Full-text entertainment peak

Chapter 323 Invasion

Chapter 323 Invasion
ps: Catch bugs first and then catch them!
Heifeng's headquarters has long been a mess, and it is quite a bit of a chicken flying dog!

"Quick, quick! The helper over there! Clean up the traces of the No. 12 broiler chicken invasion!"

"22 groups have already been visited by the other party!"

"Then 23 groups, 24 groups! Clean up any group that has not been touched!"

"I'll look for it, I'll look for it... 24 uh... No. 20 six groups of broilers, I'll clean this up first."

"Over there! Don't watch the show! Come and help!"

"I... I'm in charge of news liaison, I don't know how to use computers..."

"Slot! We Heifeng actually have a scum who doesn't understand technology like you!"

"..."

The person in charge of Heifeng paced back and forth anxiously in the corridor, occasionally asking the little leader who specializes in organizing cyber attacks: "How is the situation?"

The little leader just gave up the last group of broilers as a springboard, and the whole person seems a little sluggish!
It wasn't until the person in charge backed him up that he panicked and said, "Someone has tracked down our 'root' server."

Although the person in charge has transformed and engaged in business in recent years, he still understands the basic technology.

Hearing the little leader's words, he immediately became furious: "What did you do? How did you get someone to touch the 'root' server?"

The little boss knew that this time he was kicking the iron plate, but the problem of exposing the "root" server was really serious.

I can only explain: "The other party's tracking speed is too fast. It's like there is a targeted script for each broiler. I was caught by several nodes before I could erase the traces of the invasion!"

He didn't know what kind of perversion he had encountered today!
More than [-] layers of springboards, the opponent's breakthrough is as relaxed and comfortable as drinking water.

Clearing up in advance across two or three floors can't keep up with the speed of the other party's tracking.

Even if the server has erased its traces in advance, the other party can always find a way to break through.

The hound with the most sensitive sense of smell can't catch up with him!

The little boss couldn't help but slander in his heart. Compared with the dog he attacked before, this guy who is now tracking him...

You are the real dog!

The person in charge said angrily: "Why don't you just give up a few more layers of springboards and prepare in advance?"

"I gave up, but I still can't get rid of the opponent's tracking!"

Speaking of this, the little leader suddenly felt blessed.

To be able to analyze layer after layer of broiler so quickly, he really can't think of any pervert in the world who can do it!

Not even the world's number one hacker.

Every server is different and it is impossible to deploy quickly with a unified script.

Command operations can only be performed by pure command line.

If it is a person who relies on pure command line operation, then the hand speed is simply insane.

Unless the other party is not a person at all? !
When this idea appeared in his mind, the more he thought about it, the more likely it became.

He hesitated to express his guess: "I suspect that the Internet Supervision Department should be real this time!"

The person in charge frowned: "Really?"

"You know, in the past, they only sent a technical tracking team, and it was a fool's dream for three or two people to find us."

The little leader pointed at the computer screen and said confidently: "In terms of tracking speed this time, it is impossible to achieve such a fast speed without the cooperation of a dozen people!"

The person in charge thought about it, and this possibility is indeed not small.

They have fought against the Internet Supervision Department not once or twice before.

After all, it is a national institution, and there are indeed experts in the class.

It can be used as an attacker and has an inherent advantage in ambush warfare.

So after fighting with people from the Internet Supervision Department several times, the other party has been unable to do anything about them.

Moreover, there are a lot of people in the Internet Supervision Department, but there are very few people who are responsible for tracking clues.

After all, to supervise the network situation of the entire China, most of the units operate by division of labor.

I want to unite various departments to work together, unless there is any special major action.

The person in charge, combined with the previous notice issued by the Supervision Department, believed this guess a bit in his heart!
However, the Supervision Department made such a big move, isn't that all because of the commission of this hapless agent?

If this person hadn't commissioned "Black Wind" to engage Wang Xingren, who was about to be promoted to Emperor Qu, how could it have caused such a big reaction from the Supervision Department?

His face changed quickly, he turned to stare at Yu Zhixin's manager, and said viciously: "It's all you! What are you doing to provoke a Qu Huang? You think your life is too long, don't you? If you want to die, don't die with us. what!"

