Chapter 19 Blockchain Virus

Yang Qing stood up angrily and roared at the computer: "It's too fucking bullying, 1.5T, Lao Tzu is also convinced!"

Scolding at the computer, Yang Qing was powerless in front of the computer, staring at the console that had lost the link and did not move.

"You can't blame Yang Qing for being angry, 1.5T traffic attack, which means that a 2T large hard disk can be filled in a little more than a second, such a large traffic attack is not Yang Qing's 31 small clusters of servers can resist, even if the function of vulnerabilities and fishing nets is powerful, it is useless, the operation of the funnel also needs to occupy server resources, the larger the traffic of defense, the greater the server resources needed, without the hardware resources of the server, it is useless in powerful software. ”

10 minutes later, the mobile phone ringtone brought Yang Qing back to his senses, and when he connected the phone, Yang Qing said weakly: "Hello!"

"Hello, Mr. Yang, your server attack traffic has exceeded 1T, which has exceeded the capacity of the ordinary service area, we are transferring your server to the high-defense area, it is expected to take 2 hours, in this process your server will be shut down, in addition, we recommend that you buy our high imitation service, according to your situation we can give you a 20% discount on the original price!"

"In addition, after the server is transferred to the Anti-DDoS Pro zone, if you suffer more than 1 TB of traffic attacks again, and you do not purchase the corresponding Anti-DDoS Pro service, we will extend the black hole time of your server. ”

Hearing this, Yang Qing asked, "You directly tell me what is the black hole time after the delay?"

"The next black hole time will be 24 hours, and the black hole time will be doubled every time you are attacked in the future!"

"Okay, got it!Hey~~ Can you owe it here?My money won't get until next month!"

"Mr. Yang, I'm sorry, your current credit limit is only 10,000!"

"Oh, got it!"

Hanging up the phone, Yang Qing stared at the computer again: "Now there is only one way!"

Quickly calling up the console, Yang Qing opened the virus folder that had been downloaded to the local before: "Although it is only a few tens of minutes, the number of virus programs stored in it has exceeded 10,000, Yang Qing now has a chance if he can analyze the control IP of the attacker from these virus programs, otherwise the chess soul battle can only be forced to close." ”

Randomly selected a virus program, and Yang Qing began to decompile.

"This virus program is written in C language, as a language that can write an operating system, the power of C language is undoubted, and because the popular operating systems are basically written in C language, the vast majority of virus programs will choose to use C language to write, so that the virus can be better integrated into the operating system, in concealment, function is incomparable to other languages!"

The so-called decompilation is to obtain the assembly code of the packaged program through memory debugging, and then reverse the code of the C language through the assembly code, and the assembly code is a more basic language than the C language, under the assembly code is 0 and 1, so that no matter what the program will eventually be compiled into assembly code, and then restored to 0 and 1, let the computer execute. ”

"Theoretically speaking, as long as the assembly language master is familiar enough, the code of all software can be reversed, and 80% of the popular cracking software on the market is deciphered by disassembly, and Yang Qing is now carrying out the decompilation of this virus. ”

Decompilation is a very patient thing, because a line of code written in C language will become dozens or even hundreds of lines after being compiled into assembly language, so although the virus is very small, it is also a very time-consuming thing to compile completely.

Two hours later, Yang Qing reversed the source code of the virus, but Yang Qing's face became more ugly: "Blockchain virus"

After coming to the conclusion of the blockchain virus, Yang Qing has given up chasing the key IP from the virus body, because the three words blockchain represent that there is no server, or that every virus body is a server.

"Blockchain technology was first used to issue electronic money, this technology is characterized by decentralization, once it begins to run in the Internet can not be terminated, even the original author can not, this decentralized currency has developed very rapidly in recent years, and has now been used by underground banks for international fund transfers, as well as various black market transactions, the most famous is Bitcoin.

Blockchain technology is not only able to build electronic money, it has many other uses, and in the eyes of hackers, blockchain technology is almost born for botnets, a botnet without a central server means that no one can chase down the person behind the control, as long as the controller of the botnet enters the activation key on any infected computer, the entire botnet can be activated instantly, and broadcast commands to the entire network.

In "From Hacker Attack and Defense to Male and Female Attack and Defense" There is software for this kind of botnet in this book, and there is also a detailed description of how to break this network, but this method is only theoretical, and in practice it is impossible to implement at all, the only way to break the blockchain zombie group is to crack the key, but this is almost impossible, unless the maker of the botnet uses a mentally retarded key such as 12345, otherwise it is impossible to be breached, and more importantly, the key only keeps half a copy in the virus body, and the other half is in the hands of the maker. ”

Yang Qing got this half of the key through reverse programming, but it didn't have any effect, the key was the other half of the key. ”

Yang Qing's last hope is also shattered, now Yang Qing can only do one thing, that is, wait, wait for the attacker to contact him, this kind of DDOS attack is generally to extort money, one reason is the attack from competitors, and his current users are only hundreds of thousands, not more than one million, who will not get along with himself? Is it a penguin? Yang Qing thought about it, and then denied his idea, how could a company as big as Penguin attack himself because he didn't agree to cooperate, and look at that person named Chen Junxian is pretty good!.

"Forget it, whether it's a penguin or not, I can only wait now!" When the matter was decided, Yang Qing relaxed, turned around and got into the bed: "Anyway, I don't have to worry."

Yes, let's go to bed first, maybe there will be a miracle when you wake up!" Yang Qing is indeed very tired now, and the continuous tapping on the keyboard for several hours is not only physical fatigue, but also the consumption of mental power makes Yang Qing a little unbearable. With a hint of helplessness in his heart, Yang Qing quickly fell asleep.

Yang Qing, who had slept for a while, did not wait for a miracle, and when he woke up, there was only a series of text messages reminding him that the attack was still going on, and his server had been put into a black hole.