Chapter 142: The Nobles Among Hackers

An hour later, the first trial ended in a hurry, the court first read out the accident appraisal report provided by the network supervisor, the most powerful prosecution in history was beaten in the head, the layout prepared in advance was completely disrupted, and the rush to respond, but completely unable to withstand the offensive of the soft alliance, and finally had to temporarily adjourn the court to prepare for the second trial.

In the next two days, the two sides argued endlessly in court, exhausted all the tricks they could use, and the court basically reached a conclusion, preparing to announce the verdict in the near future.

The media who participated in the trial several times finally recovered from the arguments in the courtroom, and the words that the prosecution would win no longer appeared in their reports, and they began to feel that the soft alliance, which was absolutely weak before, seemed to have the possibility of turning the tables. Some media outlets that were unable to obtain first-hand trial information focused their attention on the recent activities of the Soft Alliance, and the fact that the Soft Alliance sent people to participate in the Black Hat Conference was actually dug up by one of the media from the blog of a foreign hacker, and once published, it was reprinted by many media.

It doesn't matter if this publication is published, everyone's eyes were instantly attracted to it, and everyone's attention to this matter far exceeded this most bullish lawsuit in history, and everyone wanted to know whether anyone could break through the ring set up by the soft alliance at the black hat conference. Even those who once hated the historical stain of the soft alliance itched to the core, at this time, they were uncharacteristic and supported the soft alliance, because the soft alliance also represents China's hackers, and if the soft alliance loses, as a Chinese, they will feel faceless. And if the soft alliance wins, the case will not be tried at all, and hackers all over the world will not be able to take the soft alliance, then those companies that come to sue the soft alliance will definitely sue the soft alliance, and they want to fuck with more pressure and less and bully others.

Although the Black Hat Conference would not allow the media to report and interview, some domestic media still sent reporters to Las Vegas to get first-hand information.

On the fifth day of the Black Hat Conference, the final keynote speaker was Sidney, Chinese one of the most controversial figures in the hacking community in recent years. It is said that this person was born into an aristocratic family, so he was born with a posture of empty eyes and contempt for life, and everyone is inferior to him, so whether it is in the hacker world, or the security world, or even the software world, this person is very unpopular.

But what everyone has to admit is that Sidney's talent in hacking is unparalleled! He is proficient in all the knowledge of the hacker circle, hardware, software, operating system core, communications, encryption, storage, databases, he knows everything. In terms of invasion, he has the ability to attack and defensively, he can also be foolproof, and even the chief cybersecurity adviser to the president of the United States has personally consulted Sidney during his tenure. It can be said that anyone wants to get a figure like Sidney, but Sidney regards himself as a nobleman, and his noble blood does not allow him to be subordinated and dominated, so so far, no institution has been able to hire this person to serve him, and no matter how rich you are, you can't hand it over to Sidney.

At last year's Black Hat Conference, Sidney gave a keynote speech entitled "Virtual Attack." Sidney said he had detected a new attack method in which hackers used unknown technology to carry out a virtualization attack that allowed hackers to "legitimately hack" your computer, databases, mailboxes, and instant messengers as long as they created a legitimate virtual account. Sidney called this method invincible and leaves no trace, and is a big problem for all security agencies to be aware of in the future.

This kind of virtual attack is actually the method used by Liu Xiao when he invaded telecommunications, and Liu Xiao called it "Sun Monkey Plucking Clone Method". Unfortunately, Sidney monitored the attack last year, but he did not know how it was carried out, and in the absence of an explanation to prove it, Sidney's speech was questioned by a small, blinding security agency.

Sidney was a man whose noble lineage would not allow his words to be questioned by others, so he was furious and took a stance, threatening never to attend the Black Hat Conference again, but he left three tools to detect virtual attacks, one by Simon Iron, a leader in global security, one owned by iDeface, and one by the cybersecurity agency of ZF in the United States.

Shortly after the hacking conference, all three of them used Sidney's tools to discover the virtual attack, which, as Sidney said, was indestructible, had no territory that he couldn't enter, and left no trace to trace it. The three families panicked and went to Sidney to ask for advice, but they were all closed. The three had to study it on their own, but because Sidney's detection tool was too rudimentary and ineffective, the three of them tinkered with it for a year and didn't figure out what the virtual attack was all about.