"Blame me? Did I let you guys do it?"

When things had developed to this point, Yu Zhixin's manager had already broken the jar at the moment, and regardless of the number of people on the other side, he pointed to the nose of the person in charge and cursed, "I attacked on my own initiative, and it's coming, how strange it is. On my head?! Clean up the mess you made yourself! Why don't you accompany me!"

After speaking, turn around and walk to the door!
"You...you're fine!"

The person in charge stared at the back of Yu Zhixin's agent with gritted teeth, and roared, "When I succeed in getting out, you and that little star Yu Zhixin are waiting for our Heifeng's revenge!"

"..."

Yu Zhixin's agent was too lazy to deal with the "Black Wind" group of people, he just wanted to leave this place of right and wrong as soon as possible and find Yu Zhixin to think about whether there was a solution.

The person in charge turned around and said to the little boss with a painful face: "Clear all the connection data on the root server, and just give up!"

"Let... give up?"

If the expression of pain in the flesh is contagious, then the little boss has been successfully infected now. He said with a bitter face: "We spent a lot of time in order to obtain this authority! Now the firewall has been upgraded more than once. After giving up, it's impossible to get permission again!"

Being able to be the person in charge of the organization "Black Wind", although there is no moral lower limit, and you can treat customers twice, but you are still very decisive when it comes to self-protection.

He glanced at the surrounding members who were quietly waiting for his order, and said to himself with a gloomy face, "Let's lose the car and be handsome, it's better than being caught in one pot!"

……

Gao Shuang carefully studied the server of Huaxia University of Science and Technology. It has a three-layer firewall and is a linked passive defense module.

The first layer is the conventional access determination firewall.

The second layer is the "honeypot" defense layer.

The third layer should be the most difficult "key" layer to break through.

Gao Shuang didn't waste the more than 20 broilers that he swept all the way before.

After obtaining the authority, all of them have become the sharp weapon for him now.

At this moment, he uses these more than 20 broilers to try to send handshake requests to each open port of the server in a normal way without interruption.

The process of the handshake request is not complicated.

A simple program embedded in the broiler will send a fake ID serial number to the server.

Tell the server that the serial number area applied by itself is legal and needs to be checked.

The interface defense system will convert this serial number into an identifiable code to form a new comparison TCP segment and hand it over to the first-layer firewall for judgment.

After the firewall obtains the TCP segment, it will make a judgment, and whether the judgment is successful or not, it will give the broiler a response.

However, since the broiler's ID and address are forged, the server will never get feedback from the broiler.

The server will try to resend the ack request without feedback and drop the connection after waiting for a while!

During the waiting time, the server is always in a semi-connected state, which will occupy a certain amount of resources.

Gao Shuang's broilers, without exception, were all blocked by the access determination firewall on the first floor.

His operation is actually the most basic "DOS" flood attack.

It is impossible to find port vulnerabilities by this method, but the specific defense mode and strength can be inferred from the feedback speed of the server rejecting the handshake.

After all, the broiler only needs to send a handshake request, while the server needs to perform hundreds or even hundreds of times of operations.

It also includes retrieval comparisons that consume computing power.

The process of waiting for broiler feedback will occupy a certain amount of resources to maintain the semi-link state.

Flood attacks take advantage of this defect of the three-way handshake protocol, sending massive forged connection requests and consuming the resources of the target host.

Therefore, the other party cannot provide services for normal users.

As long as your server has networking capabilities, you cannot avoid this kind of attack, which is why "DOS" is called the simplest, crude, and effective attack method on the Internet.

However, the probing method of flood attack can only be regarded as a general probing method when used on a server at the level of HKUST.

The firepower continued to attack for 2 minutes, and the speed of handshake feedback did not decrease at all.

From this, Gao Shuang can basically determine that the firewall is composed of independent units with high-strength hardware layers.

The firewall itself has full-time optimized resources for dealing with flood attacks!
So even if there are a hundred times more broilers, it will not help.

However, his purpose is not to defeat this firewall, but to find a way to pass the verification.

Therefore, an independent firewall unit is more beneficial to him.

