typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

hk273 Raphael's Fatal Mistake! (7/42)

. Twelve formal security expert teams and twenty-seven reserve expert teams of the International Intelligence Bureau of the Ministry of Foreign Affairs are fighting endless defense entanglements at the core server of the Tokyo Metropolitan Self-Defense Force, ambitiously trying to capture Mr. M.

But they don't know that this is basically a trap set by Shi Lei!

The defense mechanism of Endless Defense is very simple. It only knows two basic tricks: deny and delete.

Intrusion through ports, or disguised as normal access, will be directly rejected; Trojans, viruses, malicious data packets, and junk data packets will be directly deleted.

Although this method of defense is simple, it is very applicable.

This is the principle of simplicity. The simpler the method, the less computer resources are occupied, the faster the response speed, and the higher the pressure-bearing capacity!

To give a simple example, common mainstream anti-virus software currently on the market has three main ways to determine whether an unknown file is a virus.

The first is the most common, and also the feature code structure judgment that all anti-virus software has. Major security vendors capture virus samples from a large number of honeypot systems deployed, analyze the virus signatures, and then create huge virus signatures

Code database. When a suspicious file is discovered, the unknown file structure is first analyzed, including a series of unpacking techniques, etc., the signature code of the unknown file is obtained, and the signature code of the unknown file is compared with the virus signature code of the virus database to confirm whether it is a virus file.

This method is also very popular in cloud security in later generations. In fact, it is the signature of unknown files uploaded by anti-virus software, and compared with the virus signature database on the server side to see if it is a virus. It is still only the most basic and common signature.

It’s just code comparison, it’s hyped up as cloud security, boasting something to fool people!

The second method is genetic code, which is an upgrade system of signatures and is actually signatures. Each signature can only correspond to one virus, but one genetic code can correspond to a gene series virus.

Although they are both of the same nature as signatures, genetic codes effectively reduce the amount of data in the virus signature database.

The third method is called heuristic. The principle of this method is somewhat related to Endless Defense. It determines whether a file is a virus program by comparing the difference between unknown files and normal programs.

There are two ways of heuristics, one is dynamic heuristics and the other is static heuristics. Static heuristics is to understand the true motivation of an unknown program by decompiling the static code instruction sequence to determine whether it is a virus.

Dynamic heuristics is sandbox technology, which uses anti-virus software to establish a sandbox environment, let unknown files run in the sandbox, and see what behavior the unknown program will do to determine whether it is a virus.

Dynamic heuristics has a big disadvantage. Establishing a sandbox environment will consume a lot of system resources, resulting in a lack of computer system resources and causing delays and lags in normal operations.

Kaspersky is doing very well in this field. It has the best anti-virus effect, but just like its name, it is also known as ‘stuck and crashed’!

The above three methods show that no matter which method is used, a lot of work must be done to determine whether an unknown file is a virus program. Doing a lot of work will occupy a lot of system resources, whether it is CPU computing resources, memory

Storage resources, or other system resources.

It occupies a large amount of system resources, causing the computer equipment to have poor load capacity. If it is a little serious, the computer equipment will freeze or even crash!

There is only one step for Endless Defense to determine whether an unknown file is a virus!

Just make sure it's a protected file!

If not, delete it directly. No more operations are required, and the pressure on the system is reduced a lot.

Therefore, facing the thirty-nine groups, security experts from the Ministry of Foreign Affairs’ International Intelligence Bureau, Endless Defense stood up!

After Shi Lei inspected the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs, he used Server 1 as the basis and combined the supercomputer Yan and Server 3 to form a cluster server to jointly attack the official website web server.

Since the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs adopts Microsoft's IIS server and is built using asp.net technology, Shi Lei has a very deep understanding of Microsoft's system!

Controlling the supercomputer Yan without triggering any alarm, Shi Lei obtained the low-level permissions of the web server. Then, based on the low-level permissions, he slowly increased the permissions.

Obtaining low-level permissions first and then escalating them is safer than directly obtaining super permissions in one step. In particular, when Shi Lei scanned the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs, he found an alarm mechanism connected to the internal LAN.

, and it is controlled separately, so it is difficult to remove it.

The International Intelligence Bureau of the Ministry of Foreign Affairs, as the largest intelligence agency in Wasang Country, belongs to the internal network, and only a few nodes have links to the external Internet.

The connection to the web server is a node.

However, when Shi Lei obtained super permissions, he finally discovered a big problem!

‘Damn it, it’s actually one-way data!’ Shi Lei snorted in his heart.

The so-called one-way data is a derivative of one-way link web technology. If the web server of the official website of the Ministry of Foreign Affairs International Information Bureau is regarded as A, the internal data server of the Ministry of Foreign Affairs International Information Bureau is regarded as B.

