Chapter 762: Bad Taste and Pranks
Someone had already left, and Tang Jiayi whispered to herself: "You must clean them up!"
Atletico's act of leaving the bedroom to deal with it was informative, and the guy was clearly unwilling to choose a peaceful and private way to solve the problem.
Although that social media is far away in the capital and has a competitor relationship with Bee Neck, as long as you contact the other party's executives, asking or asking them to delete the article and cover the picture, it should be able to achieve the goal, and if it doesn't work, you can still sue to ask for it.
However, this takes time, and the most lacking thing now is undoubtedly time, wait until the layers of contact have passed and then process it, these photos should have spread to the corners of the network.
Although the netizens who left comments are either praising the family's super-good looks, or ridiculing the ID photos and daring to PS, they are all praising the family for being beautiful, but a certain deep baby control patient is still unhappy after seeing this. Active baby drying and passive baby drying are completely two meanings?
The ridiculed private messages sent by her friends made her heart full of lingering grief and indignation, and she always wanted to do something to vent it. Therefore, knowing that Atletico Madrid was likely to use some shady means, she did not stop it as usual, and even supported her mentally.
Tang Jiayi guessed correctly, that guy did plan to use hacking to solve the problem quickly, but she didn't guess what the other party was going to do, otherwise she would definitely catch up and stop it. In the next ten years, whenever Zhizhi Tiantian and the others asked about it, Tang's mother would put on such a sad look to show her daughter.
On the way to the study, Atletico was already allocating the supercomputing and network resources in his hand, and by the time he sat down in the study chair, the staggering scale of resources was already in place and ready to launch a cyber attack.
Legend has it that clever hackers can easily launch cyberattacks with just a broken computer and a single network cable, because their thousands of troops are located elsewhere in the network, and some of them have servers and computers under their control to serve them. And other people's machines, even if they are damaged in attack and defense, they don't have to feel distressed at all, and it's a big deal to catch some chickens when they have time.
Atletico Madrid scoffed at this statement, because although the broiler network is effective in flood attacks, it has the disadvantage of low reliability, they are like vassal armies in ancient times, it is no problem to wave the flag and shout to fight with the wind, but it is easy to have problems once the situation is unfavorable or encounters unexpected interference. In his opinion, broilers can be used but cannot be relied on as the main force, and the key is the power under his direct control, so after he had money in his pocket, he immediately invested a lot of money and resources to build his own network war facilities.
This is also the confidence of Atletico Madrid to dare to consider himself the world's number one hacker, a hacker who is more talented than him does not have so much money to buy equipment, and a richer than him has no interest in playing technology.
Looking at the physical and virtual screens in front of him, his eyes swept over the rows of ready state data, Atletico couldn't help but feel proud in his heart, and he felt like he was sitting on the side of the army. The eye finally fell on the page of a website, "It's so happily decided, let's take you first!"
In addition to calling and suing too slowly, there are actually many ways to solve this problem, such as hacking that guy's account and clearing all content, or simply hacking the entire website so that no one can connect to it, which can basically solve the problem.
However, there is one problem that these two methods cannot solve, that is, there is no way to take photos that have been spread, and this is basically inevitable. In just a few minutes, the earliest blog post has more than 150,000 views, and there are a lot of forwards and favorites.
Thanks to the popularity of various website building software and cloud hosting space, building a website is becoming cheaper and easier, and the webmaster does not need to be proficient in configuring the server or anything, and can follow the operation instructions to easily get the next step to build a website. It's just that in this way, the public template also brings a common vulnerability, and as long as you find one, you can hack a large area.
Ordinary tool hackers may not be able to find such vulnerabilities, but for a guy like Atletico who can write their own tools and have the resources to discover and verify them, it is not a difficult thing to find and collect these vulnerabilities. So he easily got dozens of websites, replaced the photos on them with added versions, and then Shi Shiran cleared the traces and exited safely.
After all, the child's photos have been leaked, and now it is obviously too late to recourse, so he did not choose to delete the photos in a time-consuming and laborious manner, but added some special condiments to muddy the water, hoping to teach some people some lessons.
As for the other two websites involved in this matter, the blog is a bit more troublesome and can't be solved with public loopholes, so he will put it in the end and clean it up.
As for the household registration website of the source of the photo leakage, someone used to often run to check the information, so naturally there was a way to hack in, but Boss Ma pretended to let it go. After all, he is not the kind of idealist who is full of hacker spirit, and someone who knows what to touch and what not to mess with naturally understands the meaning of pretending to be blind when necessary.
Even if he hacked in, he didn't know who to trouble with, after all, there were too many people who were qualified to access these materials, and this was a design vulnerability in the system itself, and there was no way to do it. And although the picture virus he prepared this time will not be too destructive, it is more like a prank joke, but it is still possible to cause some damage if it is put there, affect the normal office order or something, and then harm more irrelevant people, which is also unwilling for Atletico Madrid.
"Hehe, it's really a good reincarnation of heaven, who does the sky bypass, I used to run over to check all kinds of happy information, and now I'm finally in this broken pit!"
The vulnerabilities of these small sites are almost all ready-made, and the hacking tools in hand can automatically fix them with a slight change, and soon the processed images of the poison are uploaded to thousands of websites. On the surface, these images appear to be normal and still display images, but he added a piece of malicious code, and there are six pieces of code in total, which are aimed at the most popular JPEG image decoders.
For uncompressed images, each pixel on the image occupies 1 to 3 bytes, and a large image of 10 million pixels is 10 to 30 megabytes (MB), which is obviously not conducive to network transmission and storage. Then there are a variety of lossy compression technology, among which the International Organization for Standardization ISO, the International Electrotechnical Commission IEC and the International Telecommunication Union ITU three giants to establish the JPEG technology is the most widely used, because it is used as an international image compression standard without additional patent fees, and soon by the digital camera and network industry love, now occupy the majority of the share of the network picture jpg pictures are processed by this technology.
