DISPLAY REPORT

TRACKING SUCCESS:

QUERY: KATLYEN HICKS

BRUTE FORCE LOCKOUT:

TIME LOCKOUT: MS


Several months ago, your loved one Katlyen Hicks went missing. You have connections do several deep and dark web users. They have informed you that they ave seen websites known for human trafficing that have posted advertisements with her picture. These websites are only accessible by using the T.O.R network. A network designed to mask origins of internet conections to keep communications hidden. Like any system, it has its weak points. These dark web user friends of yours have taught you secrets of the trade of computer hacking and tracking. You have now build a tool to help you narrorw down the source of these website owners. The T.O.R. network masks its users by bouncing their signals all accross the globe so much so that they are almost impossible to track. You however are able to track the different network nodes and find the roots of the signals. Your tool will allow you select IP addresses and determine if it is an actual node being used. This tool will let you know how accurate your choice is so you can accuratly make a new selection. You only have so long before you are lockout out of the system's vulnerabilities. Use this toime appropriately, you will need to lock onto several signals to find rthe capture of your loved one.

IP ADDRESS ACTIVE HOST_NAME MACHINE_TYPE LAST_RESPONCE SYSTEM_LOCATION

ATTEMPTS SHARED CHARS