typeface
large
in
Small
Turn off the lights
Previous bookshelf directory Bookmark Next

257. Breaching the browser

257. Hack the browser

(Disclaimer: The plot of this section is purely fictional and may not be true in reality. Please do not take it seriously.) When all the voices finally calmed down a little, the host finally reacted and she bit her hard.

He licked his lips, sighed and smiled: "I can't believe it, I really can't believe it! Not only I can't think of it, but I'm afraid everyone here can't think of it either! It can be said that a junior girl from the freshman SWAT team can actually win the first prize in the hacker competition programming.

First place, this should be said to have created a miracle in the history of our Anthem Hacking Competition!"

The host, who was very adaptable, said passionately: "This is a miracle that makes us An adults proud and proud! A miracle that gives us more expectations. I hope that such a miracle will happen again in the next games."

, let us wait and see, eagerly waiting for the next miracle to happen as soon as possible! The next thing that will be carried out is the second competition-conquering the computer browser!"

e and safari, the platform runs under the windowssp operating system with security updates installed. The safari browser will run under the installation of apple macos

The winner, if the number of browsers breached is the same, will be ranked in order from least to most time.

This competition is very simple to operate. No matter how many contestants there are, everyone will fight on their own, using various means and tricks to attack those browsers until the browser is broken.

The competition started. The contestants each stared at their computer screens. After choosing a browser, they started attacking with all their strength. Anke thought that the competition did not stipulate that the use of third-party plug-ins such as sh was prohibited. These third-party plug-ins have always been

They are all security weaknesses in the operating system, and it is easier to break through the browser's protection through these weaknesses.

After making up his mind, Anke began to use the sh plug-in. After passing a series of steps, he bypassed the ASLR protection, and then bypassed the DEP, and then successfully broke into the IE8 browser. An hour and a half later, Ni

Ernst used similar strategies to bypass these protection strategies and break into the Firefox 3.6 browser.

Look at the time that has passed for more than seven minutes. Anko uses this protective measure against ASLR by loading the location of key storage areas at any time, making it difficult for hackers to predict whether their attack code can run. First, it exploits a large number of weaknesses to gain access to Chrome loaded into

One of the e-browsers in the memory. When she was about to attack the safari browser, the time came.

The results of this competition were soon announced. A total of thirty-one players broke into one browser within the specified time, twelve players broke into two browsers, and three players broke into three browsers.

Among the three players who broke through three browsers, in addition to Bo Haoyang from the Department of Computer Science in 2009 and Sun Yaqi in 2009, the other one is Anke. According to the rules of the competition, Sun Yaqi won the first place in order of time.

, Bo Haoyang won the second place, and Anke won the third place. exusone's android system. This time the competition time is still 10 minutes. Within the specified time, the winner is the one who breaks the most mobile phone systems. If the mobile phone system is broken

If the numbers are the same, they will be ranked in order from least to most time.

Even a layman can see that the mobile phones selected above are some of the most popular mobile phones on the market, and they also represent the strongest protection systems in mobile phones. It is not easy to break through any of them.

Anke sat in front of the computer, feeling very calm. The good results she had achieved in front of her made her full of confidence and made her calmer. She moved her wrist lightly a few times, closed her eyes slightly, rested for a while, and her brain started to work.

Running at high speed, thinking about how to break into the system. When the host announced Kashgar, Anke already had a clear attack idea in his mind. Naturally, he is more familiar with the operating system of this mobile phone than other mobile phones.

Duo had practiced in this area in normal times, so she chose to attack this phone first. She first attacked the iPhone's Safari browser to control the iPhone, and then ran a program to control the iPhone.

The text messages were sent to a network server. Through the terminal of this server, some information necessary to break the system was obtained, and then through special processing, the phone was broken into in almost three minutes.

, Encore went on non-stop, and then launched an attack on Nokia's Android system. Since the Android system has recently launched a series of high-end security measures, including an integrated "sandbox" that limits hacker attacks in the core of the device,

An encrypted signature mechanism was also added, which made it more difficult for hackers to attack. It took a lot of effort for Encore to attack this model. It took a lot of effort for her to finally find the loopholes in this system.

Thus, he broke into this mobile phone. He looked at the time and saw that there were less than seconds left before the specified time. Knowing that it would be impossible to break into the next mobile phone within such a time, he breathed a long sigh of relief.

Then he sat there quietly waiting for the result of the game.

In the two competitions of breaking through browsers and mobile phone systems, the scene is not as exciting and beautiful as ordinary competitions. There is even some silence. During the entire competition, the judges only monitor each player's competition, and there is no normal competition process in between.

There will be applause and cheers only when the results of the competition are announced.

In the competition of conquering mobile phones, after the judges determined whether each contestant had broken into the mobile phone they attacked, the results came out quickly. The host walked to the stage again and smiled at the judges and contestants in the audience.

Said: "Today's hacker competition, we are very honored to invite representatives from many browser and mobile phone manufacturers who have just been attacked. We are extremely grateful to them for coming to our competition!"

After a round of warm applause, the host added: "The results of the last event of the hacking competition will be out soon. Before the final results come out, we will first ask one of the judges of the hacking competition, a senior technical consultant from Apple.

Mr. McKenna would like to say a few words for us on behalf of the judges and the IT industry!"


This chapter has been completed!
Previous Bookshelf directory Bookmark Next