Chapter Seventy-Five: Solid Logs

The opened file, whether it is the username or the password, is a string of 32-bit strings, seeing this string, Yang Qing couldn't help but scold: "Even if the password is encrypted, why is the username also encrypted?"

A 32-bit string of numbers and letters is a very common and effective means of data encryption, they turn any character into a string of 32-bit characters through an algorithm, this way is so that hackers can not get the user's sensitive information even if they download the database, but generally only the password is encrypted, and few companies will also encrypt the username.

Yang Qing was helpless in the game, but then Yang Qing laughed again, it was just a waste of time, just calculate it.

The encryption algorithm of MD5 is public and can be used by anyone, but the advantage of MD5 is that it is irreversible, you can encrypt, but you cannot reverse decrypt, which is why MD5 is used more.

For example, if the user's password is 12345, the generated string is fixed, as long as the hacker also uses 12345 to generate a string and compare it with the database, if it is the same, then the user's password is 12345.

What Yang Qing has to do now is to generate a password dictionary by himself, generate md5 strings from some weak passwords commonly used by users, and then compare them with the database, so that those users who use weak passwords can be screened out, and how many users can be screened depends entirely on whether the password dictionary is strong or not.

As for the username, it's even simpler, if it's the username of other websites, Yang Qing still has a headache or simply gives up, but the penguin's username is basically a number, a mobile phone number, which is much simpler, as long as there is enough computing power, you can compare all the usernames one by one.

Yang Qing's hive has 20 million zombie computers, these computers can perform calculations, although the performance of each computer is not as good as that of professional servers, but so many computers have surpassed many large data centers in terms of overall performance.

Open the compiler, Yang Qing began to write data comparison software, this software is relatively simple, as long as the continuous cycle of comparing data can be, Yang Qing estimates that he can write it in just an hour.

…………

WeChat has been down for more than half an hour, and countless users who log in to WeChat see a line of prompt: "Connection failed, please check your network settings." ”

At first, users thought that there was a problem with their own network, but then they saw reports from other websites and the media.

"The latest news, WeChat is suspected of being hacked to paralyze for more than half an hour. ”

"Netizens have posted on Weibo that their WeChat cannot be logged in!"

"Shocked, WeChat has gone out of business?"

"Is your WeChat okay?"

"Ah, I said why can't I receive the message, it turns out that there is a problem with the WeChat server!"

β€œβ€¦β€¦β€

"Look, there's an announcement on the official WeChat website!"

"It's temporary server maintenance again, let's lie to the ghost!"

"Whether you believe it or not, I believe it!"

β€œβ€¦β€¦β€

…………

Penguin Cyber Security Department

Liang Tao tapped quickly on the computer with both hands, and Hua Yueshan, the boss of the penguin next to him, asked, "Have you found the vulnerability?"

Liang Tao replied: "Found it, I'm writing patching code!"

Hua Yueshan nodded, not bothering Liang Tao.

No one in the entire department spoke at this point, only a series of incessant keyboard taps.

"The vulnerability has been patched!" Liang Tao shouted: "Open the main server!"

"In addition, turn on the real-time log check, you check the log of every latest change for me!" Liang Tao commanded loudly.

……………

Yang Qingzheng implanted the written password matching software into the honeycomb network, and after the software began to be executed, he turned his attention back to WeChat.

Yang Qing said secretly, and then controlled the hound to link to the server again.

"Link failed!"

"Vulnerability No. NGR23490948 test failed!"

Seeing this prompt, Yang Qing secretly said in his heart: "Sure enough, it is a big company, and the loopholes have been patched so quickly!"

"No, the first step I took to enter the server was to delete the server logs, without the logs, they would not be able to analyze the general vulnerabilities anyway, is it?" Yang Qing was suddenly surprised: "It can't be a solid log!"

"Just try it!" Yang Qing thought, controlling the hound to try using other general vulnerabilities.

A minute later, Yang Qing entered the Penguin's main server again.

This time Yang Qing began to check all the services running on the current system, and suddenly Yang Qing's pupils shrank: "Sure enough, it's a solid log!"

Solid-state log is a physical log server, this kind of server has a feature is to record all the operation logs of the main server, and these logs can not be deleted, even the penguin people have no way to delete, the hard disk installed in this server can only be read and written, can not be deleted and modified, the capacity of the hard disk is full and can not be used, in order to ensure that all the operation logs of the server are recorded, it is a necessary hardware to deal with top hackers, to prevent hackers from deleting logs, I don't know how many hackers have fallen on this。 Of course, this kind of hard drive, which is physically limited, can only be used by large companies.

After confirming that the server was really a solid-state log, Yang Qing smiled: "This general vulnerability should be given to you!"

Hackers have gains and losses, the value of a general vulnerability is often a top hacker in the network world, the fewer people who know this vulnerability, the better, if the hacker frequently uses the general vulnerability, then once it is recorded in the log, then as long as the other party has a top security personnel, then it is inevitable to find the vulnerability exploited by the hacker through the analysis of the log, the importance of the log can be seen in general, and the general large companies will be equipped with solid logs, so that all traces of the hacker are hidden, and they can't delete if they want to, so that for a top hacker, if there is no need, they will not provoke large companies, just like Yang QingThe price of entering the Penguin server is that two common vulnerabilities are leaked.

However, compared with the two general vulnerabilities, Yang Qing is more concerned about downloading the user data of the penguin.

After confirming that it was a solid-state log, Yang Qing downloaded the remaining user information again.

………………

"Minister, there is a situation, the log shows that the server has been hacked again!"

"What?" Liang Tao said loudly.

"That's right, the other party downloaded the database again!"

"Close, close immediately!" Liang Tao muttered loudly: "Two general vulnerabilities, what kind of hacker team is this!"

Liang Tao was a little angry at this time, he just mastered a general vulnerability, and now there are two general vulnerabilities in a row, are there so many general vulnerabilities now.

"Do you have to close it?" said Huayue Mountain.

"It must be closed, the other party does not hesitate to leak two general vulnerabilities to download our database, it seems that the other party is determined to win. ”

"Pass me the log, I don't believe it, the other party has a third general vulnerability!" After instructing his subordinates, Liang Tao turned his head and said to Meng Lu: "How's the investigation?"

Meng Lu's eyes were staring at the screen motionlessly, his hands kept tapping on the keyboard, and he shouted loudly: "The other party uses a dynamic springboard, and I can't lock the other party's IP for the time being!"

Hearing this, Liang Tao shouted to a few people: "You few cooperate with Meng Lu, you must find out the other party for me!"