viruses, such as panda burning incense. This type of virus pursues rapid infection to cause powerful damage. In various pedigree diagrams, Gu Zhichuan knows one—the pedigree of the HIV virus. At this time, no research institution in the world has been able to study the transmission mode of HIV infection.
This should be Gu Zhichuan's sharp weapon in the future.
He checked again for a while, and carefully probed the school's server. After confirming that there was nothing suspicious, he cleared the footprints with one click and exited.
Gu Zhichuan's eyes were bright at this moment, and there was a smile on his lips.
This mood change is too fast, but it is normal.
He has gained the upper hand in the contest with the unknown opponent.
The artifact is now safe.
The remaining part may be safe, may be dangerous, may be a sniffer, or may be a powerful virus, but he will never dare to touch it now, and he will not be able to open it until he is strong enough.
Then he shook the mouse again, advanced to the Abyss Forum as usual, and found that someone had already replied to his questioning post in the technical area.
And the id of the reply made Gu Zhichuan gasp, "Nimma's God of Wealth?!"
The reply time was just 3 minutes ago, and now the id of God of Wealth is still online!
Gu Zhichuan was in a mess, looking at the short sentence "Where did the code come from?" in the post, he felt like thunder was going off on his head!
What does it mean?
On the other side of the computer, someone stared at the post on the computer screen and fell into deep thought.
On Gu Zhichuan's side, the more he thought about it, the more wrong he was. At first he thought he was lucky, but when he thought about it again, his scalp became numb. This kind of tone is really weird!
Does he know where the code came from or does he recognize the code?Or is there something wrong with the code?
Without even thinking about it, Gu Zhichuan decided to nip the danger in the bud. Is there anyone in the hacker world who is absolutely clean?Even if the God of Wealth has a good reputation in the domestic hacker community, he still can't believe it.
He originally wanted to use the delete post function in the forum, but found that this post had been locked, and he felt even more wrong.
Just right, anyway, the post was deleted in the forum, and the post can be found again by doing a data recovery.
At this time, he wanted to beat himself again, making you crazy at the beginning!
Gu Zhichuan hastily opened the artifact and directly entered Qianyuan's URL, and clicked "Confirm Connection" next to it, and a background control interface was displayed on his desktop after a few seconds.
This function of the artifact can only be used for intrusion and short-term operations, and complex operations are required to turn this server into your own bot.
He searched for his own post, and deleted it completely, so only a few seconds later, the Qianyuan forum was full of ghosts and wolves. He was still surprised at the appearance of the great god, but in the blink of an eye, the post disappeared completely. What happened? !
So there was a lot of discussion, even the God of Wealth who replied to the post felt strange, sent a message to ask his acquaintances in Qianyuan if Qianyuan deleted the post, and the result was natural, Qianyuan was also surprised, At first, I thought it was God of Wealth who couldn't understand that rookie, and he used administrator privileges to delete the post, but they also understood the question of God of Wealth, mother, who the fuck deleted the post?
There is a problem with this search, no one has deleted this post of Nima!
Qianyuan was hacked!They still don't know anything!
Nima's Qianyuan is the largest hacker forum in China, and now it has been hacked!All the outstanding domestic hackers are diving here, who else will invade the abyss?Hackers from abroad?Came here just to delete a small post?
The smart people immediately felt that something was wrong here. Could it be that some hacker they didn't know made the move?
But why?
What exactly is the code in that post?
They ran to ask the God of Wealth, but the God of Wealth only said that he did not remember.
……
Naturally, Gu Zhichuan didn't know what was going on over there. After he deleted it, he decided not to show the code in the artifact to others easily. But after a while, he was still browsing Qianyuan, but suddenly countless in-site codes popped up. The text messages all asked very vaguely, "Where is the master?" "Can you send the code again?" "Friends..." and so on.
Gu Zhichuan thought it was funny, probably they found out that there were even famous masters who sent him short messages, and of course there were many small vests, probably the masters had this habit.
Gu Zhichuan pretended to be stupid with them one by one. When encountering a webcam from a master, he pretended to be a novice and confessed his love to the master. In this way, there must be an exchange of information between them, and one can tell at a glance that this kid is dishonest and definitely a rookie, which will definitely reduce the suspicion of him.
But when he went back, he saw an unexpected short message.
"Master, you are so amazing! I was wrong before! I was able to get the master to reply to your post, please hook up~"
At that time, Gu Zhichuan was naming the already safe artifact, but when he saw the short id, he made a typo, so the artifact was named "Shabi".
The corner of Gu Zhichuan's mouth twitched for a long time, damn it!This is an artifact, and it was actually named "Shabi"!
wipe!Is this intentional?
For a moment, Gu Zhichuan looked at that wretched id, his teeth itched.
You'll Also Like
-
From Battle Through the Heavens Simulation to The Great Ruler
Chapter 195 16 hours ago -
Naruto: By lying low and hiding, he eventually became the leader of the Legendary Sannin.
Chapter 274 16 hours ago -
I will traverse countless worlds and become a god entirely on my own!
Chapter 521 16 hours ago -
Naruto: The Caged Bird Cannot Confine Me - Feng Hou Qi Men
Chapter 102 16 hours ago -
They won't let me pilot my mecha? I'll just transform into Noah!
Chapter 188 16 hours ago -
I'm in Teyvat, join the chat group.
Chapter 196 16 hours ago -
Reborn to Make Games: My Girlfriend is a Game Streamer
Chapter 88 16 hours ago -
Simultaneous Transmigration: Freedom Across the Heavens
Chapter 80 16 hours ago -
Naruto: From Shikotsumyaku to Otsutsuki
Chapter 56 16 hours ago -
In Detective Conan, you call this just an ordinary lawyer?
Chapter 44 16 hours ago