Chapter 223, Zhanjing's Firewall
Chapter 223, Chen Xu disguised the data stream as a QQ message, and then touched it along the window of the other party's QQ.
It's so easy, it's just so easy!
It's kind of unbelievable.
If this is a survey, then this kind of mapping is completely meaningless?!
Chen Xu glanced back at Zhan Jing, and the girl was also looking at him now. There was an indescribable glint in her eyes.
No, there are traps!
Chen Xu was about to quit quickly, but at this moment, suddenly a stream of data swarmed out of the opponent's computer, blocking Chen Xu in an instant. At this time, he can withdraw, but once he retreats, he will be intercepted by the other party His IP address, according to the standards of hacker attack and defense, so that he loses.
At this time, Chen Xu realized that he had forgotten to be an agent!
It's a shame for hackers!
A hacker did not use a broiler when hacking into someone else's computer or server, but used his own local computer...... This is definitely the most unforgivable mistake!
Because he didn't even think about protecting himself in the first place, for a hacker, even if the attack on the other party was unsuccessful, he had to learn to hide his identity. The most important thing for a hacker is security!
And Chen Xu made this mistake, first because he thought it was just a simple test job, and didn't think too much about it. And secondly, it's because he is used to using Xiao Min...... Xiao Min's shield represents the invincible strength of the world, and no one can break through Xiao Min's defenses to find Xiao Min's location, so in the long run, Chen Xu even forgot this very important hacking criterion.
At this time, Chen Xu's only way was to face it.
He told himself that since Zhan Jing said that the other party would not be able to defend, then presumably this data stream was like that kind of ARP firewall, which automatically intercepted data for analysis. At best, the power of this firewall is relatively strong, but it is absolutely impossible to be so strong that it is irresistible!
Because as long as it's a program, there must be loopholes. Even if it's Xiaomin, there will definitely be loopholes! It's just that if this loophole is placed in an invisible place, it is not a loophole!
So what if you come to fend off the opponent's attack and turn defeat into victory?!
Chen Xu tapped on the keyboard while constantly changing the shell of the data stream he disguised. Because QQ messages also have different ways, and the data code of each method is different, Chen Xu constantly changes the shell so that his data packets will not be intercepted by the other party. In this way, a guerrilla policy was adopted, fighting on one side and many on the other, and at the same time, Chen Xu was also intercepting the data flow of the other party for analysis.
Zhanjing's firewall obviously has the function of automatic counterattack, but the means of counterattack are very monotonous. What Chen Xu is looking for now is what kind of working mechanism this firewall is. Why can he be detected by the firewall when he disguises himself as QQ?
As I said earlier, this firewall with a counterattack function is like a vicious dog bolted in front of the gate, and this vicious dog is very ferocious. But the only place it could reach was the door, and he wouldn't be able to reach it if he came in through the window.
Obviously, however, the dog's chain was relatively long, allowing it to manage not only the door, but also the window.
Of course, if the dog is indiscriminate, whether it is a thief who comes in, or the owner, it bites a person, then it is just a mad dog and does not represent anything at all. And if the computer is protected by this firewall, then the computer doesn't have to do anything with the Internet at all.
Therefore, for this dog, there must be a way to identify the owner and the enemy, as long as this method is found, with Chen Xu's current ability, he can completely disguise himself as the owner in a superb way, so that the dog has no way to speak.
So Chen Xu is intercepting the other party's data stream for analysis, and what mechanism is it based on to start fighting back.
But at this moment, Zhong Ziyu next to him suddenly shouted: "Oh, it's so despicable!" There is a firewall with automatic attacks! ”
Chen Xu is in a hurry, and Zhong Ziyu has already hacked into the other party's computer?
As I said before, this is a competition, and although it can't be said to be endless, everyone is secretly competing!
So Chen Xu didn't want to lose.
And at this time, Wu Yuan's cry also sounded: "Damn, the attack is so fierce, how did you find me?!" ”
It seems that Zhong Ziyu and Wu Yuan have both entered their targets, and only Gao Xiaojie is still lingering outside the door. From this point alone, Chen Xu's level is higher than the two of them, but Chen Xu feels it in his heart. I am a dignified SMMH, the god of the Internet, and I am only a little taller than them, which is really not a good past. And if they had a better way to get rid of the firewall and get into the other computer's computer faster than they could, it would be a big loss for his people - though no one in the room would think so.
But Chen Xu didn't want to lose!