Seeing that this year's black hat conference was about to start, the three went to Sidney again, and they didn't know how many good things they said and how many kowtows, Sidney reluctantly agreed to attend the black hat conference, but his speech had to be arranged until the last finale, and he asked the conference organizers to never invite the security agency that had questioned him last year.

Because of this story, the venue for this finale speech was full, and there were even more people than at the opening ceremony, and many of them were fresh faces, and I don't know where they came from.

The "black wall" of the venue has stopped updating, everyone has taken precautions, and when they enter the venue, they turn off their mobile phones and don't bring computers.

Now everyone's focus has shifted to the "black wall" of the soft alliance, from the opening to the present, the names of the seventy-eight hackers who will challenge them have been hung on it. Seventy-eight warriors were like being "shown to the public", their names hung high on the "flagpole", a deterrent, but also a lure, the hackers attending the meeting wanted to see whose name would be hung on it, and at the same time looked forward to someone breaking through the firewall of the soft alliance as soon as possible. Everyone was more or less surprised that this Chinese hacker who participated in the conference for the first time really gave everyone a disadvantage.

Half an hour after the last lecture, but Sidney hadn't come out yet, and the staff brought all kinds of computers, large and small, with different operating systems and databases, as well as some application software. Everyone is looking forward to it, and it seems that Sidney is ready to make a big move this time.

There was a hacker who couldn't wait, so he jumped off the field and walked to the soft alliance area to challenge, and the camera at the venue fed back his every move to everyone. It can be seen that this hacker's level is not low, in less than ten minutes, he changed more than thirty attack methods, unfortunately, all failed, the sieve system just did not let him through.

Seeing that Sidney was ready to take the stage, the hacker had to give up, cursed hatefully "***", got up and walked to his seat. At the same time, the "head" of the seventy-ninth warrior was hung on the "flagpole", and the scene was silent for several seconds, everyone was sighing, and they were expecting that the eightieth warrior would not be so unlucky!

The president of iDeface, who accompanied Sidney to the stage, walked to the podium first and said, "The last keynote speech of this conference was a 'virtual attack' brought to us by Mr. Sidney. Before Mr. Sidney begins his remarks, I would like to say a few words on behalf of the General Assembly, first, on behalf of the General Assembly, I apologize for the unwarranted questioning that Mr. Sidney encountered at the last General Assembly, second, I would like to thank Mr. Sidney on behalf of the General Assembly for his tolerance and generosity, and finally, let us applaud Mr. Sidney's presence!"

Amid the applause of the room, the president of iDeface walked out of the room, and Sidney walked up, still with the same empty look of pride.

"Today, I'm going to bring you a topic that I talked about halfway through last year, virtual attacks. Sidney looked around the room and was pleased with the silence of the crowd, "Now, I'm going to finish this topic, and besides, there will be a new extension." Over the past year, I've completely cracked and mastered the modus operandi of this virtual attack. I still say the same thing, virtual attacks are invincible, and there are no good protective measures at the moment except for strengthening surveillance! In order to prevent some people from saying that I can only talk empty words, I will use a series of attacks to prove my speech!" Sidney's words were obviously angry, and he still had a grudge against last year's events.

Sidney walked up to one of the computers and said, "This is Microsoft's latest server operating system that has been patched and installed by Microsoft engineers themselves, and we have installed the best server anti-spyware and anti-intrusion software on this machine, which is provided by Syman Iron Shell." It can be said that this computer is very secure. Next, I'm going to show you a virtual attack!"

Sidney walked over to the other computer and said, "Now, I'm going to use this computer to launch an attack, first of all, I'm going to find the target of the attack, whose computer username is 'A'. ”

Soon, everyone saw the results on the screen, and Sidney found the computer called "A" in the network. After finding it, Sidney ran a piece of software, entered the "IP" of the other party's computer, and then filled in the virtual object "A", he suddenly stopped what he was doing, then looked at everyone in the venue, and said, "Now, as long as I press the button, then I am A!"

