Chapter 174: Close combat is the romance of men
Xiao Yu knows computers?
Can the system ask the ‘Red Hacker Expert’ to find out?
Why not use it at the beginning?
Xiao Yu didn’t expect the killer group to be so cunning.
You know, it’s too difficult to break into a dark web.
It can’t be done in a short time.
The system only gives 15 days.
How could Xiao Yu waste time on such a place?
As a result, the killer’s cunning and caution exceeded his imagination.
He could only use this most straightforward and violent method to forcibly break the dark web and find the killer group along the dark web.
How to find it?
As long as you log in to the dark web, even through certain methods and certain software, you will leave traces on the dark web.
But I can’t guarantee whether the killer group uses some more secret means to log in to the dark web...
So what is the dark web?
To put it bluntly, it is a branch of the ‘deep web’.
The working principle is that on the way that user A visits website B.
It must pass through a series of intermediate nodes for encrypted transmission.
Finally, the content of website B will be returned to user A.
In this way, it becomes extremely difficult to track and trace the source853...
The characteristics of the dark web are very obvious.
Simple access, strong anonymity, difficult to monitor, and extremely harmful, it is a hotbed of criminal activities.
To put it in a more terrifying way.
It can even become a necessary tool for certain countries.
Gaming, infiltration, subversion, etc.
Some special personnel such as agents and spies are very good at using the dark web...
...
In a building.
Xiao Yu is sitting in front of a computer.
There are four young men sitting around, dressed strangely, like otakus, students, trolls, and spirited guys.
These four young men are all serious network security personnel and computer experts.
Wang Dong dispatched them from the headquarters overnight.
There is a kind of harm that does not see blood but is fatal, that is, computers, networks, and hackers...
No, the four young men are all red hackers!
However, the way they look at Xiao Yu now seems to be looking at a god.
Ten minutes ago, Xiao Yu "showed" his network and computer skills in front of them.
To be honest.
It's not that Xiao Yu wants to cheat and bully them.
But the four (acad) youths are all computer experts.
How can you command them if you don't subdue them?
Wang Dong was also subdued.
The way he looked at Xiao Yu now was just like when they first met.
It was like looking at a monster.
In fact, in his eyes, the little brother was already a monster.
Terrifying IQ, terrifying reasoning ability...
Wang Dong knew himself.
In terms of pure brains, ten of him tied together would not be enough for Xiao Yu to press to the ground and rub.
But...
Such a monster not only knows hypnosis, but he also knows network technology?
The four experts in the network security department were all impressed.
You technology geeks, don't you understand the feelings of ordinary people like us?
Facing Xiao Yu, Wang Dong felt that he had come to this world just to make up the numbers.
Although I don't know what the IQ of the little brother is.
But one thing is certain.
Xiao Yu is the monster!
...
"Let's take down this dark web together!"
Xiao Yu glanced at the four young men around him.
"This..." The young men looked constipated.
Can the dark web be hacked and destroyed?
The answer is yes.
The dark web is not unattackable.
But its identity is hidden.
Therefore, it is difficult to know who the founder is, and it is difficult to arrest them.
Assuming that one is destroyed and the founder is not caught, he is the dark web manager.
Another new dark web will soon come out...
For example, in 2003, the world's largest dark web, Silk Road, was destroyed.
A few months later, Silk Road 2.0 appeared...
Fortunately, the police were lurking in the dark web.
A year later, the founder of Silk Road was arrested.
Although there are many crimes hidden under the dark web.
For example, the dark web torture room mentioned in the dark web red house, such a cruel existence is a fact.
But there is no good way to fight it at present...
Really no way?
Xiao Yu doesn't think so.
Through the four network computer experts around him.
He has roughly deduced that his system can be a "red hacker expert" and at what level.
To make an analogy, Xiao Yu said that his computer network technology is the best.
There should not be many people in this world who dare to claim to be the best in front of him...
"Remember, I don't want any founder, I want that server."
Xiao Yu put his hands on the keyboard, "It is the trace information of all dark web users on this server, do you understand?"
"Understand!"
The four young men nodded heavily and breathed a sigh of relief.
It's not to catch the founder, just to find the server, that's much simpler.
For example, dark web servers are generally ‘virtual hosts’, ‘cloud hosts’, ‘cloud servers’, ‘external servers’, etc.
Renting is cheap, convenient and safe, and it is very convenient to build dark web services.
Disadvantages: The privacy is not as high as the security of setting up a dark web server by an individual, and it is easy to be exposed.
Advantages: Because it is not a personal host, even if the server is exposed, it is difficult to catch it.
As for the dark web server set up by a personal host, the security is high.
But once you are crawled along the network cable... you are gone!
...
For a whole week.
Xiao Yu and the four young men ate, drank, defecated and urinated in the same room.
To exaggerate, I don't know how many pieces of the keyboard were broken.
Until the eighth day.
"Found it!"
Staring with bloodshot eyes, Xiao Yu breathed a sigh of relief.
How did you find the dark web server?
Passive attack technology!
It means analyzing and comparing the data flow in the dark web without interfering with the dark web communication process.
Infer the topological relationship between each node in the dark web...
But it is such a seemingly simple, yet extremely complex attack technology that conquers the dark web.
It took a cheating traverser and four computer experts more than seven days.
This is the terrifying dark web!
"The rest is up to you!"
Letting go of the keyboard, Xiao Yu looked at Wang Dong.
After saying this, he fell asleep.
This sleep lasted a whole day and night.
When he woke up, Wang Dong stood in front of him and handed him a USB flash drive.
"Ha."
Xiao Yu smiled and stood up, looking at the USB flash drive in his hand.
It's time for the killer brother to play close combat.
Because close combat is the romance of men! .
window._taboola = window._taboola || ; _taboola.push({ mode: 'thumbs-feed-01', container: 'taboola-below-article-thumbnail---300x250', placement: 'Below article thumbnail - 300x250', target_type: 'mix' });












