The Strongest Hacker

Chapter 48 MLGBD (Part 1)

Chapter 48 MLGBD (Part 1)

Back in his room, Zhang Yang directly turned on his computer, first checked his computer carefully, and after confirming that there was no problem, Zhang Yang quickly entered the server of S University first.

The springboard, that is, the bot, generally has two ways of use. Most hackers leave a back door in the bot or springboard system, and then enter illegally, so as to achieve the purpose of using server resources. The other is to create a super administrator account like Zhang Yang, and then use special means to hide the account. Strictly speaking, regardless of the illegality of the account itself, Zhang Yang's access to the system itself is normal access !

For example, if the entire traffic rules are imagined as a server, then some vehicles with special license plates that have certain privileges in the traffic rules are administrators of various levels. It can operate the system to a certain extent under the condition of following the rules of the large system.

Then those who enter the system with the back door are those who forged a military license plate or a police license plate to go on the road. Although the general traffic police dare not check, once they find out, you will be out of luck.

But Zhang Yang, he belongs to the kind where he first used illegal means to bribe some people, and then got a military license plate from the vehicle management office and hung it on his car. In this way, the process of obtaining this license plate is illegal. Well, the license plate itself is a serious military license plate. When you are on the road, you are not afraid even if the traffic police check it.

There is a difference between these two methods. If you want to use the second method, you must have a certain level of strength, but the first method is relatively low entry level. As long as you can enter the server, you can hang the horse and stay. The back door is convenient for you to enter next time, just like hanging a fake license plate.

But the second one, if you want to hide the super administrator's account, you can't do it without certain strength. The two methods have their own advantages and disadvantages. The method of hanging the horse and leaving the back door is sometimes easier to survive than the other method. After all, fishing in troubled waters is much better than stealing fish openly.

Using the same method as yesterday, Zhang Yang quickly turned the servers of several other universities located in City H into his own chickens, and then quickly opened the official website of Baiying Security Company, pulled out his own scanner, and Zhang Yang quickly Start scanning the official website of Baiying Security.

The IP of the official website must be announced to the outside world. Baiying Security is not a small company, even though it is not well-known. In fact, some domestic security companies that have received orders from the government are almost not well-known. Not being famous does not mean that they have no money. For example, most of the Chinese companies that have entered the world's top 500 companies don't know about it, right?

Since it is a security company, there is no need to say more about its technical strength. Even if it is worse than Zhang Yang and the others, it will not be far behind. Soon, the results that Zhang Yang wanted appeared on the scanner. His scanner was adapted based on the computer system and software status a few years later, so there were almost no loopholes that could escape its scanning.

Soon, Baiying Security's server status appeared on the scanner. Baiying Security's server uses an operating system adapted from Unix. This system has also been adapted many times. It is a multi-user, multi-tasking , multi-level (multiuser, multiproultilevel) MULTICS operating system, the main target is large server clusters.

Baiying Security is also using the Unix operating system. This operating system has several well-known loopholes that were discovered later, and the rest will be much easier if there are loopholes.

Looking at the few ports on the scanner,

Zhang Yang was speechless for a while. He didn't expect the security personnel of Baiying Security to be quite insidious. They actually opened honeypots on the external port of the server, and there were more than one of them.

Honeypot is an intelligence collection system in the computer field. From the name, it is a bait, which mainly opens some ports that are easier for people to attack as false targets to lure hackers to attack, so as to record all the steps of the hacker's intrusion. Plays, rules, and even his IP and so on.

However, it is clear that Baiying Security's security personnel are very confident in their system. Zhang Yang has no interest in these honeypots at all. He quickly sneaked into their system through a few deeply hidden loopholes, and Zhang Yang began to quickly place his own honeypots. Virus. The virus was extracted from the firewall. After using it several times, Zhang Yang found that his virus was actually very useful.

It has an infection transmission mechanism far beyond the current one, and it is multi-morbid, hybrid infection, and can even record the genetic information of its own kind. Any system infected by it is like opening a small back door for Zhang Yang. So Zhang Yang simply repackaged the virus and called it an infection bug, which is a powerful weapon for intrusion.

But now the active infection has been sealed by Zhang Yang and needs to be activated. Once the active infection is activated, I am afraid that the infection speed will not be lower than the assassin virus that Zhang Yang killed.

Soon the infection spread quickly throughout Baiying Security's intranet. To deal with such a large server cluster, the virus is actually the best way to infect it, because before the data is transmitted to the servers, the large server cluster is equipped with a load balancing system. That is to say, the traffic and access data are evenly distributed to each server in the server cluster through this system.

This provides great convenience for virus infection. He quickly copied all the data of their firewall and anti-virus software to his computer in the safe server of Baiying, and copied the customer data by the way. Surreptitiously left a virus, and then quickly exited the server.

After wiping off all traces on the broiler, Zhang Yang directly began to analyze the security services provided by Baiying Security, mainly firewall and anti-virus software.

The function of the firewall is to be the only source of information communication between the user and the public network domain. As far as the firewalls currently on the market are concerned, except for some powerful companies or some government departments, the ordinary firewall is the only source of communication in the eyes of hackers. Rubbish.

However, Baiying Security focuses on high-end customers, and there are very few ordinary users. Their main customer base is large enterprises and government departments, so Baiying Security's firewall technology is still good. But nothing is absolute. If a firewall itself has a loophole, once the loophole is known to hackers, the consequences can be imagined.

Even the international security giant Symantec dare not say that there are no loopholes in their firewall and anti-virus software, let alone Baiying Security. Because all the data of Baiying security firewall and anti-virus software, including the source code, have been stolen from their server.

Therefore, it is already very easy to analyze and decompile firewall and anti-virus software, but it takes a long time to analyze such large-scale software. Zhang Yang had to borrow part of the school's server resources. It was not until the evening that Zhang Yang finally analyzed the entire firewall and anti-virus software.

However, it is estimated that Fang Shaoyun should be back, and Zhang Yang is not easy to continue.

***********

Ask for a ticket

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like