Rule of law online: Police uncover hacker website truth

Source: Internet
Author: User
Keywords The hacker the truth this the rule of law

The intermediary transaction SEO diagnoses Taobao guest stationmaster buys the Cloud host technology Hall




Hacker website suspect











Hacker website











Hacker website








reporter Letter Yu camera Wang


Primer:





Reporter: Which school originally





Lin Yupeng: It's still on
.




Reporter: What professional do you study





Criminals: Learning e-commerce





journalist: e-commerce? Why did you come up with such a website at first?





Lin Yupeng: The largest Trojan horse base in the country.





September 6, 2007, Jiangxi Province Jiujiang Public Security Bureau's network surveillance detachment office suddenly became busy, responsible for the network patrol Police found a special website, he was the first time to inform the case of the detachment of the long Schien.





the same period: Jiujiang Public Security Bureau Network Supervision Detachment Long





the whole fight is www.heikeba.com.





text: Only from the site's domain name can make a preliminary inference, this is a hacker-related site. Police later found that the site involved more than just discussing hacker technology.





Period: Schien





found that it has a forum in the form of a registered member, there are VIP members, VIP members are monthly and package year, as long as you pay, about 298, become his (VIP) member, you can unrestricted look at his documents.





Text: The police began to monitor the site, although they still do not know what the VIP members of this site hidden what kind of content, but only from the home page on the ads can be seen some clues.





the same period: awareded Jiujiang Public Security Bureau Network Supervision Detachment Scout





at that time said that, is called free to impart hacker knowledge, the famous teacher builds the network hacker such some slogans.





subtitles: Dangerous road





caption: Zhejiang Hangzhou





footage of a cell phone shoot





Period:





hot and cold sour sweet want to eat





body: Several young people in the dining room are at a university in Hangzhou, the man named Lin Xiaolin (alias), just 20 years old is already a monthly income of more than 20,000 Yuan company boss. But no one knows, his next goal is to build a national largest Trojan horse base.





Period:





we're here to eat this one, Japanese Kandagawa, OK this program is over. Next time, welcome to watch again, thank you





Transitions:





title: Jiujiang
, Jiangxi Province




text: The police of the network monitoring detachment are studying the website called Hacker Bar carefully, but when they are ready to look inside the website, they find that only VIP members can sign in.





Period: Schien





His website is to leave some customer service number, 84484, the better five digits, and he contacted, he also did not reply, at that time we whispered, how to get?





text: In addition to this five-digit QQ number, this site does not have other contact methods. At this point, Schien thought of a person, perhaps he has the means to correct the site behind the people.





Text: Liu Yue Chuan, Jiujiang Public Security Bureau Network Monitoring Detachment of the Scout, is also recognized in the detachment of the network master. This time, Captain Schien to crack the hacker's mission to the Web site to him.





period: Liu Yue Chuan





accept this case should be said to be stressed, first of all, his site's homepage is the country's largest Trojan base, is to give people a feeling is that the site's technical maintenance personnel level should be very high.





text: Although Liu Yue still do not know his opponent is who, but he is very clear opponents must have mastered the computer programming technology hacker Master.





Period:





we felt at that time may be a, character more exaggerated, very personality is not the purpose of this economy, but to show his technical level, a friend (a person)





title: Jiujiang
, Jiangxi Province




text: This is Jiujiang a network company's engine room, the hacker bar website's server is erected here, Liu Yue Chuan and his colleague this row's goal is the website's server data complete copy down.





period: Liu Yue Chuan





get this data has two aspects of the role, one aspect of the case qualitative, played a key role, and another we want from his website data to find the site owners, the creator of some clues to maintain people.





text: Nearly 3 g of data is copied to Liu Yue Chuan's hard drive, he believes that the information of the site managers must be hidden in these hundreds of thousands of files, the next work will be wisdom and wisdom of the contest.





period: Liu Yue Chuan





We put this data back, sure to work in their own computer browsing, when we browse, installed antivirus software, non-stop alarm, non-stop alarm, we feel, this is not a general site.





Flower





Text: Antivirus software in the site file found a large number of viruses, the largest number of which are all kinds of trojan virus. The damage of this virus is not comparable to the common computer virus.





period: Liu Yue Chuan





first it has a very clear purpose, he is to steal some kind of information he usually manufacturers in order to spread the Trojan, will be in some sites, such as music down the site, image browsing site, the password mixed in the music picture culture, When this unsuspecting netizen downloads the music file to browse these pictures, it is the Trojan horse.





body: Once the Trojan is implanted in the computer, it has been in the monitoring state. The Trojan will be activated if the computer master performs the password input operation.





period: Liu Yue Chuan





this time to record his keyboard input, the mouse clicks a series of actions, in this way, the interception of your account and password, and then the information, sent to the Trojan maker's mailbox.





text: In a sense, Trojan virus is far more harmful than other types of computer viruses. It can be a direct tool for people with malicious to commit crimes.





cracked the VIP account, Liu Yue Chuan in hundreds of thousands of of the Web site files found a video footage.