Sidney pressed the "OK Virtual" button, and the software instantly displayed that the virtual was successful, and the computer where Sidney was located appeared on the resources on Computer A. Through the big screen, everyone quickly saw that the anti-intrusion software on the computer A was first killed, and then a file was written down on the desktop, and then, all the resources on the computer were deleted, and finally restarted, and then it couldn't be turned on, and the computer A was completely finished!

"I'm computer A, I can do everything I can do on computer A!" Sidney said with a hint of pride on his lips.

Sidney changed to another computer, "This is a different operating system, this is a very rare kind of operating system that everyone basically does not study, let's see if the virtual attack works for him!", three minutes later, this computer B ended up with the same fate as computer A.

Now it's Computer C's turn, Sidney said: "This is a computer that is exactly the same as Computer A, and now I'm mainly going to let everyone see it clearly and see if there will be any traces after the virtual attack." Sidney entered computer C again, he left a file on the desktop of computer C, and then he used all the means for security detection and intrusion analysis, and all the people present saw it clearly, and did not find that the system record found the slightest record involving the operation of writing the desktop file just now, but the file was obviously written on the desktop, and everyone just "ah", this is too terrifying!

"No operating system is spared, so let's take a look at the database, and see if these encrypted databases, which must be accessed with permission, can survive?" Sidney walked over to the next computer and began his demonstration. Within ten minutes, the three most widely used databases in the world were all lost, and the strict data protection measures were not at all defenses in the face of virtual attacks, Sidney easily entered, obtained all the data he needed, and added and deleted them at will.

The people in the venue were speechless in surprise at this time, but Sidney hadn't finished counting, "Just now this is just a demonstration in the local area network, now let's find some targets on the public network to try to see if the virtual attack is also effective." Sidney typed the URL into his computer, and when the page opened, everyone exclaimed, because the first target Sidney had come to try out was the website of Syman Iron. The representative of Simon Iron Shell at the scene had a blue face, he was very dissatisfied, but he did not dare to protest out loud.

In the astonishment and outrage of the attendees, Sidney spent less than ten minutes publishing an announcement on Syman's Ironclad website with the headline: "The era of virtual attacks is coming!"

Then he entered a dating site, and a few minutes later he called up the profile of the dating user of this site, and to everyone's surprise, the name of the president of iDeface also appeared in the dating directory, according to the website records, the president of Deface was very embarrassed by this, but fortunately there was no shame in this.

Sidney then logged in to ICQ, set it up on his tools, and then he created a virtual number for an online user, and soon everyone found out that Sidney's ICQ had received the communication message from his virtual object. Everyone was a little confused, if, just an if, if the president of the United States also used ICQ, then ......

Before everyone could come to their senses, Sidney pulled out an even heavier bomb, and this time, everyone really felt like they were going crazy.

Sidney opened a blog site, clicked on a random post on a person's blog, he wanted to rate the article, and in the reply box, Sidney first typed some code, then some text, then set up his own tool, and finally submitted the reply.

At first, everyone didn't understand what Sidney meant, but after Sidney opened the website of New York City ZF, many people in the audience stood up at once, because the latest announcement on the city ZF website turned out to be the text that was replied to on the blog. Sidney kept revising that reply, and the announcement on the city's ZF website kept changing its content.

The scene exploded, and all the people went crazy, how could this be possible! The target of the operation was obviously the blog site, how could the result be displayed on the website of the city zf, the blog site and the city zf website did not even link, how did this operation be done, everyone couldn't believe their eyes.

Sidney finally left his computer and slowly paced back to the podium, his face full of unconcealed pride and pride, "Please be quiet!", Sidney ordered the audience.

The venue slowly calmed down after a long time, and everyone waited for Sidney's explanation, and Sidney said: "As you have just seen, virtual attacks can even be two-way, he can virtualize the target he wants to attack, and he can also virtualize himself into anything. Maybe one day, the U.S. defense system is compromised, and those cybersecurity officials track it down, only to find that the attack came from a blog post, or a picture, or a video, but it was not the computer or IP they wanted. ”

"Wow!" the crowd exclaimed, they finally knew what was going on, but what they didn't know was how Sidney did it.

