Chapter Seventy-Six: Route Hijacking

Yang Qing looked at the download link that was interrupted again, and said secretly in his heart: "It seems that the other party is on guard, and it is impossible to download the complete database!"

"Well, you can't use general vulnerabilities anymore, two general vulnerabilities are already very painful, and now that these data are enough, then let's focus on cracking down on services!" Yang Qing set the next goal in his heart.

Obtaining user data is one purpose, and the other purpose is to make WeChat unable to operate normally.

In the eyes of ordinary people, hackers can do anything, but there are very few things that real hackers can do, such as deleting server data, if it is an ordinary small company, this trick is very effective, but slightly larger companies, the servers used are physically backed up. A server is not only a backup computer room with multiple remote locations, but also each server in the computer room will back up the data of the hard disk, just like a computer has two hard disks, one hard disk is the main hard disk, used to run the system, and the other hard disk is a backup hard disk, all the data read and write operations on the main hard disk will be synchronized on the backup hard disk, which is directly carried out at the hardware level, hackers can directly delete or format the main hard disk, but there is no means to operate the backup hard disk, this is isolated at the physical level。

If it can be deleted, Yang Qing will delete it directly, but unfortunately, it can't be done, unless it is physically destroyed, otherwise it is a fantasy to directly delete a company's data through the network.

There is no way to delete the data, so copying the data is a very effective means, and the other is to make the server have no way to work normally, which is usually the easiest and most effective to use DDOS attacks, but for companies like Penguin, DDOS is not so easy to make, when attacking Zhongyin Network before, it encountered overseas protection, near-source cleaning protection, Yang Qing feels that now the use of DDOS to attack Penguin will not have much effect, and now Hive not only has to maintain the migration network to ensure that its IP is not traced but also decrypt the data, if the DDoS attack is carried out, then the load will be intensified, so that the risk of self-exposure is greatly increased, and it is easy to be traced.

It was Yang Qing who decided to start with the public router next.

"Parse Communication Packet ......"

"...... in Routing Information Analysis"

"The routing information is extracted. ”

Open the hound, Yang Qing entered the IP address of the router, and then began to try to connect.

"Vulnerability testing ......"

"The test is successful, the terminal with IP 10.23.43.** has been successfully linked, and the router brand is Cisco. ”

"The test is successful, the terminal with IP 10.39.56.** has been successfully linked, and the router brand is Warwick. ”

"The test is successful, the terminal with IP 10.58.89.** has been successfully linked, and the router brand is Cisco. ”

β€œβ€¦β€¦β€

Looking at the terminal consoles that kept showing successful connections, Yang Qing began to enter commands with both hands.

"Smack...... Syllable...... The keyboard sound of "pop" was continuous, and the echoed information was printed out on the terminal.

"Intercept code implanting ......"

"Packet Signature Implanting ......"

"Initiate two-way interception. ”

"Packet Interception ......"

"The amount of data that has been discarded is ...... 56MB…… 1GB…… 2GB……”

"Ahaha" Seeing that the intercepted data packets suddenly began to rise, Yang Qing couldn't help laughing: "Give me the national plane!"

…………

Penguin Cyber Security Department

Liang Tao is urgently patching the server vulnerability.

"Patching ...... in progress"

"Installation complete, syncing all server ......"

"Synchronization complete. ”

Seeing this, Liang Tao breathed a sigh of relief and said loudly: "The vulnerability has been patched, and the server is now online." ”

"The server is back online and monitoring the data!"

Suddenly, a person stood up and said loudly to Liang Tao: "Minister, the server can't receive any handshake requests, our data has been intercepted!"

Liang Tao didn't care about scolding people when he heard this, so he quickly left his seat, came to the person who spoke, looked at the data displayed on the computer, and Liang Tao said loudly: "Route hijacking! Check it immediately to see which routes have been hijacked!"

Route hijacking is a very rare attack method that does not attack the target's server, but rather the operator's router that leads to the target's server. Whether it is the information sent by the server, or the information sent by the user, they will be forwarded through layers of routing to reach the ultimate goal, as long as the router is hijacked, then you can control the router to process all the packets that are requested to be forwarded, you can discard, you can also modify, usually the difficulty of modification is relatively large, the general information is encrypted before transmission, if there is no need, no one will decrypt the encrypted data packets, which is too time-consuming, and meaningless, Yang Qing only needs to discard all the packets sent from the penguin server and the packets to the penguin server。

Every router on the network is like a train station, every passenger is a data packet, at this time, if the station is hijacked, then you can check every passenger who passes through the station, if it is found that it is to the penguin, or from the penguin, then let the passenger get off, that is, the data packet is discarded.

After instructing his subordinates, Liang Tao came to Meng Lu's side and said, "Haven't you found it yet?"

Meng Lu said with an ugly look on his face when he heard this: "Boss, do you think this is a hornet needle?"

Liang Tao looked at the screen when he heard this, and a row of decompiled code appeared in front of Liang Tao, looking at this code Liang Tao asked, "Did you get it from the attacking IP?"

Meng Lu nodded.

Liang Tao patted Meng Lu on the shoulder and said, "We have met an opponent, you continue to investigate!"

Hua Yueshan, who returned to his seat, asked, "Did you find anything?"

Liang Tao replied: "Our opponent is the hornet needle that attacked the Zhongyin network before!"

Hearing this, Hua Yueshan asked rhetorically: "Is that the hornet needle that forced Ding Sanshi to use overseas protection?"

Liang Tao nodded and said: "That's right, now the other party has used two general vulnerabilities to copy away some of our user data, and now they are turning to the operator's router, which shows that the other party's technology is very comprehensive, and this must be a top hacker team." ”

"Can you prevent it?" Hua Yueshan asked.

Liang Tao said: "I can't prevent it, now the other party is not attacking our server, but instead attacking the operator router that is not within our protection range, which is cutting off our service at the network transmission layer, and now we can only enable regional servers to deal with it." ”

"Hmm!" Hua Yueshan nodded.

"Start a regional server!"

"Switching ......"

β€œβ€¦β€¦β€