Video:





Now I show you how to use Trojans to steal bank accounts, first generate Trojan programs, and then,,,,





Transitions:





period: Lin Xiaolin





I made this video is my own Trojan. Software has a description ah, in fact, it is not difficult. Trojan Words a look will, specific words, if you want to steal someone else's words, the Trojan to spread out.





text: Lin Xiaolin is the producer of this video, he frequented the beauty salon these days, and started to be a "successful person", and his friends began to call him "Lin Zong".





Mobile phone Video:





Lin, smile a





Flower





text: The Office of the Network Supervision Detachment, Liu Yue Chuan also nervously cracked the website password, he hoped to be able to discover the website administrator's information. But the Web site files up to hundreds of thousands of, at the same time a variety of virus files are constantly attacking his computer, cracking difficult to see general.





period: Liu Yue Chuan





found a large capacity, there may be more than 10 trillion log log, which recorded a lot of 100,000 items. In the inside to identify, at that time because the site is not what we do, on his file some of the meaning of the fields we are not very clear, we are only some test guessing methods to determine the meaning of some key fields.





text: In these Arabic letters and numbers in the file, Liu Yue found a landing information called Webmaster, experienced immediately he realized that tracking the file, it is likely to find information about webmaster.





period: Liu Yue Chuan





is administarter This directory, we think it is the site manager or the creator can access the directory, in our computer is said to be super privilege to be able to access, generally ordinary registered members are no way to access.





text: Two days passed, to this landing file cracked finally got a breakthrough. Liu Yue was overjoyed, but he was surprised when he saw the information that the landing documents eventually brought to him.





period: Liu Yue Chuan





is something that we can't think of happening, every record, it may have different places in the city.





text: This super permission login file hidden information shows that the site administrator's location in many large and medium-sized cities in China, the number of more than 15. What this means, Liu Yue chuan into meditation.





period: Liu Yue Chuan





We think is a very professional website, we speculate that this site is not a relatively large group, there are dedicated people to make Web site, dedicated people to carry out the site's customer service, dedicated to the maintenance of the site.





text: But the time is not long, Liu Yue found their own ideas must be wrong. In these documents he found the names of some of the world's largest cities, including New York, London and Paris, France. Is this all true? If not, what is the truth? Liu Yue was carefully studying every detail in the landing document, and soon he found the problem.





period: Liu Yue Chuan





we think that this data may have urban differences, for example, we do computer people know that the computer time zone, we China is 8 time zone, at this time there will be problems.





text: He found that the time that appeared in the international city of different logins, which had been converted by time zone, almost pointed to the same moment, meaning that at the same time there were several super privileged site managers landing in different cities of the world, which was clearly not logical.





period: Liu Yue Chuan





because the site maintenance personnel can not appear in the same time in different locations, even if there is not too much.





text: In Liu Yue Chuan seems to see the hope of success, the network supervision detachment suddenly received a report, a man at home, the bank card more than 20,000 yuan of cash was missing.





Flower





next section Notice





Trojan virus rampant users





Hacker website Mysterious Police uncover the truth





Next, please continue to watch the rule of Law online weekend Adventures: Dangerous Road





title





period: Liu Yue Chuan





This was roughly the case at the time, when he downloaded a music file in a Trojan horse. May have operated on the internet once, net Silver account number, he passed a period of time, then went to inquire this bank account number, found money all lost.





text: Now, although the police have no evidence to prove that the online bank account robbery and hacker bar site There is an inevitable link, but an obvious fact is that if the connivance of such a site to survive, similar cases will continue to occur.





Period: Schien





as long as the computer, boot is an account, your game is the password, e-mail is, the bank account number is, so many passwords in the inside, in fact, these passwords are you a lock. He's actually going to unlock the lock and take your stuff out. With the application of the Internet development, it's harm in a sense than the traditional general theft fraud ah harm I feel more.





text: Also at this time Liu Yue Chuan successfully cracked a part of the site's data, unlike previous ones, the data for the first time for the police identified a reliable location.





period: Liu Yue Chuan





extracts the relevant records of the latest website, finally this data is more accurate to a point, then this time, we through analysis, we think, not only the site's producers, including his customer service, as well as what the so-called VIP fees here, these people should be in Hangzhou, and all in one place.





scene: Police rushed to Hangzhou





text: September 13, 2007, the capture team came to a residential district in Hangzhou West L. District Rental housing, when they walked into the house, the inside of the three young people seem a bit overwhelmed, one of them is for the hacker Bar website VIP members to provide technical support, Another person said that we are all working for others, the real boss is not.





Period:





He said I was working, the boss in the next to do a mask, take us to the past, just he is in the mask bed really do mask, in this case we captured the principal culprit.





Text: At this point, the suspect Lin Xiaolin ended his fantastic hacker path. The law will not tolerate any destruction or theft, even if it comes from some seemingly superb wisdom.





subtitles: No. 295 of the criminal law of the People's Republic of China provides for the teaching of the method of criminal imprisonment, criminal detention or control, for a period of less than five years;





lasted half a month, Jiujiang police cracked China's first use of the Internet to disseminate the crime method case, the case is being further trial.





Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.