Sidney waited for everyone to be quiet again, and said: "Whether it is in the local area network or the public network, the targets I have chosen have a relatively high security factor, but they are vulnerable in the face of virtual attacks, which is enough to show that virtual attacks are invincible." Virtual attacks will become a new type of attack, and this should be taken seriously by all. Next, I will briefly explain the principle of virtual attacks, and in addition, I will give out ten copies of virtual attack software, and ten copies of tools to monitor virtual attacks. ”

For the third time, there was a commotion, the technocratics who had been waiting for Sidney to explain the principle and hoping that they would get the tools Sidney had provided, while the representatives of the security agencies were stupid and adamantly disapproved of Sidney's actions. As long as they know the principle, even if they don't give them the tools, they will be able to figure out a way to attack them sooner or later, and the Internet around the world will not be chaotic at that time. But there was nothing they could do to stop Sidney, and although the Black Hat Conference had stopped advocating unlimited sharing in recent years, he had started by exchanging and releasing virus programs, and Sidney had every reason to follow past conventions. Besides, Sidney's explanation of the principle is not necessarily to encourage everyone to attack, maybe he is just letting everyone know that there is such a technique, and everyone should pay attention to and guard against it.

Sidney used the sound of the venue to silence everyone again.

Everyone was quiet, and Sidney was ready to speak. A person in the front row of the venue suddenly stood up at this time and pointed to the corner of the soft alliance next to him, "Mr. Sidney, your invincible virtual attack, I don't know if you can take down this machine!"

Everyone in the audience looked at this person, this guy was definitely nervous, everyone had been restless three times, and this guy seemed to have just recovered from the second restlessness, otherwise how could he ask such a question.

Sidney frowned, there was a guy who didn't open his eyes last year, and he made himself uncomfortable for a year, why did he jump out of another one this year, he was extremely unhappy! But he still glanced in the direction that the other party was pointing, looking at Sidney's expression, it seemed that he didn't know the purpose of the two computers in the corner!

The president of iDeface stepped up to the front desk and whispered a few words in Sidney's ear, presumably to explain to him the purpose of the two computers.

I saw Sidney nodding after listening, stretched out his hand and pointed at the person below, and said, "There is no problem, I will prove it to you!"

This book was first published

The staff of the conference hurriedly took the stage and linked Sidney's computer to the computer equipped with the software firewall of the softalliance. Everyone was watching every move of the staff, and they were expecting Sidney to make another move, but everyone had already decided on the outcome.

With Sidney's previous series of performances, it is estimated that no one except the mentally retarded man would doubt Sidney's invincible virtual attack. Everyone looked at the "black wall!" of the soft alliance full of names, and they all had one thought in their hearts: seventy-nine, at the end of the day, there will be no more, and the one who will appear below will be the Terminator, who will end the magical performance of Chinese hackers at this conference!

Once the staff had made the link, they signaled Sidney to get started. Sidney slowly walked over to the SoftAlliance's machine, and he looked at the machine's username, Jeffan, a very common English name.

After Sidney wrote it down, he went to his computer, entered the IP and user name of the soft alliance machine, he almost didn't pause, and directly pressed the "Confirm Virtual" button, in his mind, the result was no suspense, his attack was foolproof, and there was no possibility of failure.

Sidney looked up, ready to listen to everyone's applause again, but received an exclamation from everyone, Sidney looked down and found that on the computer screen, his tool popped up a prompt: "Virtual failure!"

"This can't be!" Sidney looked surprised, and stood stupidly for a few seconds before coming to his senses, he entered the IP and username again, this time he also checked it to make sure that his input was correct, and then pressed the "Confirm Virtual" button, and the tool popped up the "Virtual Failed" button again.

There were no exclamations, no applause, just quiet, quiet, unprecedented, so quiet that you can't guess what these people are thinking.

Sidney looked a little panicked, he ran over again, confirmed that he had not misread the username and IP address, and then went back to his machine and pressed the "OK virtual" button, or "virtual failure", Sidney was not reconciled, and pressed it more than ten times in a row, and the screen was covered with "virtual failure" prompts.

Sidney slowly raised his head, the pride on his face was gone, he stood in front of the computer in a daze, his face showed a trace of confusion, this, what the hell is going on!