Chapter 91, the Red Guest Battlefield

It's a virtual system that's infected, there's nothing wrong with that, just restore it. However, Chen Xu looked at the panda incense burning icon on the screen and inhaled vigorously.

The people who developed this virus are also too shameless!

Through the records of the virus's operation, Chen Xu can see that the virus has actively modified the host file of the system, and then pointed to a 3348 address for all web pages. Then run IE automatically, crazy to start clicking.

This is clearly an act of going through the outbreak of the virus and then earning clicks!

Moreover, the shell of the virus is encrypted and protected using rootkit technology, which allows the virus to hide and lock itself and the specified files from detection and deletion. At the same time, Trojans are maliciously downloaded from the server to steal accounts and passwords, destroy anti-virus software and all system protection. At the same time, it will also spread wantonly in the local area network.

As you can imagine, the transmissibility of this virus is absolutely huge, and I am afraid that it will spread to the entire network in a very short period of time.

But this virus is not difficult to crack, with the level of a rookie like Chen Xu and the assistance of Xiao Min, he will soon be able to make a special kill, let alone those large security companies.

However, one thing to know is that many rookie students on the Internet have been very slow to respond this year. Of course, if a very malicious virus like this panda burns incense, the computer system completely collapses and nothing can be opened, they should be able to react, but they may not know how to check and kill...... Because many people are afraid that they will not go to some professional websites to kill viruses, and many of the antivirus software they use is pirated and cannot be upgraded in time, and some even do not need to kill soft ones at all, that is no way.

It's like the Beacon virus last time, and now you can find it in some rookie computers. Chen Xu once helped a rookie from the non-information department repair his computer and discovered the Beacon virus. This guy and Chen Xu are in a Jin Yong group of heroes, last time he said that his laptop was very scummy, and the speed was good when he first bought it, but after being available for a while, the speed became super slow.

Gao Xiaojie also relied on the report of this virus when he saw it, saying Who is so perverted these days? Then he looked at Chen Xu's virtual system and said, "This classmate, where did you get this virtual system?" The report is so detailed? How come I haven't seen it? ”

Chen Xu smiled and said that there are many things you haven't seen, so Gao Xiaojie came over and said, "This classmate, can you share it?" ”

Chen Xu rolled his eyes and said, "Of course not!" You're living in my house and sleeping in my bed now, and you're trying to steal my software? How can there be such a cheap thing in the world! Really, I'm Kaizi? ”

Gao Xiaojie puffed out his mouth and said don't be so stingy! Then she laughed and said, "Just share it!" Anyway, it's just sharing, and you're not without any benefits. ”

Chen Xu asked: What are the benefits? Gao Xiaojie smiled: "Don't you also want to learn hacking techniques?" Then let's share it, I'll teach you everything Jingjing taught me, and you give me this software. ”

Chen Xu said: "I am very at a loss! You just said that you want to teach me, it's the rent you live here, why did you suddenly say that you want to exchange and share with me. ”

"Stingy, drink cold water!" Gao Xiaojie pursed his lips and sat down, rolled his eyes and said, "Okay, I'll add one more condition...... Get out of the way, I'll take you somewhere. ”

Gao Xiaojie snatched Chen Xu's mouse and entered an IP address to log in to a website. When you go inside, this seems to be a place like a Haofang battle platform. There are various rooms, divided into levels, and at the top of the web page are four big words: "Red Guest Battlefield".

"What is this for?"

"This is made by the Red Guest Alliance," Gao Xiaojie explained, "Now the Red Guest Alliance is working on a plan to train new people, and this battle network is built by the top gods of the Red Guest Alliance." After entering the room, you can fight with other hackers, and the Red Guest Alliance will provide a special server to improve the ability of network attack and defense, of course, you can't maliciously damage the server, nor can you maliciously damage the opponent's computer. Because there are masters who preside over here, if someone is found to destroy it, then he will die. ”

"Every time you fight, you're scored, and the higher the score, the higher the level of the challenge. Entry-level hackers like us are the most beginner and fight against beginner opponents. The higher the level, the higher the opponent, and finally even the top masters of the Red Guest League. ”

Chen Xu became interested when he heard this, and said: "This is very good, if it can give people the opportunity to fight each other, then the speed that should be improved will be very fast." ”

Gao Xiaojie smiled and said, "Oh, this thing is enough." Looking at your, it's obvious that you're a rookie who hasn't done anything with others, I've already mixed up three hundred points here, and I've entered the rookie level. ”

Seeing Gao Xiaojie saying that he was a rookie and still so excited, Chen Xu wanted to laugh, Gao Xiaojie said, "What are you laughing at?" The lowest grade here is the eggs, which I've hatched from! Rookies are freshly feathered birds and so on, anyway, there are a lot of them. ”

Chen Xu asked what kind of bird Zhan Jing was?

