Hk273 Raphael's Fatal Mistake! (7/42)
Twelve official security expert teams and twenty-seven reserve expert teams from the International Intelligence Bureau of the Ministry of Foreign Affairs are on the core server of the Tokyo Metropolitan Self-Defense Force, fighting against the best defenses, and ambitiously trying to capture Mr. M.
But they didn't know that this was a trap set by Shi Lei!
The defense mechanism of the best defense is very simple, only two most basic things, refusal and deletion.
Intrusion through ports, or disguised normal access, will be rejected directly; Trojan horses, viruses, malicious data packets, and junk data packets will be deleted directly.
This method of defense is simple, but very useful. [
The simple way is the truth, the simpler the way, the less computer resources are occupied, the faster the response speed, and the higher the ability to load pressure!
To give a simple example, there are three main ways to judge whether an unknown file is a virus or not in the current mainstream antivirus software on the market.
The first is the most common, and also the signature structure judgment that all antivirus software has. Major security vendors, from the deployment of a large number of honeypot systems, captured virus samples, analyzed virus signatures, and established a huge virus signature database. When a suspicious file is found, it first analyzes the structure of the unknown file, including a series of unpacking technologies, etc., to obtain the signature of the unknown file, and compare it with the virus signature of the virus database to confirm whether it is a virus file.
In this way, there is still a very popular cloud security in later generations, which is actually the signature code of the unknown file uploaded by the antivirus software, and the virus signature database on the server side. Compare whether it is a virus. It is still just a comparison of the most basic and common signatures, and the hype has become cloud security. Brag about something fooling people!
The second method is the genetic code, which is an upgrade system of the feature code, which is actually a feature code. Each signature can only correspond to one virus, but one gene code can correspond to one gene series virus.
Although it is the same as the character of the signature code, the genetic code effectively reduces the data volume of the virus signature database.
The third method is called heuristic, and the principle of this method is somewhat related to the best defense. It judges whether a file is a virus program by comparing the difference between an unknown file and a normal program.
There are two ways of heuristic, one is dynamic heuristic. One is static heuristic. Static heuristic is to understand the real motivation of an unknown program by decompiling the static code instruction sequence to determine whether it is a virus or not.
Dynamic heuristic is the sandbox technology. Create a sandbox environment through anti-virus software, let unknown files run in the sandbox, and check what behavior the unknown program will do, so as to determine whether it is a virus or not.
Dynamic heuristics have a big disadvantage. Establishing a sandbox environment will consume a lot of system resources, resulting in a lack of computer system resources, resulting in lag and lag in normal operations.
Kaspersky has done a good job in this field. It has the best anti-virus effect, but just like its name, it is not known as the 'kaspersky machine'!
from the above three ways. No matter which method is used, a lot of work must be done to determine whether an unknown file is a virus program or not. Doing a lot of work will take up a lot of system resources, in terms of pu computing resources. Memory storage resources, or other system resources.
Takes up a lot of system resources. The load capacity of the computer equipment is poor, and if it is a little more serious, the computer equipment will freeze or even freeze!
And try your best to determine whether the unknown file is a virus, only one step!
Just make sure it's a protected file!
If not, delete it directly, no more operations are required, and the pressure on the system is greatly reduced.
Therefore, facing the thirty-ninth group, the security experts of the International Intelligence Bureau of the Ministry of Foreign Affairs did their best to defend themselves!
The official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, after Shi Lei's inspection, based on the No. 1 server, combined with the supercomputer Yan and the No. 3 server to form a cluster server to jointly attack the official website web server.
Since the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs adopts Microsoft's s server and uses sp technology to build, Shi Lei has a very deep understanding of Microsoft's system! [
Controlling the supercomputer Yan, without raising any alarms, Shi Lei gained low-level access to the web server. Then, on the basis of low-level permissions, slowly increase permissions.
Obtaining low-level privileges first, and then escalating privileges, is sometimes safer than acquiring super privileges in one step. Especially the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs. When Shi Lei scanned it just now, he found an alarm mechanism connected to the internal LAN, and it was controlled separately. It was difficult to remove it.
The International Intelligence Bureau of the Ministry of Foreign Affairs, as the largest intelligence agency in Woosang, belongs to the internal network, and only a few nodes have links to the external Internet.
A connection to a web server is a node.
However, when Shi Lei obtained super permission, he finally discovered a big problem!
‘Damn, it’s actually one-way data! ' Shi Lei snorted coldly in his heart.
The so-called one-way data is a derivative of the one-way link web page technology. If the web server of the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs is regarded as, the internal data server of the International Intelligence Bureau of the Ministry of Foreign Affairs is regarded as b.
One-way data is all cases where b can access, transmit data to, and browse, but cannot transmit data to b, nor browse b.
