Chapter 222: Self-contradiction
"General!" the room full of informants stood up and saluted, and the people who came in were all covered with golden stars on their shoulders.
The person in charge raised his hand and returned the salute, "Go ahead!"
The informants sat down again and went about their work.
An officer who copied the on-site command walked over and said, "General, what do you need to serve?"
"Where is the thing I got from Liu Xiao's mailbox?" asked the person in charge.
"Over here, please follow me!" the field commander raised his hand and led the way, and the bunch of stars followed.
Walking into a small room next to the hall, there were only seven or eight busy inside, and a few were monitoring the constantly refreshing numbers on the display on the wall, and I didn't know what they were.
The commander came to a computer, "Here are the things I got from Liu Xiao's mailbox, all here!", the commander pointed to a thin young man on the side, "This is our expert in charge of hacking technology, Sean, the specific situation, he will introduce it to the general!"
"Hello General!" Sean greeted, and then said, "First of all, I want to say that if all of this information is true, it will be invaluable, and the most cutting-edge questions in the cybersecurity community can be answered in these materials." We asked linguists to interpret the names of these documents, which include the core technology and design concepts of the policy level, the principle and implementation of instantaneous defense, just these two items, can greatly improve our defense capabilities in network security, and there are many other attack things, such as the principle and implementation of virtual attacks, the design method of multi-level organ programs, the design method of trigger programs, and the tools to penetrate policy-level firewalls. In addition, these documents also include some secrets about the future development direction of SoftAlliance Technology. ”
"Are these things really reliable?" the person in charge asked.
Sean shook his head, "This needs to be tested to know, I'm just responsible for cracking the password of this mailbox, and the rest of the work will be done more professionally!"
The person in charge looked sideways at the on-site commander, "When will the expert in charge of verification arrive?"
"Report to the general, it's already on the way, it should be there soon!"
"Very good!" the person in charge bowed, "After a while, the experts will arrive, and I think we can start with these attack tools to verify whether they are effective or not, and then we will know if they are true or false." Especially the tool that penetrates the policy-level firewall, we must carefully study every detail, we need to know the reason for the total purge in China this time!"
"Yes, General!" the commander said.
"Report!" someone shouted outside the door, and then pushed the door in, "Report, the laboratory is ready, and the experts are in place, please do you want to start!"
The commander waved his hand, signaling that he knew, and then said to Sean: "You take these things to the laboratory, hand them over to the experts, and follow the general's instructions, and start analyzing them immediately!"
"Yes!" Sean replied, bending over the computer and starting to operate, teleporting the things he got to the lab.
"Let's take a look at the lab!" suggested the person in charge at this point.
The stars behind him all nodded, and everyone actually had some expectations for these things seized from Liu Xiao's mailbox, so they all wanted to see with their own eyes whether these things were useful or not. Only the two stars just now didn't nod, "I still have some things to deal with on my hands, I'll go over later!"
The person in charge was a little displeased, but he didn't say anything, and went to the laboratory with a large number of stars.
When a group of stars rushed to the end of the laboratory, those things had already been transmitted, and the experts who were dispatched had already made a preliminary survey of the things, divided them into categories, and were assigning work.
"General!" a man walked over and saluted to the stars, "I'm the person in charge of this operation, Lieutenant Colonel Adleman!"
"Let's talk about the situation!" the person in charge raised his hand and returned the salute.
"There are two main categories of data, one is theoretical and the other is instrumental. We've verified that all the tools are working and that they work, and we'll have to do specific tests to find out. But all the theoretical data is encrypted, and it is not yet known what encryption method is used, and we have arranged a team to be responsible for decryption and restoration!"
"Very good!" the person in charge bowed, and the data encryption proved that the data was valuable, "Then let's test those tools first, and you must keep a record of every detail." ”
"Yes!" said Adleman.
"If nothing is wrong, let's test the tool that can breach the policy-level firewall first, and a few generals and I are trying to see if this tool really works. Our critical network has just procured and assembled a batch of policy-level firewalls, which is a matter of national security, and we can't be sloppy!"
"Yes, I'll arrange it right away!" Adleman saluted, and ran over to deploy his men to test the tool that could breach the policy-level firewall.
Several star watching experts were already in place, and they stepped forward.
Adleman continued: "There are two tools that can break the policy-level firewall, one is an automatic attack, and the other is an attack code that requires you to type in to carry out the intrusion, and the corresponding attack code has also been handed over by the technical department. ”
"Let's get started!" the person in charge raised his hand.
"General!" Adleman frowned, "The lab is not equipped with a policy-level firewall!"
"Get some sets right now!" the person in charge instructed the stars behind him.
"The policy-level firewall is specially supplied by FSK, and we have ordered it before, but because of the action against Liu Xiao, the product cannot be delivered, and FSK has only supplied us with hundreds of sets first, and they have been configured in some key networks for testing, and it is really not superfluous!" said a star in the ear of the person in charge.
The person in charge frowned, he almost forgot about it, the goods he ordered from FSK had not yet fully arrived, he thought for a long time, and said: "Then let's test it in actual combat, and see if the strategic-level protective wall is as strong as the legend!"
"We've tested it!" the star continued to whisper, "in Estonia, in Russia......"
The person in charge waved his hand, "There is a saying in China, called self-contradiction, the spear is the sharpest spear in the world, and the shield is the strongest shield in the world, but no one knows whether the shield is strong or the spear is sharp, we will solve this thousand-year-old trouble for them today!
The words of the person in charge caused everyone in the laboratory to burst into laughter.
"That's it!" the person in charge turned to look at the star who was talking to him just now, "You go and call up the data of the key networks equipped with policy-level firewalls, and randomly pick out ten addresses from the middle, let our experts test them, if the policy-level firewall is not as good as the legend, we will ask FSK to return it!"