One-way data means that B can access A, can transmit data to A, and can browse all situations of A, but A cannot transmit data to B or browse B.

Even A's data service request can only stay and be stored in A, and B will arrive at A to access and read, and then reply to the corresponding data request.

If an ordinary hacker encounters this kind of one-way data, there is absolutely nothing he can do. After all, web server A cannot send any data to internal server B. Server B can only detect it independently.

However, Shi Lei is the world's top hacker. Even if one-way data can block many people, Shi Lei is definitely not among those blocked!

Shi Lei directly entered more than a hundred lines of code into the web server, and then chose to execute the code.

These more than one hundred lines of execution code are a total of more than ten data requests. These data requests will cause memory overflow and cause the Ministry of Foreign Affairs' International Intelligence Bureau and the data server of the internal LAN to suspend services instantly.

The moment the service is suspended, the one-way data restriction is naturally lifted and two-way data communication is restored.

This time process is very short, because the memory of the data server is not the same as that of ordinary personal computers, but ECC memory, which has error checking and correction functions.

After the memory data overflows, the ECC memory will automatically correct the error. Shi Lei must enter the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs before the ECC memory is restored.

Shi Lei owned the supercomputer Yan and was connected to the No. 3 server of Pukong Company. Through the special cluster system of the No. 1 server, he brought the two supercomputing resources together and quickly invaded the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs.

After entering the International Intelligence Bureau of the Ministry of Foreign Affairs, Shi Lei did not act rashly or attempt to tamper with the data. Instead, he implanted the backdoor program written in advance into the bottom layer of the system of the International Intelligence Bureau of the Ministry of Foreign Affairs.

Because last time, Shi Lei had entered the International Intelligence Bureau of the Ministry of Foreign Affairs in order to obtain permission for the Robot project, and he clearly knew the server situation of the International Intelligence Bureau of the Ministry of Foreign Affairs.

Therefore, the backdoor program Shi Lei wrote this time used assembly language and sank directly into the bottom layer of the system. It was very hidden and inconspicuous, making it easier to enter the International Intelligence Bureau of the Ministry of Foreign Affairs next time.

After processing the backdoor program, Shi Lei prepared to check the top-secret database of the International Intelligence Bureau of the Ministry of Foreign Affairs and the intelligence department to see if they had any needed information.

However, just when Shi Lei was about to check the top-secret database, the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs was attacked again!

It would have been fine if it was just an attack, but that idiot hacker actually forcibly attacked the web server without any cover-up.

Not only that, the new hacker, after obtaining low-level permissions, actually directly tampered with the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs and publicly left provocative messages!

'Mr. M, aren't you so powerful? Why are you surrounded by the International Intelligence Bureau of the Ministry of Foreign Affairs? The great Raphael is waiting for you here, do you dare to come?' - Raphael

Shi Lei looked at this message and almost vomited blood with anger!

What does it mean to be on opposite sides of a road, what does it mean to be self-defeating, this is it now!

Raphael thought that Shi Lei's Mr. M vest was under siege by the Tokyo Self-Defense Forces and the International Intelligence Bureau of the Ministry of Foreign Affairs. Taking advantage of this opportunity, Raphael showed off his power and hacked the official website of the International Intelligence Bureau of the Ministry of Foreign Affairs.

He left behind words that humiliated Mr. M.

Unexpectedly, this was self-defeating and triggered an alarm on the web server of the International Intelligence Bureau of the Ministry of Foreign Affairs, alerting the experts of the International Intelligence Bureau of the Ministry of Foreign Affairs and that they would definitely return to their home base.

As a result, Shi Lei's intrusion into the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs will definitely be exposed.

Shi Lei was so angry that he quickly returned to the web server and found the record of Rafael's connection IP address. He planned to save this record and then leave it in the web server for the International Intelligence Bureau of the Ministry of Foreign Affairs to deal with Rafael.

However, that bitch Raphael is indeed the world's top hacker. He actually has the same idea as Shi Lei and is already copying Shi Lei's connection IP address records!

"Rafael, you forced me!" Shi Lei was angry in his heart. He did not alert Raphael. Instead, he found the top secret information of the intelligence department in the internal LAN of the International Intelligence Bureau of the Ministry of Foreign Affairs, and selected a name from it.

It is a file of "SO Project", disguised as an attempt to view and copy.

Then change the connection IP address to Rafael’s connection IP address!

On the web server side, Shi Lei pretended not to notice Raphael's actions and asked Raphael to reserve his temporary broiler connection IP address in the system record.

Raphael thought he had done it perfectly and was not discovered by Shi Lei.

But Raphael made a fatal mistake!

(To be continued. Please search Piaotian Literature, the novel will be better and updated faster!)


This chapter has been completed!
Previous Bookshelf directory Bookmark Next