HacKer

Chapter 273: Rafael's fatal error! (7/42)

Twelve official security experts from the International Intelligence Agency of the Ministry of Foreign Affairs, and twenty-seven preparatory expert teams, are at the core server of the Tokyo Self-Defense Forces, entangled with endless defenses, and ambitious to arrest Mr. M.

But they don't know, this is the trap set by Shi Lei!

The defense mechanism of endless defense is very simple, only the two basic things, rejection and deletion.

If the port is intruded or masqueraded as normal access, it will be rejected directly; Trojans, viruses, malicious packets, and garbage packets will be deleted directly.

This type of defense is simple, but it works well.

Avenue to Jane is the reason. The simpler the way, the less resources are occupied by the computer, the faster the response, the higher the ability to load pressure!

To give a simple example, the current mainstream anti-virus software on the market, there are three main ways to determine whether an unknown file is a virus.

The first is the most common, and is also the signature structure judgment of all anti-virus software. Major security vendors, from the large number of honeypot systems deployed, captured virus samples, analyzed the signature of the virus, and then built a huge database of virus signatures. When suspicious files are found, first analyze the unknown file structure, including a series of shelling techniques, etc., obtain the signature of the unknown file, and compare it with the virus signature of the virus database to confirm whether it is a virus file.

In this way, there is a very hot cloud security in later generations. In fact, it is the signature code of the anti-virus software to upload unknown files. In the server-side virus signature database, it is compared with whether it is a virus. It is still only one of the most basic and most common feature code comparisons. What kind of cloud security is hype, boasting something that fools people!

The second way is the genetic code, which is the upgrade system of the signature, which is actually the signature. Each signature can only correspond to one virus, but one gene code can correspond to one gene series virus.

Although the nature of the signature code, the gene code effectively reduces the amount of data in the virus signature database.

The third way is called enlightenment. The principle of this approach is somewhat related to endless defense. It compares the difference between an unknown file and a normal program to determine if a file is a virus program.

There are two ways to inspire, one for dynamic inspiration and one for static inspiration. Static inspiration is to determine whether a virus is a virus by decompiling a sequence of static code instructions to understand the true motive of an unknown program.

Dynamic inspiration is the sandbox technology, which builds a sandbox environment through anti-virus software, lets unknown files run in the sandbox, and sees what the unknown program will do to determine if it is a virus.

Dynamic enlightenment has a big disadvantage. Establishing a sandbox environment consumes a lot of system resources, resulting in a lack of computer system resources, causing hysteresis and stagnation in normal operations.

Kaspersky is doing very well in this field, and it has the best anti-virus effect, but like its name, it is called ‘card bursting crash!’

From the above three ways, it is indicated that no matter which way, a lot of work is done to determine whether an unknown file is a virus program. Doing a lot of work will take up a lot of system resources, whether it is CPU computing resources, memory storage resources, or other system resources.

Occupy a lot of system resources, resulting in poor load capacity of computer equipment, a little more serious, it will make computer equipment stuck, or even crash!

And endless defense determines if an unknown file is a virus, only one step!

Just need to determine if it is a protected file!

If not, delete it directly, no more operations are required, and the pressure on the system is much reduced.

Therefore, in the face of thirty-nine groups, the security experts of the International Intelligence Bureau of the Ministry of Foreign Affairs, the endless defense topped down!

After the inspection of Shi Lei, the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, based on the No. 1 server, combined with Supercomputer Yan and the No. 3 server, formed a cluster server to jointly attack the official website web server.

Because the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs has adopted Microsoft's IIS server and built with asp.net technology, Shi Lei has a deep understanding of Microsoft's system.

Controlling the super computer swallow, did not trigger any alarm, Shi Lei obtained the low-level permissions of the web server. Then slowly increase the permissions based on the low-level permissions.

Get low-level permissions first, then upgrade the rights, get super-privilege directly than one step, and be safer at some point. In particular, the web server of the International Intelligence Agency of the Ministry of Foreign Affairs, when Shi Lei scanned, found an alarm mechanism connected to the internal LAN, and it was controlled separately, if it was difficult to lift it.

The International Intelligence Agency of the Ministry of Foreign Affairs, as the largest intelligence agency in the country, belongs to the internal network, and only a few nodes have links to the external Internet.

The connection to the web server is a node.

However, when Shi Lei gained super authority, he finally found a big problem!

‘Damn, it’s a one-way data! ‘Shi Lei’s heart snorted.

The so-called one-way data is a derivative of one-way link web technology. If the web server of the official website of the Ministry of Foreign Affairs of the Ministry of Foreign Affairs is regarded as A, the internal data server of the International Intelligence Bureau of the Ministry of Foreign Affairs shall be regarded as B.

One-way data means that B can access A, can transfer data to A, and can browse all the situations of A, but A cannot transfer data to B, nor can it browse B.

