The Strongest Hacker

Chapter 7 Super Virus (2)

Chapter 7 Super Virus (2)

Many people know about computer viruses, but few people know what a computer virus is. Computer viruses can quickly parasitize and multiply through computer networks, and through mutation and hybridization, they can quickly gain certain system control rights through system loopholes.

The perfect virus should first have the ability to reproduce on the Internet, and integrate the ideas and technologies of artificial intelligence. At the same time, the perfect virus must also have a distributed structure, with a mother-child structure. From time to time, sub-virus programs with stronger destructive power or higher concealment will be released.

At the same time, a perfect virus needs to be able to hybridize, mutate, and exchange genetic information with its own mutated virus, so as to further improve its own program and make itself more concealed and destructive.

The birth of this firewall can be said to be a bit of a coincidence. The most important thing for a hacker is not how advanced the technology of invading the enemy or how powerful your virus writing ability is, the most important thing is that you can hide yourself.

Although Zhang Yang's understanding of computer viruses can be said to be a master, but he is a rookie when it comes to hiding himself. Maybe an ordinary hacker's computer is more secure than Zhang Yang's computer. Because of this incident in his previous life, Zhang Yang simply It did something that all hackers could not think of.

He first wrote a virus to infect his computer. The virus that Zhang Yang deliberately wrote is very domineering. Whenever it infects a machine, this virus will automatically search for other viruses in the machine. The virus destroys and kills, and then resides in the hard disk itself.

Of course, this is not the most important function. The most important function is that when an external program secretly invades the system, tries to gain control of the system, or tries to release a virus to the computer, the virus will mutate.

It will release two sub-viruses, a highly concealed sub-virus that will automatically track the intruding data flow, and the other sub-virus is a mutant virus that Zhang Yang researched based on the genetic map of the Ebola virus.

The variability of this virus is completely based on the genetic map of the Ebola virus. If other people don’t know the rules of this virus’s mutation, then he will be unlucky. This virus is a straightforward anti-tracking infection. Even if you can find it, you can't kill it.

Later, Zhang Yang adapted a lot of functions on the basis of this virus, and slowly this small firewall was finally formed. Soon the peripheral functions of the firewall were basically completed, and the rest was the core program of this firewall, that super virus. Strictly speaking, the parent program of this super virus is a shell, and it can be attributed to a benign virus, just like human tumors are malignant and benign, and this virus itself is harmless.

Even because Zhang Yang used this virus for himself, its loss of system functions has reached a very small point, and it takes up less system resources than ordinary firewalls, and the two types of viruses inside it are unique. Zhang Yang wrote the different sub-viruses according to the genetic map of the Ebola virus in his previous life, but now Zhang Yang is not going to do so.

Zhang Yang still used the genetic map of the Ebola virus as the variation law of the virus on the surface, but Zhang Yang used the genetic map of the AIDS virus as the mutation law of the highly concealed virus. . The genetic map of the AIDS virus was discovered and drawn by American scientists five years later, and no one will know it now.

Because of the changes, it took Zhang Yang a lot of time to write the core part of this firewall.

It wasn't until after nine o'clock in the evening, when the welcome party was probably coming to an end, that Zhang Yang finally completed the firewall. After finishing, Zhang Yang directly installed this firewall on his computer. The linux system installed by Zhang Yang was downloaded from the Heimeng forum. It was written by someone else, and he hadn't had time to change it to the system he was familiar with.

After running the firewall, Zhang Yang directly chose the virus search function, in fact, he let his own virus infect his system all over first. Virus-infected files are very different from the files of the system itself. Even if some anti-virus software cannot find out the files disguised by viruses, they are also different from their own files, and it is easy to find which ones during the same virus infection process. The file is infected.

Theoretically, it is impossible for Zhang Yang's virus-finding function attached to the firewall to slip through the net. Because it is a newly installed system, there are basically no redundant files, and the progress bar of the search will soon come to an end. Zhang Yang is actually just doing a check. The new system has just logged in to a black alliance forum, so there is no possibility of a virus.

But when the firewall check was completed, Zhang Yang was startled by a bright red 1 where the virus had been found.

"Damn it!" After recovering, Zhang Yang was in a hurry. A virus was found in the system, so there was only one possibility! That is, a virus or a Trojan horse program was installed on the Heimeng forum!

But now that the Black League Forum has just been established, there are quite a few masters of the hacker world residing in it. It takes a lot of power to infect this virus into the other party's system under the noses of these masters. Technical strength? !

Zhang Yang quickly made a simulated partition of his system, and then continued to build a simulated system inside. He used his own firewall to lock the found virus, and directly isolated it into the simulated system he allocated.

Because it is the isolation of the whole file, before figuring out what type of virus this virus belongs to, this isolation can ensure that it will not mutate and re-infect to the greatest extent. After isolating the files, Zhang Yang ran his firewall's search program again.

Soon, the firewall search was completed again. Looking at the search results, Zhang Yang heaved a sigh of relief. Fortunately, except for the simulated quarantine area, there were no viruses in other places. After getting rid of his worries, Zhang Yang became curious, what kind of virus could escape so many hacker master viruses on the hacker alliance forum?

But now that the tools at hand are not enough, Zhang Yang hesitated for a while, and temporarily ignored the virus, but quickly started to write the program again. First of all, he needed a decompilation software and a powerful analysis software.

It is not necessary to develop decompilation software first, no matter what kind of virus, without knowing its details and cracking its encrypted shell, decompilation is impossible to succeed.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like