home

search

Chapter 12: Complete Victory

  Chapter 12: Complete Victory

  When these people arrived at the scene of the attack via the web, they found that the situation was not very severe. After a while, someone released information through contact tools: "This guy's attack has been largely resolved and is retreating steadily, it's really strange."

  Another person replied: "Yes, did the New York Times hire some kind of expert? Looking at this situation, it won't take long for the attacker to fail."

  The third person sent a message saying: "Let's take action, since this guy can't hold on anymore, let's beat the dog in the water! Remember, the key is to track down his IP address."

  The ace of the US Cyber Security Center has taken action, but Troy, sitting in his office on the 32nd floor of the Empire State Building, is crying out in distress. He miscalculated, thoroughly miscalculated!

  Although the situation was very good at the beginning of the attack, and even the New York Times website was about to be taken down by him, just at this time, Troy suddenly found that many of his meat chickens had become slow, in less than two minutes, many meat chickens began to collapse, as the attack continued, more and more meat chickens collapsed, Troy was busy trying to retreat, but what made him feel desperate was that all the meat chickens in his hand were out of control!

  Troy was caught off guard, everything happened too fast, so fast that he didn't even have time to react correctly. By the time it all ended, he realized that as a hacker, he had lost his last guarantee and wouldn't be able to use it for much longer, his true identity would soon be exposed in front of his opponent's eyes.

  The fact is just as Troy predicted, his IP address has been tracked by Feng Xiaotian. How did Feng Xiaotian do it?

  As early as when Troy launched the attack, Feng Xiaotian had sensed it and after some thought, Feng Xiaotian made a decision - to write a program to counterattack against the attacking behavior!

  Feng Xiaotian himself didn't have any meat chickens, facing such a huge data flow, relying on the computer he had, was simply a cannon fodder role. However, Feng Xiaotian quickly thought of a method: by deceiving the program to transfer the opponent's attack to the opponent itself!

  This method seemed feasible to Feng Xiaotian, so he immediately took action. He only spent ten minutes completing the program. At this time, under Troy's attack, The New York Times website was on the verge of collapse. Feng Xiaotian didn't dare to slack off and quickly embedded the well-written program into the webpage of the website, then...then just waited for the opponent to perish by itself.

  Flood attack - also known as data flow attack, it is formed by sending a large amount of information to the target. The Trojan manipulates the zombies to continuously send access requests to the website. After the website receives the information, there is a process of processing the information. If the number of such access requests is too high, it will affect the processing speed of the website server, causing the website to delay and even crash. So what does "access request" mean here?

  This is easy to understand. Normally, when we want to access a website, we first enter the website's interface, then open a webpage interface, and view the content that interests us. The "access request" referred to here is the data flow caused by opening the webpage. This data flow needs to be converted through the website server and then transmit the information back to the website, so that the webpage you clicked on will appear.

  Feng Xiaotian wrote a counter-program based on this principle. The Trojan-controlled zombies kept clicking on any web page interface that existed on the website. One zombie had hundreds of clicks, and if one computer acted like this, it wouldn't have much impact, but what about 1,000, 10,000 or even 100,000 computers?

  Feng Xiaotian embedded the well-written program into the website page, this program will transfer all "visit requests" to other computers, the more clicks, the more content it transfers, because it exists in every website page in the form of replication, so it is very effective against Trojan's information flow attack, this is also the reason why Trojan suddenly found that many of its meat chickens collapsed, because their attacks were all transferred to themselves, facing the massive information flow generated instantly, it's strange if a single computer doesn't collapse!

  Of course, this also includes many normally accessed computers. Many people were watching the news and after clicking on a certain webpage, they suddenly found their computer to be extremely slow, then...then the computer screen flashed and immediately shut down.

  This is also an unavoidable thing, Feng Xiao Tian is not a god, the program he wrote does not have the ability to automatically identify, so for the losses caused to other innocent people, he can only say sorry.

  Troy was defeated very quickly and thoroughly, he sat in a daze on the chair, facing the completely disappeared meat chicken, unable to think of anything. After a moment, his IP address was tracked by Feng Xiaotian. Although the meat chickens had collapsed, the information before they collapsed still existed. Feng Xiaotian found Troy through this information.

  Next, Feng Xiaotian hesitated. This was his first time having a conflict with someone online, and although he had won, the outcome didn't bring him joy. After all, many people had already suffered losses; who would compensate for these losses? Even if they caught Troy, what could be done about it?

  The Wind Laughed at Heaven, but the experts from the US Network Security Center did not hesitate. They followed in the footsteps of the Wind Laughed at Heaven and found Troy's address. Then they fed this address back to Professor Vincent, who informed the FBI through the network system. As a result, Troy's ultimate fate can be imagined.

  Feng Xiaotian sensed the data stream following him and immediately retreated. The other party was only concerned with Troy and didn't notice him. Feng Xiaotian quietly logged onto the New York Times website, unloaded the counterattack program, and then exited the site.

  The current time has reached 1 o'clock in the morning, Feng Xiang Tian quit the internet and erased the invasion marks on the military computer. He sat silently in his chair, the previous hacking war made him feel a little introspective, adding a layer of protective psychology to him, also making him understand that sometimes doing good things can have bad consequences, no matter what the motivation is, the result is always tragic.

  Feng Xiao Tian thought for a moment, then suddenly burst out laughing. He muttered to himself: "What's wrong with me? This has nothing to do with me, even if there is a loss, it's the Americans' loss. Forget it, no need to think about it."

Recommended Popular Novels