If you can't do it hard, just go around it!

This kind of firewall has a characteristic that it can prevent the outside but not the inside.

The main purpose is to thwart intrusions from external illegal links.

As long as you find a computer directly connected to the host server, you can completely ignore this powerful barrier!

If it is a server of another scientific research institution, trying to find a directly connected computer host is tantamount to looking for a needle in a haystack.

But this server belongs to Huaxia University of Science and Technology!

The campus network of the University of Science and Technology and the internal network of the laboratory are all directly connected, and no external verification is required.

With ideas, Gao Shuang quickly searched the campus forum of the University of Science and Technology.

In it, the IP addresses of several students were intercepted.

It didn't take much effort to get a student computer that was "for girls' own use" and "[-]% new".

With this springboard, he candidly enter the campus network.

Directly to the honeypot layer of the second layer of defense.

There are many types of honeypots, among which real system honeypots and camouflaged honeypots are the most common.

Real system honeypots run on real systems and are real loopholes, but behind these loopholes there are countless targeted traps.

The downside is that it makes the intruder clear!
But this type of honeypot has the most accurate and real records, and the fastest warning and counterattack speed.

The fake honeypot also runs on the real system, but the vulnerabilities and permissions that the intruder sees or gets are generally fake.

Both have their own advantages and disadvantages. If they are used in combination, a real system honeypot must be used to maintain multiple camouflaged honeypots, so as to strengthen the defense against intruders.

The keyboard sound lasted for four to five minutes and never stopped in the middle.

The tools are called out and run, and pieces of test code are sent to the mainframe of the University of Science and Technology.

The only real system honeypot was locked in no time!

The new intrusion operation began again, and Gao Shuang was ready to tear open an entrance in this extremely complicated honeypot and trap.

Time passed bit by bit, and as the keyboard sound became faster and faster, the corners of Gao Shuang's mouth slowly lifted.

After several tossing and killing, he successfully entered a very hidden system call location.

The place he took so much effort to get to has no defensive value at all in the eyes of Blue Star's security experts.

So the real system honeypot doesn't set "trap" here at all.

There have also been no reports of issues with this call on any security notices.

Because he is too borderline!

Just an auxiliary profile for desktop graphics programs and hardware processing device connections!
Even if it is completely deleted, it will make the desktop freeze at most.

It is generally possible to compare servers that pursue efficiency...

No desktop graphics system at all!
This is also the reason why the bloated, cumbersome, and inefficient windows on the planet have no market at all in the high-end server field!

From a computer security point of view, this invocation is almost non-destructive, aside from making people sick.

But Gao Shuang knew that there was a lot of mystery here!
He opens a folder on his computer.

Click on a program that draws a small stick icon.

Enter the path of the call on the pop-up program interface, and click the "Vulnerability Injection" button!
After doing this, he leaned back at leisure, waiting for the software to give the result of the vulnerability intrusion.

Watching the progress bar on the software progress unhurriedly, Gao Shuang also behaved very calmly.

If the added special software can successfully invade, not only can he directly break through the second honeypot layer.

Even the last "key" layer, which takes astronomical amounts of time to brute force cracking, can be skipped directly to gain super authority over the entire server!
Because the loophole he wants to target is really too low-level.

It can even be said to be a complete hardware level.

The closer you get to the hardware level, the closer computer science is to physics.

And physics does not have so many whims, it is a summary of the laws of the basis of reality!

So the computers of the two worlds have the smallest difference in this regard.

Again, the vulnerabilities are also the most similar!

Breaking through from the hardware level, the authority obtained has completely surpassed the so-called highest authority of the system!
Unless you unplug the network cable, as long as your server is connected to the network through electricity, the operating system can be deleted for you.

Back then, a well-known hacker group on earth used this vulnerability for a period of time.

They can directly issue commands to the computer's motherboard, modify the output power of the motherboard, and delete the self-protection mechanism.

At the most exaggerated time, it can even remotely burn your computer!
This unreasonable and barbaric invasion method has attracted the attention of many countries, and finally this organization disappeared with their intrusion technology inexplicably...

(End of this chapter)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like