The Strongest Hacker

Chapter 7: Super virus (2)

   Chapter VII Super Virus (2)

   Computer viruses, many people know, but what is a computer virus, but few people know. Computer viruses can quickly parasitize and multiply through computer networks, and through mutation and hybridization, quickly obtain certain system control rights through system vulnerabilities.

The perfect virus should first have the ability to reproduce on the Internet and integrate the ideas and technologies of artificial intelligence. At the same time, the perfect virus must also have a distributed structure with a mother-child structure, that is, when the mother virus is detected and found At this time, it will release a more destructive or more subtle virus program.

   At the same time, the perfect virus also needs to be able to hybridize, mutate, and exchange genetic information with its own mutant virus, thereby further perfecting its own program and making itself more concealed and more destructive.

   The birth of this firewall can be said to be a coincidence. The most important thing for hackers is not how deep you have to invade the enemy, how powerful the virus writing ability is, and the most important thing is that you can hide yourself.

Although Zhang Yang's understanding of computer viruses can be said to be a master-level character, he is at a rookie level to hide himself. Perhaps an ordinary little hacker's computer is more secure than Zhang Yang's computer. Because of this matter in his last life, Zhang Yang simply He did something that no hacker could think of.

He first wrote a virus to infect his computer. Zhang Yang deliberately wrote this virus is very overbearing. For the machine it infects, this virus will automatically search for other viruses in the machine. Once found, it will first The virus destroys and kills, and then resides in the hard disk by itself.

  Of course, this is not the most important function. The most important function is that when a foreign program sneaks into the system, tries to gain control of the system, or tries to release the virus to the computer, the virus will mutate.

   It will release two sub-viruses, one highly concealed sub-virus will automatically track the intrusive data stream, and the other sub-virus is a variant virus that Zhang Yang has studied based on the Ebola virus genetic map.

The variability of this virus is completely based on the genetic map of Ebola virus. If other people do not know the law of the mutation of this virus, then he is out of luck. This virus is simply a direct and direct anti-tracking infection. Even if you can find it, you can't kill it.

   Later, Zhang Yang adapted a lot of functions on the basis of this virus, and this small firewall was finally formed. Soon the peripheral functions of the firewall were basically completed, and the rest is the core program of this firewall, that super virus. Strictly speaking, the parent program of this super virus is a shell. It can be attributed to a benign virus. Just as human tumors are malignant and benign, this virus itself is not harmful.

Even because Zhang Yang used this virus for his own, the loss of the system's functions has reached a minimum, less system resources than ordinary firewalls, and the two inside it are unique Different child viruses, Zhang Yang's previous life was written according to the genetic map of Ebola virus, but now Zhang Yang is not going to do so.

The virus Zhang Yang on the bright side still uses the Ebola virus gene map law as the virus mutation law, but for the highly concealed virus, Zhang Yang uses the HIV gene map law as the mutation law. . The genetic map of HIV was discovered and drawn by American scientists only five years later, and no one knows it.

  Because of the changes, it took Zhang Yang a lot of time to write the core part of this firewall. Until more than 9 o'clock in the evening, when the welcome party was estimated to be nearing the end, Zhang Yang did not complete this firewall completely. After completion, Zhang Yang installed this firewall directly on his computer. The Linux system that Zhang Yang installed was still downloaded from the Heimen Forum. Others have written it, and he hasn't had time to change it to a system he is familiar with.

  After running the firewall, Zhang Yang directly chose the function of searching for viruses, which is actually to let his own virus first infect his system. Virus-infected files are very different from the files in the system itself. Even the files disguised by viruses that some antivirus software cannot find are also different from their own files, and it is easy to discover which ones are in the process of the same virus infection. The file is infected.

  Theoretically, it is impossible for Zhang Yang to find a virus that comes with the firewall function. Because it is a newly installed system, there are basically no extra files, and the progress bar for searching soon comes to an end. Zhang Yang is actually just doing a check. The system he just made is logged into a black alliance forum, and there can be no virus.

   But when the firewall was checked, a bright red 1 surprised Zhang Yang when a virus was found.

   "My grass!" After coming back, Zhang Yang was in a hurry, and a virus was found in the UU reading www.uukanshu.com system, so there was only one possibility! That is a virus or a Trojan horse program has been hung on the Black League Forum!

But now the Black League Forum is just at the beginning of its establishment, and it has a lot of hackers in the hacker world. It can infect this virus into the other party's system under the eyes of these great gods. How powerful is it? Technical strength? !

  Zhang Yang quickly made his system a simulated partition, and then continued to make a simulated system inside, locked the virus found with his own firewall, and directly isolated it into his assigned simulated system.

  Because it is the isolation of the entire file, so before I have not figured out what type of virus this virus belongs to, such isolation can ensure to the greatest extent that it will not mutate and re-infect. After quarantining the files, Zhang Yang ran the search program of his firewall again.

   Soon, the firewall search was completed again. Looking at the search results, Zhang Yang was relieved. Fortunately, except for the simulated isolation zone, there is no virus in other places. After the worries were lifted, Zhang Yang became curious. What kind of virus is it that he can escape the viruses of so many hacker gods on the hacker alliance forum?

   But now the tools at hand are not enough. Zhang Yang hesitated for a while and didn't care about the virus for the time being, but quickly started to write the program again. First of all, he needed a decompilation software and a powerful analysis software.

   There is no need to decompile the software first. Regardless of any virus, decompiling is impossible without knowing its details and cracking its encryption shell.

Tap the screen to use advanced tools Tip: You can use left and right keyboard keys to browse between chapters.

You'll Also Like