Even if it is a data service request, it can only be kept and stored, and it will be accessed and read by b, and then the corresponding data request will be replied.
If it is an ordinary hacker, there is no way to meet this one-way data. After all, the web server cannot send any data to the internal server b, and can only be probed by the server b independently.
However, Shi Lei is the world's top hacker. Even one-way data can block many people, but Shi Lei is definitely not among the people blocked!
Shi Lei entered more than a hundred lines of code directly into the web server. Then select Execute Code.
These more than one hundred lines of execution code are more than ten data requests in total. These data requests will cause a memory overflow, causing the International Intelligence Bureau of the Ministry of Foreign Affairs and the data server of the internal LAN to be suspended in an instant.
At the moment when the service is suspended, the one-way data restriction is naturally lifted, and two-way data communication is restored.
This time process is very short, because the memory of the data server is different from that of a general personal computer. Instead, e-memory has error checking and correction functions.
After the memory data overflows, the e-memory will automatically correct errors. Shi Lei must enter the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs before the e-memory is restored.
Shi Lei owns the supercomputer Yan, which is also connected to the No. 3 server of Pukong, through the special cluster system of the No. 1 server. The two supercomputing resources were gathered together and quickly invaded the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Entering the International Intelligence Bureau of the Ministry of Foreign Affairs, Shi Lei did not act rashly or attempt to tamper with the data, but implanted the backdoor program written in advance into the bottom layer of the system of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Since last time. For the permission of the robot program, Shi Lei once entered the International Intelligence Bureau of the Ministry of Foreign Affairs, and clearly knew the server situation of the International Intelligence Bureau of the Ministry of Foreign Affairs.
Therefore, the backdoor program Shi Lei wrote this time uses assembly language. It sinks directly into the bottom layer of the system, very hidden and inconspicuous. It is convenient to enter the International Intelligence Bureau of the Ministry of Foreign Affairs next time.
After dealing with the backdoor procedure, Shi Lei was going to check with the International Intelligence Bureau of the Ministry of Foreign Affairs, the top-secret database of the intelligence department, to see if they had any information they needed.
However, just when Shi Lei was about to check the top-secret database, the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs was attacked again! [
It would be fine if it was just an attack, but that idiot hacker actually forcibly attacked the web server without any cover up of his actions.
Not only that, the new hacker, after obtaining low-level authority, actually tampered with the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, and made a public message to provoke!
‘Mr. M, aren’t you so arrogant? Why was it besieged by the International Intelligence Bureau of the Ministry of Foreign Affairs? The great Raphael is waiting for you here, dare you come? 'Raphael
Seeing this message, Shi Lei almost vomited blood!
What is the enemy's road narrow, what is self-defeating, at this moment!
Raphael thought that Mr. M's vest of Shi Lei was under a collective siege by the International Intelligence Bureau of the Ministry of Foreign Affairs of the Tokyo Metropolitan Self-Defense Force. Taking advantage of this opportunity, Raphael showed off his power, hacked the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, and left a language that humiliated Mr. M.
Unexpectedly, it was self-defeating and caused an alert from the International Intelligence Bureau of the Ministry of Foreign Affairs, the web server, and alerted the experts of the International Intelligence Bureau of the Ministry of Foreign Affairs, and they would definitely return to their nest.
In this way, Shi Lei's intrusion into the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs will definitely be exposed.
Annoyed, Shi Lei quickly returned to the web server, found Raphael's connection p address record, prepared to save this record, and then left it in the web server, and asked the International Intelligence Bureau of the Ministry of Foreign Affairs to deal with Raphael.
However, that bitch Raphael deserves to be a top-level hacker in the world. He actually has the same idea as Shi Lei, and is already copying Shi Lei's connection p address record!
'Raphael of the dog day, you forced me! 'Shi Lei was annoyed and did not alert Raphael. Instead, he found top-secret information from the intelligence department in the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs. and copy operations.
Then change the connection p address to Raphael's connection p address!
On the web server side, Shi Lei pretended not to notice Raphael's actions, and asked Raphael to connect his temporary broiler to the p-address and reserve it in the system records.
Raphael thought that he was doing a good job and was not discovered by Shi Lei.
It's just that Raphael made a fatal mistake!
(To be continued. If you like this work, you are welcome to come to the starting point () to vote, monthly pass, your support is my biggest motivation.)
ps: Please subscribe to "Hacker" within 24 hours to give Shanshan positive energy! This month's update method, 3 updates on a single day, 4 updates on a double day, the old rules are 0:00, 12:00, 16:00, 20:00. Please everyone! Let Hackers go further! [Thanks for the reward] Lonely Xi Fan, Reminder Star Shower 1, reward 588 friends 0402, top secret flight, eternlty, reward 100