After staying in the hotel for three days, Zhou Zheng didn't find any news, which made Jiang Le impatient.

It's not a thing to stay passively all the time. He can't hide in the hotel all his life, so Jiang Le had the idea of taking the initiative.

Since the other party doesn't show up for a long time, I'll use my own means to find him out.

Although the dark network is not a national network, the security level of the server is one of the highest in the world. Even expert hackers are difficult to hack into the dark network.

Originally, Jiang Le didn't intend to waste the exploration point to buy a hacker's ability, but now it seems that in order to solve the trouble once and for all, he can only choose to use the exploration point where he should use it.

[host]: Jiang Le

[mall level]: 5 (1%)

[exploration point]: 523

The daily defense of the dark net is very strong, because most of the people from this place are people walking in the gray area. They pay the most attention to privacy. Many hackers are employed to maintain the daily defense of the dark net to prevent people from hacking into and querying background information.

Since Jiang Le plans to hack into the dark network, he naturally has to make the most complete preparations to avoid embarrassment when the hackers behind the dark network find his IP address instead of hacking into the dark network.

[exploration point: 300] (hacker God SSS) you will have the most comprehensive computer knowledge and the most powerful computer control ability in the world, update and progress in real time, and become the first person in the hacker field forever.

[exploration point: 100] (IPA defense laptop) this computer has a 7-level firewall function. At the same time, IP is stationed in 189 countries and 78901 cities around the world, which greatly reduces the possibility that others can find your IP.

As the saying goes, if you want to do a good job, you must first sharpen your tools. Even if an ordinary computer is controlled by a hacker, the risk of being inversely queried by others to the IP address is also very large.

The confrontation between hackers and hackers is no less than a war, so the picture of casually building a civilian computer and then slapping on the keyboard is purely misleading to the audience.

After Jiang Le got his first SSS level skill, a lot of computer knowledge suddenly appeared in his mind. At the same time, it also included how to hack into other people's computers remotely, query other people's computer information and so on.

Without saying a word, Jiang Le directly opened the IPA computer he just bought. Through a series of complex steps, he climbed over the wall and entered the dark network with no specific website, the most mysterious website in the world.

The style of dark net is white words with white frame on a black background. In addition, there is no third color. It looks serious and silent at a glance.

It is such a simple website, but it has the most comprehensive information content in the world. Here, some people sell female slaves, some sell cruel goods, and some place a reward list. You can see almost all the darkness and blood in the world here.

But at present, Jiang Le didn't care about these things. He directly clicked into the page of the reward list and saw the reward list set as the top at a glance, which offered 30 million yuan to catch himself.

Click in to have a look. At present, there are still only two receivers, which makes Jiang Le one of them loose, so there is no need to catch too many targets.

The ID of the person who placed the $30 million reward list is called 'voodoo flamen', which means voodoo sacrifice.

Click his ID to enter his home page. There is a blank, and there is nothing about his personal data. This is also the normal situation of dark net users.

If you want to query the IP address of the receiver, you must start from the next person's account. Jiang Le downloads some garbled software from a private website. The software of this website is specially used by hackers, and ordinary people will not use it. You must first crack the garbled interference problem attached to the software.

When everything is ready, Jiang Le starts to invade the next single account, and each user account of the dark network corresponds to the background of the website, that is, from this second, the fight between Jiang Le and the behind the scenes hackers of the dark network officially began.

……

When there was a slight fluctuation in the firewall detection program in the background, three middle-aged people in Chicago were playing CS. They all lit up, quit the game and went to their own special computer host to check it.

They are the defenders of the dark net. They are all hackers before this, and they are the world's top hackers.

After these three people joined the maintenance of the dark network, no one dared to hack into the dark network for many years. Today, they met someone to take the initiative to challenge, which ignited their fighting spirit in an instant. In that case, let's fight with this bold hacker.

Firewall is the first wall of any server. When the conqueror breaks through this wall, the subsequent hacking work will become very easy, so it is very important to guard the firewall.

Jiang Le relies on the ability of the "God of hackers" to constantly crack the firewall. The dark network is worthy of being the largest website in the gray world. There are hundreds of firewalls alone. It is really impossible to crack them all in a short time.