Chapter 134: Hanging Eagles on the Whole Network!

"The main purpose of the confrontation between domestic and overseas cyber means is not to engage in sabotage, but to deter cyber technology, that is, to clearly tell the other side that we have the ability to cause trouble for you. ”

"So don't make trouble for each other, if you find trouble with me, I'll find trouble with you. ”

"We don't need to do a lot of sabotage, no matter how much we sabotage, it is impossible to enter the intranet of their important institutions, and in the same way, they will not be able to enter our intranet. ”

Professor Liu explained to Zhao Yi the root of the network invasion war at home and abroad, that is, to tell him what kind of approach is the most suitable.

Zhao Yi understood.

Deterrent!

Let the other party know that it has the ability to sabotage, and the newly designed intrusion program is not suitable?

The intrusion program completed by Zhao Yi and Professor Liu can be described as a kind of 'automatic replication of the web stickworm', which can be hung on the specific open port of the target website.

The requirements for a 'specific port' are not high, and most of the websites that can be logged in are generally open, and there are many 'environments' suitable for network stickworms.

The network sticky worm is called a sticky worm because it does not need to invade the website, but like sticking to an open port, as long as the website transmits data to the user, the sticky worm will copy it once, stick to the back of the data, and follow the data packet into the user's computer.

Stickworms can be blocked by firewalls and antivirus software, but because they enter with the website data, firewalls and antivirus software act on the part of the browser, which will remind the user whether to run the program loaded by the target website, as long as the user chooses to load and run, the sticky worm can enter and run.

Of course.

If the firewall and anti-virus software do not protect the browser, the program can be loaded freely, and the sticky worm can run directly when the user visits the website.

The sticky worm can attach to the server of the target website, and it is definitely limited, most of its code is used for camouflage, only a small part of the code has an effect, and it is difficult to achieve the effect of ordinary Trojans.

Zhao Yi's choice is to call the underlying functions of the operating system and use the most primitive code to load the text on the screen.

There is still some time.

Professor Liu decided to join the intrusion operation as well, and he carefully studied and perfected the intrusion code.

Zhao Yi simply used the original code to design the loaded picture, he used a large number to form the shape of an eagle, because of the aesthetics, the level of drawing, he compared the simple picture on the Internet, and constantly corrected it to make the eagle look more majestic.

It's a harder process than designing code!

After eight o'clock, Zhao Yi opened the MSN and had a pre-war communication with the members of the 19th detachment.

The players can't wait.

The group is full of messages from the players, and they also complain about how unreliable the captain is, and there are very few online lines, and the time for the attack is coming, so it's not too early to go online.

Zhao Yi made an expression a little embarrassed, and the group suddenly became quiet.

He continued to send a message and said, "Are you all ready? Now you can start, the proxy has been opened, I will send you the URL separately, you use the software to detect the open port, remember, no need to detect vulnerabilities, do not find other information, I only need the IP of the URL server and the open port number, must be matched one by one." ”

Although Zhou Ming set the time at nine o'clock, the invasion was not a missile-missile, and there was no time switch.

As long as the proxy IP is open, it can be carried out freely.

The players still have a lot of questions --

"Captain, do you really want any other information?

"I used other IPs before, have I already collected some information and sent it directly to you?"

"I found a website management portal, but I still haven't cracked the password! ”

“......”

Zhao Yi had a headache when he looked at the large piece of information, so he simply asked Xiao Zhicheng, who was idle, to help 'chat', and he went to work with Professor Liu to write code to prepare for the invasion according to the IP and port he obtained.

It's a simple job.

Because the intrusion program has been programmed, he only needs to fill in the target IP and port, and run and send them one by one.

If you know how to do it, it is even a bit like repetitive manual labor, but Zhao Yi and Professor Liu are very energetic.

Even Professor Liu found it interesting.

The reason why hackers are attractive is probably because it is human nature to destruct, just like the 'heroes' of some movies, they always have strong force values, and their destructive capabilities are very strong, and computer masters can achieve invasion, which is also a technical and destructive achievement.

Apparently.

Only looking for the IP of the target website and the corresponding open port is not difficult at all for team members who have a certain level of technology and a lot of software assistance.

Zhao Yi assigned about 20 URLs to everyone, and it took less than half an hour, and almost all the IPs and open ports of the websites were sent one by one.

