Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in hlnovel.com -> Historic -> battlefield contractors

Chapter 2815 Cybercrime

Previous page        Return to Catalog        Next page

    Tang Kun stepped forward, stretched out his hand to Mr. K and said, "Can I see your tracker?"

    "Of course, this is the latest equipment. A very tiny chip, implanted under the skin, transmitting signals through satellites. There are currently very few devices that can detect it." Mr. K handed the box to Tang Kundao, "It is very safe."

    Tang Kun took it, but without even looking at it, he flattened the small metal box and placed it on the table.

    "I only know the safest way that will not be detected, and that is to bring nothing." Tang Kun said slowly, "Any device that can emit wireless signals may be detected. And once it is detected  At this point, our lives are at risk and there is no chance of success in this mission. Therefore, I will refuse to carry any form of tracker."

    "But if you don't have this, how can we lock your position?" Mr. K frowned.  "You can't enter the Pioneer organization and we know nothing about your location, right? We don't need a tracker, so what should we do next?"

    "There will always be a way, but our first priority right now is to sneak in. We are wearing trackers, so we may not even be able to sneak in. I know the CIA's equipment is very good, but the secret society's countermeasures may not be worse than yours.  . If we want to sneak in safely, we have to be clean." Tang Kun said slowly.

    Mr. K looked at the crushed metal box, turned to Tang Kun and said with some confusion, "Who are you? Are you instructing us on what to do?"

    "This is Mr. Tang." Lin Rui said, "We are looking for a personal security consultant for Cobain. All his opinions represent our opinions."

    Mr. K frowned and said, "There is no tracker or communication equipment. If you have found their lair, how can you send the information out?"

    "This is our business." Cobain shrugged, "We are different from you, but we each have our own methods."

    Mr. K said helplessly, "Okay. Since you insist, let's do what you want." He took out a card from his pocket, "This is the admission ticket. The location of the Extreme Hacker Summit is written on the card.  Yes, there is a QR code on it. You must pass a specified camera within the specified time and scan the code to verify your identity before you can enter."

    Cobain took it and looked at it, then suddenly shook his head and said, "This is not a standard QR code. This special QR code uses another algorithm and becomes an independent system. Its function is to deceive you.  These amateurs."

    "What do you mean? This was obtained by our technical staff after cracking the invitation puzzle." Mr. K frowned.

    "The Extreme Hacker Summit is like this. Once every two years, the organizers will release a series of coding puzzles. As an invitation, only those who successfully crack it can enter the summit." Cobain looked at him and said, "But it is full of  There are all kinds of traps. People who are not specialized in the hacking industry can easily make mistakes. This card is an example. If we really take this card and scan the code to go to the appointment, we can get in, and there will indeed be a party, but there will be a party.  They are all peripheral people, worthless and not the real summit site.¡±

    "How could it be? This is information that several of our technical experts spent two days deciphering." Mr. K frowned.

    "I have said that your technical staff may be very skilled, but they are not professional hackers and do not understand some conventional hacking rules." Cobain shook his head and said, "There are also some unwritten rules in the hacker world, which are difficult for outsiders to  Got it. Using this rule, the card actually contains an additional layer of puzzle.

    This special QR code has a corresponding relationship with the address above. If you unravel them all according to this rule and then reorganize them in order, you will get another set of brand-new codes.  This method is figuratively called gold mining.  The final result is the real ticket.  This card is actually just a cover and will lead you astray.  "

    "Is thisreally like this?" Mr. K frowned.

    "Do you think the Extreme Hacker Summit has been held for several years and no one noticed what happened? It's not because ordinary people can't think to the next level, but because they don't understand the deeper rules of the hacker world." Cobain nodded.  He said, "Give me a computer with decent performance, scanning equipment, a pot of strong coffee, and a pack of cigarettes. I think I can solve their hidden puzzles in one night."

    Mr. K said somewhat suspiciously, "Are you really sure that there is another layer of mystery in this?"

    "If it's a fake, prepare what I want and give me one night. You can get the address you want tomorrow." Cobain smiled.

    Cobain wasn¡¯t lying. In fact, he didn¡¯t even have a whole night to do it.??Deciphered the hidden information on the card.  This is a simple set of code that, after reorganization, results in a URL.

    Cobain whistled, "Found it."

    "It's so complicated. Is it a dark web address?" Lin Rui frowned.

    Cobain tapped on the computer and smiled slightly, "No, it's not that easy to get a real ticket. This is the last test. The target is Vodafone, one of the British mobile operators and currently the largest mobile operator in the world.  . I had to bypass their security, hack into a group of servers they designated, and get the real ticket."

    "Actually, this is already a crime." Mr. K frowned.

    "Yes, if you want to enter the real hacker summit, you must first prove that you have sufficient cybercriminal capabilities. Welcome to the world of hackers." Cobain taunted while typing on the keyboard.  After an intense operation that lasted for more than two hours, Cobain completed the invasion and obtained a set of codes.  "This is the final ticket. Only those who get this set of codes are qualified to become the top."

    "What is this? This is not even an address. How can it be a ticket?" Mr. K frowned.

    "This is a rented safe at the Bank of England. We can get the key based on the information and then use this set of passwords to open it." Cobain nodded, "What's inside is the real summit address."

    "What, this extreme hacker summit is not in the United States or Russia, but in the United Kingdom?" Mr. K said in surprise.

    "I'm afraid so." Cobain nodded, "I think we have to go to England. If we really follow your previous card, it will be really counterproductive."

    "Damn it, I didn't expect you hackers to have so many tricks." Lin Rui said with a bitter smile.  But he also knew that, taking Cobain as an example, the people who could hang out in this circle were all truly smart minds.  Not only are these hackers smart and bold, they also despise authority.  This also makes them a hot target for cyber terrorists.

    If you like battlefield contractors, please collect them: battlefield contractors are updated the fastest.  (Remember the website address: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report