"Yes!" the star has nothing to say, he is the boss, and he has made a decision, and he just needs to do it.
Ten minutes later, ten IP addresses were taken to the laboratory, it was still the star, he walked up to the person in charge and said: "Ten addresses, three of them are the servers of our intelligence department, and the remaining seven, I have also notified their subordinate units and told them to do a routine test!"
"Good!" the person in charge bowed, "Let's go!"
The star handed Adleman a note with the IP address on it, and did not forget to instruct, "Remember, let's start with the server test in our intelligence department!"
"Yes!" Adleman responded, turning around and sending the IP address to the experts, "Let's start, machine 1 uses automated attack tools, machine 2 uses manual attack tools, you each assign IP!"
A few of the stars leaned over to the computer to see more clearly.
The experts ran the two tools, each typed in an IP address, and got busy.
"It's in!" In just a few seconds, the expert using automated attack tools shouted, "It's on our server!"
The stars leaned over, and sure enough, the screen showed that it had successfully connected to the target address, and now it showed some information on the target server. As the expert types in some commands, more detailed information about the target server is constantly displayed.
"I'm in here, too!" another expert called out, and everyone looked over to see that the situation on his side was exactly the same.
"It seems that the policy-level firewall is nothing more than that!" the person in charge smiled at this time, what he was thinking of now was not to return the goods, but that after he had this tool in his hand, he could easily enter the key networks of various countries, which was a universal pass for his intelligence department. At this moment, a strong confidence suddenly appeared in the heart of the person in charge, although he lost the entire Chinese intelligence network, but if he can exchange these tools, then what kind of intelligence he wants to obtain, it is simply as easy as a finger, this transaction is definitely worth it.
"Try something else!" the person in charge came back to his senses and hurriedly ordered, "Try a few other IP addresses and see how stable this tool is!"
"Yes!" Adleman hurriedly dispatched the remaining IP addresses, and the experts all started testing. In just a few minutes, all the results came out, and all the invasion was successful!
"Great! Great!" the person in charge became excited, pacing a few steps around the room, "With this tool, our intelligence department can show its strength!"
Several other stars also realized the usefulness of this tool, and immediately took action, issuing a gag order to the experts: "Because this tool is very important, from now on, I hope that all of you here can keep this secret!"
It's all about intelligence, and whoever doesn't know who's mind, all the experts nodded.
"Okay, it seems that these things obtained from the mailbox are indeed of great value!" The person in charge looked back at Adleman and said, "Lieutenant Colonel Adleman, the task of comprehensively analyzing and cracking these things is entrusted to you, and you are fully responsible, if there is anything that needs to be coordinated and coordinated, you can come to me directly!"
"Yes, General!" Adleman snapped, "I'm honored to accept this mission!"
"Then I won't disturb your work!" said the person in charge with a smile, and then turned to look at the stars, "I think we need to come up with a plan as soon as possible!"
A few other stars nodded their heads, and even the best things had to be planned.
"We have to come up with a plan quickly! But it's not how to use these tools, but how to clean up the big trouble caused by these tools as soon as possible!" The two stars who didn't follow before walked in at this time, and saluted in front of the person in charge, "I just received a report, because our tests have caused the system of the critical network to be locked and unable to operate normally, and it needs to be solved immediately!"
"What's going on?" asked the person in charge.
"As soon as we started testing, the policy-level firewall over there detected it. However, because the network management of these servers received a notice that this was a normal test, they did not intervene, and the firewall locked the system of these servers when they could not receive the manual processing advice, which led to a chain reaction of all policy-level firewalls in the entire network, and we have at least three key departments in the network into ownerless automatic operation, including our intelligence department. Now it's the computers that are equipped with policy-level firewalls that are giving us orders!" the two stars looked at the person in charge, and now he finally had the capital to roar.
"This can't be!" Adleman was the first to question, "We can obviously operate those computers just now!", Having said that, Adleman hurried to the computer and said to the expert: "Test it now and see if the situation is true!"
The expert ran the tool again, re-typed those IP addresses, and strangely, it still showed that the link was successful.
"How's it going?" the person in charge came over and watched.
"The invasion is successful!" Adleman was also a little puzzled, he pushed away the expert, personally went over and typed a few commands on the keyboard, and then stood up with a dead face, "Report General, although the invasion was successful, we only have the permission to browse the directory, and we can't open the specific files on the target server, nor can we move, copy, or delete these files! Preliminary estimate, it's ......"
"What's that!" the person in charge also became angry, staring at Adleman, his eyes about to erupt with fire.
"It was the Firewall that discovered our intrusion, it deliberately let us in, and then locked the permissions!" Adeleman felt as if he had fallen from heaven to hell, and he didn't dare to look at the person in charge with five golden stars on his shoulders.
"Contact FSK immediately and ask them to send someone to clean up this mess!" the person in charge was furious and walked away. Self-contradiction, self-contradiction, there is such a thing as self-contradiction in this world, this is really not a joke, I saw with my own eyes that the sharpest spear passed through the strongest shield, and immediately saw that the strongest shield resisted the sharpest spear, and I really couldn't tell whether it was a spear or a strong shield.
After the person in charge left, the star who personally selected the IP address stood there wiping a cold sweat, fortunately he didn't pick the server of the traffic department just now, otherwise all the police would have to go to the street to direct the traffic now. But I picked the servers of three intelligence departments, this sin is not small, the intelligence department is the eyes of a country, now I want to see where I want, I can't help myself, I have to listen to the computer, I have been in the industry for so many years, or the first time I have encountered such a depressing thing.