Even A's data service request can only stay in A, B arrives at A to access and then respond to the corresponding data request.

If it is a general hacker, there is no way to meet this one-way data. After all, web server A cannot send any data to internal server B, and can only be probed by server B.

He Shilei is the world's top-level hacker, even if one-way data can block many people, but the blocker does not include Shi Lei!

Shi Lei directly entered the web server, entered more than one hundred lines of code, and then chose to execute the code.

More than a hundred lines of execution code, a total of more than a dozen data requests, these data requests will cause memory overflow, so that the Ministry of Foreign Affairs International Intelligence Bureau, the internal LAN data server, the sudden occurrence of service suspension.

At the moment of service suspension, the one-way data restriction is naturally released, and the two-way data communication is restored.

This time process is very short, because the data server's memory is different from the average personal computer, but ECC memory, with error checking and correction.

After the memory data overflows, the ECC memory will automatically correct the error. Shi Lei must enter the internal network of the International Intelligence Bureau of the Ministry of Foreign Affairs before the ECC memory is restored.

Shi Lei owns Supercomputer Yan, and also connects to the No. 3 server of Pukong Company. Through the special cluster system of No.1 server, the two supercomputing resources are collected together and quickly invaded the internal area network of the International Intelligence Bureau of the Ministry of Foreign Affairs.

After entering the International Intelligence Bureau of the Ministry of Foreign Affairs, Shi Lei did not act rashly and did not attempt to tamper with the data. Instead, he implanted the backdoor program prepared in advance into the bottom of the system of the International Intelligence Bureau of the Ministry of Foreign Affairs.

Since the last time, in order to permit the permission of the Robot Project, Shi Lei has entered the International Intelligence Bureau of the Ministry of Foreign Affairs and clearly knows the server situation of the International Intelligence Agency of the Ministry of Foreign Affairs.

Therefore, Shi Lei's backdoor program, the assembly language used, directly sinks into the bottom layer of the system, which is very invisible and convenient for the next time to enter the International Intelligence Bureau of the Ministry of Foreign Affairs.

After processing the backdoor program, Shi Lei is preparing to look at the Ministry of Foreign Affairs' International Intelligence Agency and the intelligence department's top secret database to see if they have any needed information.

However, just as Shi Lei was preparing to view the top-secret database, the web server of the International Intelligence Agency of the Ministry of Foreign Affairs was attacked!

If it's just an offense, but the idiot hacker actually forced the attack on the web server, without any disguise.

Not only that, the new hackers, after obtaining low-level privileges, actually directly tamper with the official website of the Ministry of Foreign Affairs International Intelligence Bureau, public message provocation!

‘Mr. M, aren’t you so powerful? How was it surrounded by the International Intelligence Agency of the Ministry of Foreign Affairs? The great Raphael is waiting for you here, dare to come? ‘——Raphael

Shi Lei looked at this message, almost vomiting blood!

What is the narrow road, what is called self-defeating, at this moment!

Rafael thought that Shi Lei’s Mr. M vest was under the siege of the Tokyo Self-Defense Force by the Ministry of Foreign Affairs’ International Intelligence Agency. Taking advantage of this opportunity, Rafael’s arrogance and arrogance smashed the official website of the International Intelligence Agency of the Ministry of Foreign Affairs and left a language that humiliated Mr. M.

I know that this is self-defeating, causing the Ministry of Foreign Affairs’ International Intelligence Agency and the web server to alert the experts of the Ministry of Foreign Affairs’ International Intelligence Agency to be alert to their nests.

As a result, Shi Lei’s invasion of the internal area network of the International Intelligence Agency of the Ministry of Foreign Affairs is also expected to be exposed.

Shi Lei, who was furious and angry, quickly returned to the web server, found Rafael's connection IP address record, prepared to save the record, and then left it in the web server, let the Ministry of Foreign Affairs International Intelligence Agency deal with Rafael.

However, Rafael's **** is worthy of being the world's top-level hacker. He is actually copying Shi Lei's connection IP address record like Shi Lei's idea!

‘Raphael of Dog Day, you forced me! 'Shi Lei was annoyed in his heart. He did not alarm Rafael. Instead, he found the top secret information of the intelligence department in the internal area network of the International Intelligence Agency of the Ministry of Foreign Affairs, and selected a file called SO Plan, which was disguised as an attempt to view it. And copy the operation.

Then change the connection IP address and change it to Rafael's connection IP address!

On the other side of the Web server, Shi Lei pretended not to find Rafael's action, allowing Raphael to connect his temporary broiler to the IP address and reserve it in the system record.

Raphael also thought that he was doing it seamlessly and was not discovered by Shi Lei.

Only Rafael made a fatal mistake! .

(To be continued. Please search for astronomical literature, the novel is better and faster!)

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like