Gao Xiaojie tapped his head lightly and said, "What kind of bird, it's so ugly." Jingjing's family is a judge! ”

"Won't it?" Chen Xu sweated for a moment and said, "Zhan Jing's level is so high? ”

Gao Xiaojie was very proud and said, "Of course? Well, let's not talk about it so much. If you want to know about Jingjing, you can ask her, if she wants to tell you, she will naturally say it, there are some things that I am very inconvenient to say, don't spread the word! ”

Chen Xu said: "I'm not a person with so many mouths. Okay, for the sake of you finding me such a good place, I'll give you this virtual system, but don't ask me where this system came from, it was given to me by someone superior anyway. Hehe, you're not the only one who knows the cow breaker. ”

Gao Xiaojie glanced at him with disdain and said, "Virtue! But she was still looking forward to this virtual system, because it seemed to be better than what she was using.

In fact, to be precise, the advantages of this system are not much, but they are better than the details.

Any software information carried out in the system can be recorded by the system. This virtual system is not a product from the future, but Xiao Min made it based on the current XP system. The internals of the system are completely based on the current XP system, including some vulnerabilities. The system also contains various types of commonly used files for easy documentation.

None of this is much of a deal, though, and the real power of this virtual system is that it's well analyzed.

For example, in the same kind of simulation system, the most that detects the operation of a virus is to record how the virus will replicate, how it will tamper with registry file information, and so on. However, this simulation system can accurately see how the virus is programmed to work - for example, in the case of Panda Burning Incense, it scans the system process every two seconds, scans the keywords "Jinshan", "Kaspersky", etc., and then closes the corresponding process and deletes the file.

This kind of granular search is not possible with ordinary virtual systems.

But if you really want to talk about it, this virtual system is not very powerful, and it is not very versatile, so Chen Xu gave it, and he didn't feel distressed at all - because he had a better one in his hands.

After giving the virtual system to Gao Xiaojie, Chen Xu entered the Red Ke Battle Network, logged in with his ordinary ID, and found that the level was indeed "unhatched bird eggs", with 0 points.

Once you enter the room, an IP address will be generated, and then there will be options. One is to attack, the other is to defend, the defending side can first enter the server of the specified IP to obtain administrator rights, and then wait for someone to attack. Of course, if the hackers participating in the contest can't even get into the server, then why do they come to participate? Let's honestly go to the rookie strategy first.

Chen Xu chose to attack, because what he needed to practice now was to attack, because with Xiao Min, the most powerful shield in the world, he only needed to turn himself into a powerful spear.

Soon, someone came in, and the points were only a dozen points, the same bird egg, seeing that Chen Xu chose to attack, he entered the server and chose to defend, and played OK.

Chen Xu rubbed his hands, after all, this was the first time he had officially fought with someone, although the opponent's was also a bird's egg...... Chen Xu immediately used the conventional method to scan the system version of this server, and then learned that it was a very common version of Windows Server 2003. Chen Xu next scanned the vulnerability of the server, because he still knew a lot about this system, which was a very common one among the server operation systems.

The first thing to scan is the patch situation of this system, because there is no system without vulnerabilities, and the official will launch corresponding patches after discovering vulnerabilities. However, if some systems are not patched, then the vulnerability can be exploited.

After scanning it, Chen Xu found that there was a very serious patch on the system on this server, which was an authenticode vulnerability that allowed remote execution of malicious code, through which the activex plug-in could be downloaded and installed and run without any prompting by the system in some specific cases.

So the first thing Chen Xu has to do now is to write an activex plugin with the surname of Trojan, and then bypass the server to get the password.

……

(To be continued)