typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

HK054 Deja Vu Return of First Class Broiler

Access Company, Xia Guo's name is Access Company, was founded in 1984 and is headquartered in Tokyo, Japan. It mainly involves management consulting, software development, mobile network services, and Internet browsers, etc.!

Access company's flagship product, NetFront browser, has a very high share of mobile devices in Wasang Country!

In order to capitalize on the reputation of the supercomputer Yan, this Internet-based company applied to Tokyo Institute of Technology for the right to rent the supercomputer Yan.

After finding out the news, Shi Lei immediately searched for the homepage of ACCESS through the Internet search engine. From the homepage of a company's website, you can know a lot of things. For example, the company's current situation, the company's financial statements, and even the personal information of the company members.

Passwords, etc., can all be peeked from a company’s homepage!

Shi Lei entered the homepage of ACCESS and browsed the company's current situation. This company has good development potential, especially the partners of NetFront browser, which are actually two giants, NTT and Sony.

After browsing for a while, Shi Lei tried to scan the vulnerability of ACCESS's company homepage to enter the website. As a company in the IT industry, ACCESS's company homepage indeed has its own independent server instead of a rented network service provider.

Server space provided.

After Shi Lei determined the server's system, he immediately got into the server through an unreleased vulnerability. The server on the ACCESS company's home page stored many files. Shi Lei browsed carefully and finally found the one he was interested in.

s things.

The system resources of ACCESS's rented supercomputer Yan are very small. They have powerful servers themselves. The reason why they rent supercomputer Yan is just to enhance the company's reputation!

Shi Lei actually found the login account and password of supercomputer Yan in ACCESS's web server. It turned out that ACCESS had disclosed the account and password of the rented supercomputer Yan to every senior employee of the company.

Announcement. They are free to use the part of the supercomputer resources rented by the company. This is not because ACCESS is generous, but because their own research projects need to be kept confidential and cannot be sent to the supercomputer for processing, and they are unwilling to waste the supercomputer.

Yan's resources. So, senior staff were allowed to use the resources of the supercomputer Yan at will!

Originally this was a benefit of ACCESS, but now it has become a convenient channel for Shi Lei to invade the supercomputer Yan!

Shi Lei browsed through ACCESS's web server, thought about it secretly, and decided to use ACCESS's server as a first-level broiler, officially preparing to invade the supercomputer Yan!

ACCESS's servers are great!

This company has five core servers forming a server group. The computing speed of each core server has reached 0.2 trillion times. The computing power of the entire server group has reached one trillion times per second, which is equivalent to one

A small supercomputer!

In 2006, the computing speed of the 500th ranked supercomputer in the world was only 2.7 trillion operations. In other words, ACCESS's server group was definitely among the most advanced in the world!

After deciding to use ACCESS's server, Shi Lei began to invade ACCESS. Since ACCESS's server group had reached the level of a small supercomputer, Shi Lei carefully controlled the No. 1 server and scanned the other party's server group for open access.

port.

Shi Lei has invaded the ACCESS company's web server, but the web server is only used for the company's homepage and to store some unimportant files and information. The company's core information is all stored in a server group composed of five core servers!

The computing speed of Server No. 1 was unsatisfactory after all. Shi Lei couldn't help but feel anxious, but there was nothing he could do about it!

While waiting for the scan results of Server 1, Shi Lei imagined that in science fiction novels, a broken notebook can hack the satellite's super power. How great would it be if he also had that kind of heaven-defying ability!

In hacking behavior, intrusion, acquisition, and control have different meanings respectively. For example, if a server stores confidential files, it does not mean that you can obtain the secrets by intruding into the server.

Within the same server, there are many permission settings, and confidential files generally have independent passwords. Therefore, even if you obtain confidential files, you may not necessarily get the secrets, and you still need to crack the password.

As for controlling a server, that is the most difficult! It is extremely difficult to gain control of a server, especially an advanced server!

Although the performance of the advanced server is very powerful and it is very enjoyable to use. However, the security policy and server firewall of the advanced server are even more difficult to deal with. Moreover, there are security personnel on duty!

Although Shi Lei knows many server systems and unannounced vulnerabilities, he does not do whatever he wants and can hack whoever he wants. Every hacker intrusion will inevitably establish a network link. After the network link is established, data exchange will occur. If it is an advanced server

Security personnel are on duty to observe the flow of data at any time, and any abnormalities will be discovered. For example, the server is compared to a pool filled with water, and the network link is compared to an externally connected water pipe. When the server is normal, there is no data

During communication, that is, when the water pipe is not flowing out. If a hacker secretly adds a water pipe to the loophole to release water, will the security personnel still not be able to detect the leak?

