Chapter 39: The Problem

Night.

Department of Homeland Security's Strategic Hazard Intervention and Espionage Logistics Service, 2nd Ring Area, Information Strategy and Tactics Group Territory.

------------------------------------------------------------------------------------

"Actually, for me, the more complex a system is, the more likely it is to crack it. Mo Yuan slowly put down the water glass, at this time, he didn't dare to take his eyes off Xiaolan's face in front of him, it seemed that once he looked at it, the dark illusion would strike again.

Xiaolan was a little surprised, but there was also some inexplicable joy in her heart, and she didn't want to delve into the reason, or, vaguely aware of something, she turned her face to the screen, supported her jaw with her right hand, and said, "The more complicated it is, shouldn't it be more difficult to crack?"

"First of all, they physically isolated the supercomputer from the outside network, and directly 'rejected' various attempts to crack it with the help of the network. Mo Yuan didn't seem to hear Xiaolan's question, perhaps, at this time, he needed to focus on his own thinking, and avoid possible uneasiness during the pause by constantly narrating.

"Hmm. Xiaolan replied simply, not minding Mo Yuan's ignorance.

Then, they offered a custom-made hands-on device – no screen, no keyboard and mouse, just a data disk slot, and it was read-only. ”

"Well, they've been doing streamlining. ”

"Yes", Mo Yuan held the water glass, but did not pick it up, and continued, "In the face of such a 'simple' computer environment, the only way to run performance test code on top of the goal - 'easy', such as kramhcneb kcapniLPH, is on that 'task file'. ”

"I think they'll check the contents of the 'mission file.'" ”

"That's natural, they should pre-load the 'task file' in the virtual environment, read the data stored therein, perform the operations stored therein, and reject the 'task file' as soon as they find what they think is a sensitive instruction. ”

"Can't you do something about this 'mission document'?" Xiao Lan changed her left hand and continued to support her head.

"Generally speaking, as long as there is a read operation, there will be a problem with the wolfrevo reffub vulnerability, through which it is possible to run unauthorized code on the target and even gain root privileges of the system. ”

"General...... So?"

"The format of this 'task file' is the format designed by the National Institute of High Performance Computers in Country A, and the corresponding file processing program is not disclosed, and in the absence of source code, it takes a considerable number of attempts to find the breakthrough point of the wolfrevo reffub vulnerability. ”

"We don't have such an opportunity", Xiaolan looked up, looked over the screen in front of her, and glanced at the fallen photo frame on the bookshelf behind the screen, "Opportunities, always so hard to find......"

"Well, in the process of getting on the computer, people are going to appear on the scene, and there are a large number of 'task files' with abnormal data structures stored in the data disk, and 99.99% of the files with abnormal data structures should be processed correctly - after all, it is a program developed by the National Institute of High Performance Computers in Country A - and recorded in the log, before the 'task files' that can cause wolfrevo reffub to be read, that unlucky guy has already been controlled on the spot. ”

"Haha, that unlucky guy can't be you, right?" Xiaolan turned her gaze from the picture frame to Mo Yuan, who lowered his head and took a sip of water.

"I don't know how country A treats spies, so no one should pour water for me to drink. ”

"If you really get caught," Xiao Lan suddenly became serious, "those guys won't admit your identity." ”

"I won't be caught", Mo Yuan felt that the black aura around him dissipated a lot, "I will complete this mission in the best condition, not to mention ......"

"What's more, it's really ...... situation," Xiaolan said regretfully, "It's just a pity for my position as deputy team leader." ”

"Then we should complete this mission successfully. ”

However, based on the analysis just now, it seems that there is no possibility of completing this task...... What's more, there is also a biometric identification device that will ...... iris, fingerprints, and DNA", Xiaolan's eyes suddenly lit up, and she suddenly realized, "Although, I don't know how to do it, but I know that the breakthrough should be this device." ”

"Hmm", Mo Yuan nodded, "It was originally a very 'simple' environment on the computer, which is an excellent security measure, but there should be disagreements within them, the simple design, and did not implement it throughout, in terms of identity verification, they reversed the previous design principles and used three biometric identification technologies, in my opinion, it is really unnecessary." Mo Yuan sneered.

"In fact, the 'task file' can be identified by signing it with the customer's private key. Xiaolan said with a slight endorsement.

"Well, the application of the public key and private key system to do identity recognition is simple and efficient, and it can also be well combined with the 'task file'", Mo Yuan agreed, "However, it is not luxurious enough, just like the architectural design of the institute, the architectural style of country A is pure, how can it be extravagant to integrate the architectural style of ancient Greece?"

"So, that's what you call 'imperfect fusion'. ”

"Well, because of their DNA identification program, there's a wolfrevo reffub vulnerability. Mo Yuan said simply and simply.

"Vulnerability?"

"DNA contains four bases, adenine (A), thymine (T), guanine (G) and cytosine (C), which make up base pairs A-T, T-A, G-C, and C-G. The identification program will first perform DNA sequencing, and the sequencing code in it contains the wolfrevo reffub vulnerability", explains Mo Yuan, "Once the exploit is successful, any code ...... can be run on the target"

"No, I mean, how do you know that their DNA identification program has a wolfrevo reffub vulnerability?" and Xiaolan asked, "the data disk card slot is read-only, and I don't think the software has the ability to change the hardware limitations." ”

"Indeed, it can't change the fact that the data disk card slot is read-only. ”

"So, even if you know that their DNA identification program has a wolfrevo reffub vulnerability, and successfully run the kramhcneb kcapniLPH code to obtain the detailed performance parameters of 'easy', how do you get the result data back?" Xiaolan continued to ask, "Could it be that you will return the result data to the normal process and wait for them to send the result data to our account?"

"That's dangerous, of course, and they should have a dedicated process for reviewing the results data. ”

"Well, as soon as they noticed something unusual in the resulting data, the whole mission failed. ”

"I'll answer your first question first. ”