Chapter 511: Counterattack, SQL Injection!(3/4)
A spy called Latin America stole Aihua's core technology through layout, money opening, and erotic lure.
and successfully smuggled to the three countries of Afghanistan.
Prepare to enter the United States through the third party of the Three Kingdoms.
However, the matter was soon revealed.
The country's security personnel overseas recovered the technology in a timely manner.
Just as the security personnel were preparing to bring the technology back home.
encountered the most severe interrogation in history.
In order to curry favor with his master, Ah Sanguo actually dispatched a new 100,000 police force in a frenzy.
As a result of the repeated sieges, all the Xia people in Xinli suffered.
All of them were put under house arrest and began to be investigated one by one.
The NSA intelligence also shows.
It was precisely because of this investigation that in desperation, the USB flash drive was destroyed.
But you think the destruction is over?
A total of 32,000 Xia people, including Xinli, were all imprisoned.
"Ahhh.......h
In the conference room, an official named Li Xia shouted loudly to vent his dissatisfaction.
"It's too much, it's crazy!"
"In order to get this technology, we did not hesitate to gamble with more than 30,000 lives. ”
The A of Hearts said in a deep voice: "I believe everyone has also read the information in their hands!"
"Let us observe a minute of silence in memory of this brave intelligence officer. ”
The Ace of Hearts takes off the hat from his head and places it on the seat, folds his hands, and closes his eyes.
The rest of the people in the room also learned his movements.
A minute later.
The ace of hearts said in a deep voice again: "When this matter is completely over, we are saluting the sacrificed intelligence soldiers." ”
"Now I announce two things. ”
"First, notify cybersecurity technicians and participate in the counterattack. ”
"Second, inform the combat troops, no matter what kind of way or method you use, no matter how many people you sacrifice, the remains of our soldiers must be recovered and buried on our land. ”
"Now, is there anything else you'd like to say?"
"Report, no!"
"Then carry out the order!"
"Yes!"
.........
2 p.m.
The cyber counterattack has officially begun.
What is claimed to the outside world is that the spontaneous behavior of hackers in Xia Guomin is actually more or less involved in this.
And also got a lot of injection tools.
Commonly known as SQL injection tool.
It is a Structured Query Language (ST
uctu
ed Que
y La
SQL, or SQL, is a special-purpose programming language that is a database query and programming language used to access data and query, update, and manage relational database systems.
To put it in layman's terms, whether it is the web page that everyone visits on the Internet, it is still listening to songs, watching videos, or playing games.
There is a SQL figure in it.
It's also a way for online companies to get information.
To put it simply, you only need to log in to an account in the Goose Factory to play the game.
As long as the products under its umbrella can be realized through the goose factory account.
It's really just a way of using SQL.
To put it bluntly, the database contains all your data.
When visiting its website, you only need to log in to the goose factory account, then in the database, he will write a, what time and minutes and seconds of so-and-so, what game to log into, and what kind of character is created.
All you have to do is hack into the database and get the highest privileges, and you can make the changes accordingly.
That's tampering with data.
Take the king as an example, why is it divided into a goose factory data and a VX data?
Log in, the level roles on both sides are different.
This is actually because the SQL on both sides is not the same.
That's why this change is happening.
SQL is not infinite, but relatively topped, and when a certain limit is exceeded, data overflow will occur.
This allows hackers to take advantage of this to break into the database.
Of course, it's easy to avoid adding servers to your database.
The server is equivalent to capacity, 100 square meters of room, 5 people, you may feel more crowded, if you change to 10,000 square meters, or even 100,000 square meters of room?
Do you still feel crowded?
Of course not.
What is overflow?
To put it simply, when the data is about to be full, a piece of data is forcibly stuffed into it, making him unable to fit it, which is overflow.
You can also think that a 10-square-meter room, originally for 5 people, would feel more crowded, at this time, two of them were pregnant with babies and gave birth in a brittle way.
And it's not a single one, ten or eight were born at a time.
So is a 10-square-meter room still 5 people?
Definitely not, at this time it will be considered a baby.
So 10 or 20 people, you will feel very crowded, so how many are magnifying a little?
Become 100, 1000?
Of course, this is just an example, and it is impossible for anyone to really give birth to so many.
But in the context of the digital network, this is true.
And it's not 100, 1000 or so on, it's infinite.
When the limit is reached, SQL overflows, like a reservoir in a dam that needs to be discharged before he can continue working.
The principle is the same.
But these are only theoretical data, and in reality they have not yet reached such a level, or that no computer has reached this level of computing power, which can be infinite.
......
The SQL injection tool given by the military can be regarded as a digital brittle tool.
You only need to operate a few simple keys above and enter the IP address of the other party, and this data can be transmitted through the other party's port, causing the opposite database to overflow.
And through the unique hacking software, also known as SQL reading software, you can read the overflowed data from the purpose of controlling the computer.
Soon.
Tens of thousands of hackers who participated in this counterattack have all obtained this tool.
One unit inside the building.
A 15-year-old boy stares at the computer screen in front of him with excitement on his face.
"Hahaha, it worked!"
"This software is really amazing, it's amazing. ”
The little boy looked excited, he was also a hacker.
It's just a peripheral member of the hacker alliance, and it doesn't involve the core secrets inside.
I don't know even more about this operation, and the military also played a role in fueling the flames.
I was able to get this software because he actively participated in the registration.
The little boy took a screenshot and posted it to his circle of friends.
"Ah Sanguo, I'm just rubbish, it's just vulnerable!"
..........