If the browser or other software wants to display JPG images, it needs to call the system or its own image decoder. And JPEG is a standard developed in the last century, and most of the related decoders were written at that time, because it is easy to use and can be used, few people think of rewriting the code, after all, it is thankless. This gives the opportunity for new vulnerabilities to appear, after all, the size of mainstream images, the network environment and user equipment have changed dramatically in more than ten years, and some new situations are completely beyond the consideration of the original writers, and if you have the heart to find them, you can always find the problem.
In particular, the mainstream decoders of the four major platforms of indos, Android, iOS and BeeOS, are the focus of Atletico's search.
Microsoft has always been known for being good at "inheriting" vulnerabilities, as early as 04 years ago, the MS04-028 vulnerability was exposed, an attacker can use a malformed jpg image to execute a buffer attack, so as to execute arbitrary malicious code, and then cause the system to be poisoned or controlled. Although Microsoft has already fixed this vulnerability, and now the mainstream in7/8/10 system has only come out after that, this still does not guarantee that there are no similar problems on these three systems, anyway, Atletico's requirements are not high, not necessarily a high-risk vulnerability that can execute arbitrary code, and ordinary bugs that cause CPU and memory consumption to double due to execution errors are also possible.
Under the guidance of such a policy, he and his subordinates also found many similar vulnerabilities in the other three major systems, and the problems of their own BOS were naturally repaired as soon as possible, but the vulnerabilities of other people's houses were saved by him, and they were neither sold to international hackers, nor actively reported like white hat hackers, after all, everyone is a competitor, and of course the enemy must not.
Over the past few years, some of these vulnerabilities have been fixed and some have become obsolete with the obsolescence of the system, but there are still a lot of usable ones that have come in handy this time.
was busy invading more and more reprint websites, Tang Jiayi's avatar suddenly jumped out, it turned out that the eldest sister waited for a few minutes and found that there was no change, so she directly dialed the internal phone to ask about the situation.
Atletico said unhurriedly: "I'm working on it, it's progressing well, you can see the effect later!"
Tang Jiayi naturally understood the meaning of someone's words, and said at the moment: "You pay attention, don't go too far, don't expose yourself, don't capsize because of a small loss in the gutter!"
"Anla, my boat is powerful enough, I guarantee that it can't capsize," Atletico responded to the other party nonchalantly: "Anyway, daughter-in-law, you just wait to watch a good show!"
said so, but when Atletico Madrid returned to the bedroom after completing all the tasks, Tang Jiayi, who had been staring at the phone, still didn't find anything abnormal, and immediately cast a puzzled look on the other party's face.
"I've got it all done, and I'll see the effect soon," Atletico said, taking off the yukata he had just put on, putting it on a chair on the side, and then jumping on the bed in a posture similar to a back jump, the mattress was suddenly smashed, and Tang Jiayi was almost bounced off the bed.
"What are you doing?"
"Isn't it that it didn't fall," Atletico skillfully reached over, grabbed her and said: "Don't worry, if you really fall, wife, I will definitely rush over to you as a human cushion as soon as possible." ”
Tang Jiayi turned over, picked someone's hand aside, and said angrily: "Okay, okay, don't you just sell Guanzi and don't want to say it!
Atletico pretended not to see the disgusted arm, and said casually: "Actually, it's nothing to tell you, but are you sure you want to listen to it, daughter-in-law? ”
Although Tang Jiayi did not answer to express her approval or refusal, her action of picking up her phone and flipping through it showed everything, she had already bookmarked the blog post with a trumpet just now, and it didn't take a few seconds to check the status.
Then, a bright smile bloomed on her face, and she turned to Atletico and laughed: "Hey, you're too bad!"
The blogger who first spread the ID photos of the six members of the Ma family has now been drowned out by the overwhelming scolding, and his blog post replies are all cursed greetings without exception, as well as regretful and depressed version chats.
These netizens who scolded him are naturally the ones who have been recruited, and the picture virus released by Atletico Madrid will reset the picture cache immediately after infecting the mobile phone, and thus cause the system to be stuck and busy. When the reset is complete, the preview of all jpg images will turn into the most annoying small buffer circle pattern for smartphone users, which affects the normal use of some functions and looks very annoying.
This kind of attack is hidden and obscene, the mobile phone suddenly becomes stuck, everyone is no stranger, and the small buffer circle can see it everywhere, so most people didn't find anything abnormal at first, at most, they noticed that the phone was stuck and took the initiative to clean up the process or restart the phone according to the usual habits. It wasn't until you found that neither of these axes worked, and the photo preview never refreshed, that you realized that something was wrong with the phone, and you were anxious to find a solution.
However, these viruses are all freshly created by Boss Ma, and the attacks are all unpublished 0-day vulnerabilities, and those antivirus software naturally can't find and remove them in time.
Atletico Madrid left a way out for the victims, these viruses are not contagious, as long as all the image cache files and those few poisonous images can solve the problem. However, he avoided saying anything, just waiting for netizens to explore on their own.
It naturally takes a lot of time to bump out the solution like a headless fly, and netizens who were depressed before this certainly need a suitable punching bag, and then those websites and bloggers who spread photos of the six members of the Ma family have naturally become the target of everyone's attacks.
Especially those users who have not backed up their data and applications at the moment of resetting the big 1 method, they have become the main force of the scolding war at this time, so they will not regret their curiosity and gossip, and will only blame the blogger for poisoning them.