Chapter 18: Hounds

With the continuous analysis of the data by the funnel, more and more traffic characteristics are analyzed and added to the feature database of the fishing net, so that the efficiency of the fishing net is getting higher and higher.

"The current traffic interception rate has reached 45%"

"The current traffic interception rate has reached 52%"

“……”

Looking at the increasing interception rate in the console, Yang Qing immediately focused on tracking data.

The reverse tracking function of the funnel is only to select the real IP, and how to find the server IP that controls the botnet through these IPs is no longer in the function of the funnel, so a special tool for tracking is needed.

It's called the Hound Dog, and it's a tool that is used to detect computer vulnerabilities.

The function of the Hound is to scan the computer's ports to find vulnerabilities that can be exploited, and then take control of the computer.

It also needs to be compiled on site, and Yang Qing once again secretly made up his mind in his heart that he must compile all the tools that can be used in the future.

…………………………

In the security lab

"Brother Meng......" The man with glasses who was performing the DOSS attack suddenly spoke.

In the corner of the room, Meng Lu was waiting for the heating in front of the coffee machine, and when he heard the shout of the man with glasses, he didn't look back and said, "What's wrong?"

"The other party's server seems to have recovered?"

"Hmm~~, what's the reason?"

The man with the eyes said, "Investigating!"

The "pop ......" coffee is heated.

Meng Lu walked back with two cups of coffee, put one on the table of the man with glasses, and then looked at the screen: "What's the situation?"

"Our attack traffic has been cleaned on a large scale!" said the man with glasses as he operated: "The results of the probe show that the other party's server has entered a black hole state, but they are providing normal services to the outside!"

Meng Lu's eyes stared at the data constantly flowing on the screen and said, "Check to see if the backup server is enabled!"

The man with glasses heard this: "I have checked, there is no backup server, and their server IP has not changed!"

Meng Lu said with some confusion when he heard this: "There is no change in the server, it is still in the state of a black hole, could it be that there is some new high-defense technology on the side of the big thief cloud?"

"I haven't heard of it, and I've entered the black hole state twice before, and now it's the third time, but this time the black hole state is different from before?"

Meng Lu heard this: "How is it different?"

"Brother Meng, come and see?" said the man with glasses, calling up a console, which was displaying messages one after another:

"WARNING!Penguin port 2348 detected request link!linkIP:106.22.4.45"

"Warning!142348 Penguin port detected request link!link IP: 106.22.4.49"

"WARNING!Penguin port 385 detected request link!link: 106.22.4.61"

"Warning!Penguin port 93445 detected request link!link IP: 106.22.4.55"

"Warning!Penguin port 2348 detected request link!link IP: 106.22.4.47"

"WARNING!Penguin port 3488 detected request link!link IP: 106.22.4.52"

"WARNING!Penguin port 1589 detected request link!link IP: 106.22.4.54"

"Warning!Penguin port 8856 detected request link!link IP: 106.22.4.56"

“…………”

Meng Lu saw the data on the console and said in a deep voice: "The other party is actually anti-tracking!"

The man with glasses said: "These tracking data are all sent from the other party's server, but I have checked it many times, and the other party's server is currently in a black hole state, how can it not only provide services normally, but also conduct reverse tracking?"

Meng Lu pressed the glasses man's shoulder and said, "It may be that some new defense technology has appeared, or the other party has actually enabled the backup server, but it has forged an IP to make us think that they are still attacking their server!"

"Is this possible?" the man in glasses said.

Meng Lu called up the black console in front of his computer, and said while entering the commands one by one: "I'm going to defend the other party from chasing the end, you're adding a group of penguins, well!

"Understood!" said the man in glasses, as he tapped out one command after another in his hand, and lines of information began to flow through a console on his screen:

"Southeast Asia node above the line - activating the No. 1 goose flock"

"Penguins currently online: 10038"

"Penguins currently online: 43336"

"Penguins: 758478 is currently available"

"Penguins: 160587 Currently Available"

"Penguin: 194838 is currently online"

"Penguin: 227777 is currently online"

"The current online penguins are all online!"

……………………

The hound program has begun to run, Yang Qing began to add vulnerability rules for the hound, the key to whether a scanner is powerful is not the ability of the scanner, but whether the people who use it have enough vulnerabilities in their hands, the more vulnerabilities they master, the more powerful the program's function, Yang Qing has not studied the vulnerabilities of the operating system before, but in "From Hacker Attack and Defense to Male and Female Attack and Defense" There are a lot of loopholes written in this book, Yang Qing has not verified them one by one, and he doesn't know the specific exploitation principle of this vulnerability, so he added all of them in one go.

As rules for vulnerabilities are added, more and more feedback appears in the console:

"IP:192.58.68.3 has vulnerability number GENERAL2389489!"

"IP: 10.28.16.44 has vulnerability number GENERAL546566!"

"IP:10.34.12.34 has vulnerability number GENERAL8794646!"

"IP:192.4.6.6 has vulnerability GENERAL25781!"

"IP: 14.28.63.255 has vulnerability number GENERAL789435!"

“…………”

A smile appeared on the corner of Yang Qing's mouth, and then he began to link these computers that had been scanned for vulnerabilities.

"Connecting IP: 192.17.5.5 GENERAL25781 exploit code executed successfully!"

"Creating Super Admin!"

"Query the current online administrator!"

"Query the current web link!"

"Memory Lookup ......"

"Screening for Abnormal Programs ......"

"An anomalous program has been found!"

"Duplicating program, 16% progress...... 100%…… The program has been copied successfully and has been downloaded to the local computer!"

"Connecting IP: 10.251.18.147 GENERAL35896 exploit code executed successfully!"

“…………”

Yang Qing watched more and more hosts being controlled by himself, and the smile on the corner of his mouth became bigger and bigger, and now he only needs to decompile the other party's virus source code and find the control IP inside to find the root of this botnet.

It was at this time that the console of the funnel issued a series of warnings:

"The current traffic threshold has reached 1.5T"

"The current server resource usage is 75%"

"The current traffic threshold has reached 1.5T"

"The current server resource usage rate is 91%"

"The current traffic threshold has reached 1.5T"

"The current server resource utilization rate is 100%"

"Warning, the server is running out of resources!"

"Warning, the server is running out of resources!"

"You've lost your link ......"

One console after another lost the link, and the smile on the corner of Yang Qing's mouth was fixed.