Eighty percent of these IPs and open ports meet the requirements.

Zhao Yi also kept running intrusion programs, and hung up 'network stickworms' on specific ports of the website one by one.

......

Oakland, California.

The elder Jem's son signed up for the Auckland City Police Inspector Training, and if he passed, he could officially become a trainee police officer.

Old Jem is very concerned about his son, and when he wakes up in the morning, he opens the website of the Oakland Police Department to see if there is a new list in the latest announcement on the website.

This time is different.

When the website is loaded, a prompt suddenly pops up at the bottom of the browser, "Whether to load XXX program, from the website ......"

"Load!"

Old Jem chose to load without hesitation, because the program is from the police station's website, and the police station's website can't always carry viruses, right?

He immediately stopped thinking so.

After clicking load, the computer seemed to be stuck for two or three seconds, and then in the middle of the screen, a large blood-red word suddenly popped up--

"Please note!"

"Your computer has been hacked by a Trojan!"

The words faded away.

Near the very center, a black eagle appeared, which was composed of purely numbers, and the painting was really rudimentary.

But...... That's not the point!

Old Jem looked at the computer screen in a daze, suddenly stood up and said angrily, "What kind of police station is this!

Meantime.

Many users who visited the police station's website found that they had 'fallen for the Trojan horse', and they directly blamed the police station, and called one complaint after another.

The Auckland Police Department received a large number of complaints, and also rushed to find a professional to see what was going on on the website, and found that it could not find a problem in a short time, so it simply shut down the server.

The same thing is played out on a lot of websites.

The last time overseas hackers attacked domestic public service websites, the target of the League of Hearts was also a public service website, that is, an external network that was close to the government-government department.

At present, most public service websites only have the role of 'publicity', and it is rare to have services.

Just because it's rare doesn't mean it's none.

The tax agency of Texas has opened a portal for inquiring about tax refunds on the external public service website, so that taxpayers can inquire about the specific tax refund and supplementary payment amount in the previous year.

This service is nothing after more than a decade, but now it is a bit ahead of its time.

The highly regarded tax agency in Texas has also increased the number of visitors, especially during business hours.

On this day, the visitors did not have a little praise for the Texas tax agency, and they found that their computers were 'installed' with a Trojan virus on the tax agency's website?

Definitely installed!

In the middle of the computer screen, it is written 'Your computer has been hacked by a Trojan'.

Suddenly.

A flood of complaints followed.

The incident immediately made the headlines, and because of the media coverage, more interested people visited the Texas tax website, and then the complaints increased.

It's an infinite loop......

The Texas tax authorities received the bad news that their tax website was overwhelmed with traffic and the servers were down, but it was also good news because there would be no new complaints.

If there is a problem with one website, it may be just an isolated case, dozens of websites have problems at the same time, coupled with the actions of other teams, and many more websites have been blasted and invaded, and the problem becomes obvious.

Soon the report came --

"Our website in the public service sector has been hacked!"

"Hackers from the East!"

"Dozens, hundreds of websites, will be installed with Trojan viruses, terrible Trojan viruses, can infiltrate the user's computer!"

"It's terrible!"

“......”

The whole network was shocked!

Although there are many websites that have been invaded and attacked, Zhao Yi's 'hanging eagle' is undoubtedly the most obvious, because 'hanging eagle' is along the website and invades the user level, which also makes the attacked website department anxious by the angry people.

The destruction of other detachments, no matter how serious, is only at the website level.

As a result, the 'website hanging eagle' has become a sign of being invaded, and almost all the media that reported on it have reported on the 'hanging eagle' pictures on the computer, and in comparison, the destruction of other detachments seems to be a bit of a small fight.

Although 'Hanging Eagle' does not have the function of Trojan horse or virus, it can make the user feel that there is a virus in his computer.

This is more powerful than Trojan horses and viruses.

The website departments that were 'hung eagle' could not find the reason for it in a short period of time, and in order to reduce the pressure from the public, they had to choose to temporarily shut down the server.

The overseas media that reported on the incident also named the intrusion program --- 'Cyber Black Hawk Virus', and the reports described the viruses as 'terrible' and 'temporarily unsolvable', and 'the attacked website can only shut down its servers to deal with it'.

The 'Cyber Black Hawk Virus' has quickly become synonymous with 'terrifying'.