Kevin Mitnick accepted the challenge and didn''t leave any words on the dark net. He began to work alone.
For him, if a person can turn over the whole security team, he will still be the top and most powerful hacker in the world.
No matter who he is, he will admire him, worship him and sing praises to him.
He is a legend in the hacker world.
But obviously, Kevin Mitnick underestimated the strength of Shimura. In particular, Xiacun Mian is not fighting alone, but has a complete team to serve him.
In particular, it is a combination of network and reality.
Therefore, soon, Shimura and others bypassed the layers of traps laid by Kevin Mitnick and finally got the real location of Kevin Mitnick.
As they guessed, the place where Kevin Mitnick lives is very unsatisfactory. It''s a cheap apartment. Obviously, Kevin Mitnick can''t afford a higher price apartment.
With the cooperation of the CIA and homeland security, they searched the apartment and soon caught Kevin Mitnick.
Of course, what they need is evidence, conclusive evidence.
Capture the evidence of Kevin Mitnick''s cybercrime.
Although Kevin Mitnick repeatedly provoked Xiacun Mian, he did not expose his real name, but used the well-known network pseudonym.
However, no matter how well known, the network pseudonym can not represent the legal identity after all.
On the Internet, you can call a paladin, and the next second you can call Satan.
So they have to catch the evidence in Kevin Mitnick''s computer.
That''s the only way to get stolen goods.
Otherwise, it will be difficult to convict him.
Basically speaking, this cybercrime needs to find evidence from the personal computer it uses.
Therefore, when searching, we should not only quickly avoid deleting the data in the computer in advance, but also find other evidence as much as possible to prove that it has collusion with the dark network.
Their goal is not Kevin Mitnick.
In fact, Kevin Mitnick is not important to them at all.
What they want is the core figure of the dark network behind it, as well as Q, which gathers many elite hackers. This is their goal.
Kevin Mitnick, they don''t care.
At least now Kevin Mitnick is not ranked in their hearts.
What hacker technology is the first person, now, it doesn''t matter at all.
What really matters is Q, who can catch many hacker elites. He is the most terrible.
Because he can snare everyone.
This is the most terrible.
The terrible thing is never technology, but people.
Not surprisingly, Kevin Mitnick was caught.
When he saw the CIA fall from the sky, he knew he was over, completely over.
The strength of the other party exceeded his imagination.
"I lost!" Kevin Mitnick looked at the long haired Xiacun Mian, bitter and astringent.
"Since you lost, let''s be honest." Xiacun Mian said, "our goal is not you. If you are willing to cooperate with us, I think you may be able to change your current identity and future destiny. "
This means to recruit.
But Zhaoan means a complete separation from his past identity, or even a betrayal.
Kevin Mitnick smiled coldly.
"I lost, but that doesn''t mean you can catch Q through me!" Kevin Mitnick said lightly, "do you really think you can catch q?"
On one side, CIA officials began to restart the black screen computer to see how much else was inside.
Just when they broke in, they saw that Kevin Mitnick was controlled by them just in time to turn off the power and deal with other things.
Xiacun Mian also pays close attention to the computer, and the information in it is the most critical.
Originally, it was normal to disassemble the hard disk and then obtain data.
But just now, they moved so fast that Kevin Mitnick didn''t have time to move and was controlled.
Therefore, if you restart now, you may be able to log in to the dark network.
After startup, it is a login window.
Password required.
"What is the password?" CIA officials immediately pressed questions.
Shimura Mian stopped CIA officials.
"This is a set of randomly changing passwords, which adopts the pigsty password encryption method. However, there are slight changes. But it''s not hard to crack. " Shimura Mian stared at the screen and said.
Kevin Mitnick sneered.
Shimura Mian and several network security experts who came together began to crack.
Soon, they cracked the encryption program.
This encryption program changes every minute.
In other words, the password will change naturally with the change of time. The key to unlock with this password is the time of the computer.
This encryption method is not very clever, but it is very clever.
Xiacun Mian looked at the time and entered the password for this time period.
Then, the computer displays success and is reading the system.
Everyone clenched their fists.
The crowd looked coldly at Kevin Mitnick. This time, they saw how he sophisticated.
But login is a little slow.
The Win98 reading screen has been waiting for a long time and is still stuck there.
This made people shake their heads.
This computer is really broken.
But looking at Kevin Mitnick''s environment, it''s not surprising that everyone is broken about his computer.
After all, this guy is so poor that he doesn''t have much money.
The computer breaks naturally. It''s not surprising that such a broken computer runs slowly.
So, for everyone, just wait.
But soon, Xiacun Mian felt wrong.
How could it take so long.
"No, come on, turn off the computer. This is not right! " Go down to the village and shout.
what do you mean?
"Come on, turn off the power. This may be deleting data!" Go down to the village and shout.
People were in a panic to find the power supply.
But just then, the computer showed that the startup was complete.
The interface of Windows 98 pops up normally.
They were stunned and then looked down at the village.
Is the power off now?
Shimura Mian sat in front of the computer.
It shows a very standard window 98 interface.
Everything is available. There is no problem.
Well, were you suspicious just now?
Subsequently, Shimura Mian entered the hard disk.
I found the hard disk empty.
His eyebrows immediately wrinkled.
After that, check all the drive letters. They are all empty.
All disks except the system disk are empty.
Deleted, deleted.
At present, Xiacun Mian turns off the computer, removes the hard disk and connects it to a special data repair device.
As a result, the whole hard disk is just like a new one. There''s no data in it.
Just now, when I just started, the hard disk seemed to be rewritten at least seven or eight times.
Such frequent erasure will destroy all the data.
No data left.
blamed.
They made a mistake.