What It’s Like Being a Vampire

Chapter 122 Private correspondence

Chapter 122 Private Letter

Xiang Kun knew that in the eyes of many people outside the industry, hackers were the most naughty programmers.

Generally, those with the title of "customer" are kings, and those with the title of "teacher" in the title of hacker, red guest, white guest and hacker are masters, and those with the title of "member" in the title of engineer and architect are all dicks...

But in fact, there is no difference between a top programmer and a top hacker, but their specialization and expertise are different. One is to find ways to meet and realize the requirements and build a system; One is for building construction, and the other is for security.

There is no complete boundary between the two. Hackers themselves are a subset of programmers, and programmers can turn into hackers at any time.

The direction of interest and specialization are different.

When Xiang Kun was in middle school, he was also obsessed with the handsome hackers in movies, TV dramas and novels. He fantasized that he would hack computers all over the world, hide behind the screen and control everything, and be the mastermind behind the scenes. Occasionally, I will hack a few websites with poor password settings and poor maintenance according to the tutorial, but I don’t actually do anything. I basically just walk around, take a peek, and leave a txt or jpg file to indicate that I have visited here. That's all, just a bad script kiddie.

Now Xiang Kun is no stranger to terminology such as sql injection, cross-site scripting, buffer overflow, heap spraying, etc., and knows the principles, but if he is asked to attack and invade a specific target, he does it for a while. less than. It is not only the difference in thinking habits, the understanding of many loopholes and the different application habits, but also the lack of other large accumulations, such as many spare bots, reserved backdoors, social engineering libraries of different levels, and special-purpose programs written by oneself or others. Tools, etc., cannot be done in a moment.

Of course, although top hackers are powerful, they are not omnipotent.

Just like when someone wants to enter your house, they usually don’t directly smash the door with a hammer, either pretending to be a courier, checking the water meter, collecting electricity bills, repairing the computer, delivering food… or just taking advantage of it. When you are away from home, or when you are sleeping, take advantage of the imperfect security and structural problems, sneak in through the window, unlock the master key to sneak in, and even follow you wretchedly when you come home from shopping, and You enter the house together.

Even if you don't open the door, they can pretend to be you, collect the courier for you at your door, and send courier and order takeaway in your name.

Unless you blow up all the roads outside your house (cut off the Internet), it is indeed quite a bad thing to be missed all the time.

But the premise of all this is that they know your real address (IP).

On the Internet, the most important information is the IP, which represents your location, and the mac address is your "name", just like someone finds out that you live in a certain hotel, you need to know your name to find you In which room, catch you.

The world is so big, if you don't interact with people, and there are no clues exposed, certain people may not be able to find you, because they don't know that you are the person they are looking for.

But Xiang Kun now wants to take the initiative to "send packages" to people who may be malicious to him and have the ability to track him, so he must be careful and be prepared.

The router in that coffee shop is like the doorman at the gate of a community who collects express mail on behalf of him. Xiang Kun asks him to deliver a package for him in the name of Xiao Ming. The uncle finds the postal brother (network service provider) and delivers the package to him. Here it is, the postman delivered the package to the errand boy A (one springboard) contacted by Xiang Kun as required, and the errand boy A handed the package to the errand boy B (two springboards) as required.

Brother B took the package and handed it to an errand brother alliance (TOR). The errand brother alliance packed the package outside and then handed it to brother C. Brother C only knew that the package was delivered to XX city, so he sent it to Later, in XX City, I found a younger brother D to take over, and the younger brother D tore open a layer of parcels, knowing that the next destination was XX Street, so he found a younger brother E near XX Street to take over.

The little brother E tore another layer of the package and sent it to the front desk of a company at No. XX (Zhihu server).

When the company's front desk opened the final package, there was no address of the sender on it, and they had to send the package back to the sender, so they had to hand it over to brother E.

Then little brother E looks for little brother D, and little brother D will give it to little brother C, and after returning all the way, he will hand it over to little brothers B and A, and send it to the postman. Take it away in the name of Xiao Ming.

So even if the company's front desk (Zhihu) is controlled by "villains" and beat the delivery brother E to death, the little brother E can't tell the sender's address, because he doesn't know it at all, he just Knowing that it was given to him by brother D.

Of course, this method is not completely safe and untraceable.

For example, there are informants of "villains" in the errand brother league, or the "wicked people" are ruthless, pay enough price and manpower, arrest and beat brother D, and then arrest brother C, and then know the little brother Brothers A and B were arrested and beaten, and tortured one by one.

For example, put a locator in the package that was sent back. If Xiang Kun opened the package, the locator would start to work.

For example, sending Xiang Kun a truckload of packages took him a lot of time to carry and gave them time to track down.