Server No. 1 slowly scanned out the ACCESS company and the server group port openings. Shi Lei waited until the flowers withered. After finding the suitable port, Shi Lei directly used the ACCESS company's web server to simulate the ACCESS company.

Internal communication, requesting access to the server group.

After the server group received the web server's request, since both parties were within the ACCESS company, the server group's firewall did not block the web server's request. Shi Lei used normal requests to successfully sneak into the server group through an unannounced vulnerability!

After entering the server group, Shi Lei did not act rashly, but began to spy on the firewall structure of the server group. If he did not fix the firewall, I am afraid that the firewall would issue an alarm as soon as Shi Lei started to clean up the permission group!

Shi Lei used the No. 1 server to analyze the firewall and manually probed at the same time. ACCESS's firewall was obviously not a mass product on the market, but a customized firewall system commissioned from a network security company.

To borrow a saying from the hacker community, a free firewall has zero defense effect!

It took Shi Lei nearly two hours to get a basic understanding of the firewall situation. ACCESS's firewall was actually provided by Norton!

In his previous life, Shi Lei specially studied Norton's firewalls, and Shi Lei was extremely familiar with each of their products. Although ACCESS's firewall is a product customized by Norton, its source code is also developed based on the Norton series.

Shi Lei is writing malicious programs inside the server group, preparing to penetrate the firewall and render it ineffective!

The best way to defeat a firewall is to, like Shi Lei, master the vulnerabilities of the server system, enter the server, and destroy the firewall from within the server.

After all, the firewall's external defense is very strong, but its internal defense is much weaker!

It took about ten minutes for Shi Lei to compile a malicious Trojan targeting the Norton firewall, and then began to destroy the firewall from the inside. The specially customized Norton firewall still couldn't get rid of the Norton mode, and was strangled from the inside by the malicious Trojan written by Shi Lei!

The function of the firewall was gradually replaced by malicious Trojans. The entire process was silent and did not attract the attention of security personnel at all.

After the malicious Trojan strangling Norton Firewall, it was unable to detect the Norton Firewall signature and began to self-destruct and clear itself from the server.

Shi Lei put his hands on the keyboard with a successful smile on his face. He didn't expect that it would be so smooth and he would get through Norton Firewall!

After typing a few lines of code on the keyboard, all authorized users within the ACCESS server group were listed on Shi Lei's computer screen.

On the surface, the server group only has three super-authorized users, and more than a dozen users with various levels of authority. Shi Lei carefully continued to type in the code and injected it into the server group's authority authentication system.

After a while, two accounts were displayed again on the monitor. The permissions of these two accounts were actually higher than those of the three super-privileged users!

"Nah, you are actually as insidious as Brother Shitou. He likes to hide the real super privileged users!" Shi Lei showed a disdainful expression on his face.

Hiding the real super-privileged user is quite common in high-end servers. If a hacker hacks into a high-end server and obtains the apparent super-privileged user, he will start to do mischief and create his own super-privileged user.

It will be revealed in that moment!

Shi Lei found out the real super-privileged users hidden in ACCESS, but he did not touch these two super-privileged users, nor did he create his own super-privileged users. Instead, he started writing code to take over the server group system.

, the original permission system.

If you use the original permission system in the server group system to create a super permission user, even if it is hidden. Once the super permission user of ACCESS Company checks the permission user group of the server, the newly created super permission user will be exposed.

That is tantamount to exposing the intrusion.

Therefore, Shi Lei needs to establish a new permission system to replace the original permission system in the server group. In the new permission system, the two hidden super users still have the highest permissions on the surface. But in fact, Shi Lei will establish

A more advanced super privileged user, hidden in the system.

Due to the use of the new permission system, even if the two original super permission users thoroughly check the server situation, as long as they do not find that the permission system has been replaced, they will not be able to discover Shi Lei's hidden super permission user. Under normal circumstances, security personnel on duty , there is no doubt that the system has been replaced.

Because, the job of replacing the system is definitely the most difficult of all, and only a world-class hacker like Shi Lei can do it!

——————————————————————————————————————————

PS: We are still a little short of the recommended vote target, but Shanshan believes we can reach it!

Please vote for recommendation~ Friends who haven’t collected it yet can do so! Please click as a member to help Shanshan reach the click list!

Please give me rewards, please comment, and please reply in the book review section~!

In addition, only one person won the prize in the last small event, leaving a pair of couple accounts. If anyone needs it, please post in the book review area. We will hold another small event. This time, you will get an eight-digit Tencent account, or a seven-digit Tencent account. Please give me your YY number! If you need it, please give me a shout in the book review section~

——

[Thank you for tipping] Ruoye Sakura Fubuki, tip 588.

.

.

.

;


This chapter has been completed!
Previous Bookshelf directory Bookmark Next