The Strongest Hacker

Chapter 48: MLGBD (on)

   Chapter 48 MLBGD (Part 1)

  Back to his room, Zhang Yang directly opened his computer, carefully checked his computer first, and after confirming that there were no problems, Zhang Yang quickly entered the S server.

  The springboard, that is, the broiler, is generally used in two ways. Most hackers leave a backdoor in this broiler or springboard system, and then enter illegally, so as to achieve the purpose of using server resources. The other is to create a super administrator account like Zhang Yang, and then use special means to hide the account. Strictly speaking, regardless of the illegality of the account itself, Zhang Yang’s access to the system itself is normal access. !

   For example, if you think of the entire traffic rules as a server, then some vehicles with special privileges and special license plates affixed to the traffic rules are administrators of various levels. It can operate the system to a certain extent when it follows the rules of the big system.

  Then those who enter the system with a back door belong to a forged military license plate or a police license plate. Although the general traffic police dare not check it, if you find it, then you are out of luck.

But Zhang Yang belongs to the kind that he used illegal means, bribed some people, and then got a military license plate from the vehicle management office and hung it on his car, so that he was illegal except for the process of obtaining this license plate. However, the license plate itself is a military card with a straightforward path and is on the road. Even if the traffic police check it, he is not afraid.

With these two methods, the difference comes out. The second one you want to use, you have to have a certain strength, but the first entry is relatively low, as long as you can enter the server, you can hang the horse to stay The back door is convenient for you to enter next time, like hanging a fake license.

   But the second kind, if you want to hide the account of this super administrator, you can't do it without certain strength. The two methods have their own advantages and disadvantages. The method of hanging the horse and keeping the back door is sometimes easier to survive than the other. After all, it is better to touch the fish in muddy water than to steal the fish.

In the same way as yesterday, Zhang Yang quickly made the servers of several other universities in H city into his own broilers, and then quickly opened the official website of Baiying Security, pulled out his own scanner, and Zhang Yang quickly Start scanning the official website of Baiying Security.

  'S official website's IP must be publicly announced. Baiying Security is not a small company. Don't look at it as not well-known. In fact, some domestic security companies that have received government orders are almost not well-known. Not well-known does not mean that there is no money. Like China’s top 500 companies in the world, most of you don’t know?

  Since it is a security company, there is no need to say more about its technical strength. Even if it is close to publicizing them, it will not be worse. Soon, the result that Zhang Yang wanted appeared on the scanner. His scanner was adapted based on the computer system and software status after a few years, so there are almost no loopholes to escape its scanning.

Soon, the situation of Baiying security server appeared on the scanner. The operating system adapted from the unix used by Baiying security server. This system has also been adapted many times. It is a multi-user, multi-tasking. , Multi-level (multiuser, multiproultilevel) MULTICS operating system, the main target is a large server cluster.

   Baiying is also using the unix operating system. This operating system has several well-known vulnerabilities that were discovered later, and the rest of the vulnerabilities are much easier to handle.

   Looking at several ports on the scanner, Zhang Yang was speechless for a while. Unexpectedly, the security personnel of Baiying Security were rather insidious. He actually opened a honeypot on the external port of the server, and there were more than one.

The honeypot is a kind of information gathering system in the computer field. It can be seen from the name. It is a bait. It is mainly to open some ports that are easier to attack as fake targets to lure hackers to record all steps of this hacker invasion. Playing, regularity, even his IP and so on.

However, it is clear that the security personnel of Baiying Security are very confident in their system. Zhang Yang is not interested in these honeypots at all. He quickly sneaks into their systems from several hidden and deep holes, and Zhang Yang begins to quickly place his own virus. The virus was extracted from the firewall. After several uses, Zhang Yang found that his virus was actually very useful.

   has far more infection transmission mechanism than the current one, and is multi-pathological, hybrid infection, and can even record its own genetic information. Any system infected by it is like opening a small backdoor to Zhang Yang. So Zhang Yang simply repackaged the virus and called it infected with worms, which is an intrusive weapon.

   However, the active infection is now sealed by Zhang Yang and needs to be activated. Once the active infection is activated, I am afraid that the spread of the infected insect cannot be slower than the assassin virus that Zhang Yang killed.

Infected insects quickly spread across the entire Baiying secure intranet. To deal with this large server cluster, in fact, the virus is the best infection, because before the data is spread to the server, the large server cluster is equipped with a load balancing system. This means that the traffic and access data are evenly distributed to each server in the server cluster through this system.

This provides a great convenience for virus infection. Quickly copy all the information of their firewall and anti-virus software to their own computers inside the Baiying security server, and incidentally copy a copy of the customer information~www. wuxiahere.com~ Zhang Yang secretly left a virus, and then quickly exited the server.

  After all traces on the broilers were wiped clean, Zhang Yang directly began to analyze the security services provided by Baiying Security, mainly firewalls and anti-virus software.

The role of the firewall is to be the only source of information communication between the user and the public domain. As for the firewalls currently on the market, in addition to some powerful companies or some government departments, ordinary firewalls in the eyes of hackers are Rubbish.

   However, Baiying Security is a high-end customer, and there are few ordinary users. Their main customer base is large enterprises and government departments, so Baiying Security's firewall technology is still good. But nothing is absolute. If a firewall itself has a vulnerability, then once the vulnerability is known to a hacker, the consequences can be imagined.

   Even the international security giant Symantec does not dare to say that there are no holes in their firewalls and anti-virus software, let alone Baiying Security. Because they have stolen all the information of Baiying Security Firewall and anti-virus software from their servers, including the source code.

   Therefore, it is very easy to analyze and decompile firewalls and anti-virus software, but it takes a long time to analyze such large-scale software. Zhang Yang had to borrow some of the school's server resources. Until the evening, Zhang Yang did not analyze the entire firewall and antivirus software.

   But it is estimated that Fang Shaoyun should be back, and Zhang Yang is not easy to continue.

  *

   Seeking votes

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like