But in the end, even if they found out from the postman that the final destination was a certain community, they even found the doorman and learned that the person who sent the package was called Xiao Ming.

But their immediate reaction must be to search the entire community, looking for this guy named Xiao Ming.

After Xiang Kun, who was spying next to him, found out, he took off the mask on his face, destroyed all the packages (virtual machines), and retreated quickly.

Xiang Kun had heard before that when the police were investigating a malicious hacker attack, the deputy minister of the Ministry of Public Security personally supervised the investigation. In the middle of the night, the telecommunications operator's partitions pulled up the gates to determine the location of the attack, and then the engineer drove a car with protocol analysis equipment in a computer room. A computer room was connected to the detection, and the police uncle blocked the door of the suspect's house before dawn.

Although it was determined that the other party had nothing to do with the official, but Xiang Kun had always been used to thinking that the imaginary enemy was too powerful, and made a plan as if the other party could find his access IP.

When I was wondering if there was anything I hadn't considered, I replied to a private message from "August's Kasumi" on Zhihu.

"You are also a vampire? How do you prove it?"

Xiang Kun had already anticipated this question, and replied: "You can go hungry more during the day than at night. If you don't have blood to drink when you're hungry at night, you'll be prone to mania."

When he was thinking about answering, he thought about how to prove his identity as a vampire without revealing his identity. The less information about himself, the better.

It's as if he didn't say that he's bald, molts, changes teeth, etc., nor does he say that he becomes stronger and his eyesight improves. After all, he is not sure if other "vampires" have the same changes as him, at least the "giant owl" But no hair loss and baldness. Once he said that, it was likely to let the other party know that he was bald, and this is an obvious characteristic.

"August's kasumi" replied:

"Are you afraid of garlic?"

"I'm not afraid, but I can't eat it. Except for drinking water, I can vomit whatever I eat. I'm not afraid of crosses, nor are I afraid of Buddha statues."

"Wow! You are really a vampire! I finally found my kind, so happy!"

Xiang Kun looked at the screen indifferently, and sneered in his heart: pretend, keep pretending.

Then reply: "Yeah, I'm so excited too! I finally met the same kind!"

Kasumi in August: "Let's use QQ to chat. I'm afraid Zhihu's private message is not safe. Maybe the administrator can see our chat! What's your QQ number? I'll add you!"

Pikachuchu (Xiang Kun's newly registered ID): "What's your QQ number, I'll add you."

Kasumi in August: "424423****"

Xiang Kun just wrote down the QQ number in his mind, and didn't even search for it, let alone open QQ. After a while, he replied: "Oh, I forgot my QQ password, so I can't even try it." Come out, forget it, just say it in Zhihu’s private message, they probably don’t have time to peek at the content of our chat.”

Of course he knows the purpose of the other party to use QQ to chat. When chatting private messages on Zhihu, it is on the server of Zhihu. The other party has relatively few permissions, but when using QQ, it is easy to find the P2P method, and then Knowing the IP of the other party in the chat is equivalent to removing the company front desk when sending the package, and handing it directly to the other party, and the little brother E who delivered the package will be caught and beaten directly.

Of course, Xiang Kun used tor to open QQ to chat with him under a heavy disguise, and it was not so easy to find out his real IP. It's just that Xiang Kun didn't prepare a new QQ account temporarily, and he didn't bother to change the method.

After a while, Kasumi in August replied: "Why don't you add a WeChat, what is your WeChat ID? Don't tell me you can't remember your WeChat password again?"

Pikachu: "What's your WeChat ID?"

Kasumi in August: "Hey! Let me ask first!"

Pikachu Chuchu: "Forget it, I think we should talk about this first, how did you become a vampire? When did you find out?"

Kasumi in August: "Why are you not a gentleman at all? / Poor expression."

Pikachu Chuchu: "I'm not a gentleman, I'm not sure if you are the same kind."

Kasumi in August: "Not sure why you sent me a private message? Is my answer clear?"

Pikachu: "So how and when did you become a vampire?"

Kasumi in August: "There are many things I don't want to say in private messages, either add QQ, add WeChat, or call directly."

Pikachu: "What's your WeChat and phone number?"

Kasumi in August: "You are too defensive, you even bought a vest to send a private message? You keep asking me for information, but you don't tell me about your own situation? You have to know when I became Vampire, how did you become a vampire, you have to tell me about your situation first? / Anger expression."

Pikachu Chuchu: "You tell me first, and I'll tell you later."

After a while, Kasumi in August sent a sighing expression, and then replied:

"Well, I turned into a vampire a month ago. I don't know how it changed. It just happened when I woke up. What about you, who was your first food?"

Xiang Kun raised his brows. This reply revealed too much information, probably so much that the other party didn't realize it.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like