It is not easy to intercept the other party's data packets and analyze them, especially since Chen Xu now has to disguise his own data packets to avoid the detection of the other party, and on the other hand, he has to analyze the other party's data flow through character segments. This kind of dual-purpose is not something that ordinary people can do, so now the real hacker masters are composed of a team, in which there are talents in all aspects, some are proficient in camouflage data, some are proficient in viruses, and some are also proficient in scanning and analysis.
Of course, if Chen Xu wants to do it now, he can do it, but it will take a lot of time. Generally speaking, you only need to intercept a few pieces of data information from the other party, and then look for the similarities and then get a unified formula. But this kind of calculation takes time, and a master like Zhan Jing will definitely confuse his opponent with some useless junk information. Therefore, although Chen Xu thought that he could finally come up with the result, at that time, maybe Zhong Ziyu and they had already used other methods to complete the task first.
So Chen Xu immediately changed his approach.
Brute Force Attack!
The bearing capacity of the opponent's firewall is definitely limited, and when one's own data and information are strong to a certain extent, it can completely overwhelm the opponent's defense force, and kill the opponent's computer in an arrogant posture, completely destroying the structure of the firewall.
This type of brute force attack is also used a lot, but it is often accompanied by a DDOS flood attack. But Chen Xu is not using zombie computer assistance now, how can he succeed?
This is difficult for Chen Xu.
Using a zombie computer for assistance is also just stuffing a lot of spam into the host with different IP addresses. This slows down the work of the system, resulting in slower data processing. At this time, there is an opportunity to shut down the system service, so as to completely shut down the opponent's defense system.
And stuffing the other party's computer with spam information is actually very simple, especially through QQ.
In the past, there was a QQ flood attacker called "QQ Bomb" on the network. The principle of this QQ bomb is actually very simple, that is, to use the vulnerability of QQ's built-in function to transfer files to launch an attack. The principle of QQ bomb is to quickly generate hundreds or even thousands of useless compressed packets with a size of 0 bytes, and then select all and pull them into the other party's chat window.
At this time, the other party will accept hundreds or even thousands of file transfer information at once, you must know that the drop-down menu alone is full of dozens of pages, and if you deal with it, it can instantly increase the occupancy of the other party's CPU and memory to the peak. Almost 100% full load status!
This is the simplest QQ vulnerability, although Tencent later fixed this vulnerability, but that kind of fix has no meaning at all for network masters. Because this kind of function determines that this will definitely become a vulnerability for network experts to exploit, unless Tencent completely shuts down this function.
At the same time, there are many loopholes in Tencent QQ. Chen Xu is now going to exploit two of his vulnerabilities, one is that this kind of acceptance of files will cause the CPU to be too compliant, and the other is ...... Remote Assistance Feature!
QQ's remote assistance feature allows users to send out invitations and let others take control of their computers and do their work. Therefore, this function will inevitably be used by hackers, as long as the kernel of the QQ system is invaded, then this function can be used to send remote assistance information to control the other party's computer.
It is these two functions that Chen Xu wants to take advantage of now.
It is actually very simple to write a flood attacker that bypasses the detection of the QQ system, and it doesn't take half a minute to write one with Chen Xu's current programming ability. Anyway, it doesn't need anything beautiful or anything like that, it's just pure programming - many people haven't seen the software written by real hackers themselves, and that's really miserable!
The interface is completely a whiteboard with a few buttons on it, or a dialog bar for other data output inputs, etc.
Some software doesn't even fill in the minimize, maximize, or even close buttons! When you close it, you can simply rely on alt+f4 or force it from the task manager!
This kind of software is much more ugly and monotonous than the foolish software on the market, and hackers write this kind of software only for their own use, so they don't care about the user's habits at all. Some hackers are left-handed, and they are directly written according to the habits of left-handers, and ordinary people are really not used to it.
Chen Xu used the written software to release a large amount of spam information in an instant, and immediately saw on the scanner that the other party's CPU usage rate soared to 100%!
Under 100% CPU load, the computer is almost unworking. At this time, Chen Xu immediately invaded the QQ kernel and asked the other party to automatically send an invitation for remote assistance.
But seeing that it is about to succeed, he only needs to connect with the other party's host, and Chen Xu is equivalent to directly opening up the bridge with the other party. But at this moment, the connection suddenly dropped.
Damn the firewall!
Chen Xu turned his head and saw Zhan Jing standing beside him with a smile, he believed that although the software on his side was written by himself, it was impossible for Zhan Jing not to understand it. Looking at the indifferent smile in her eyes, Chen Xu knew that her own work, her plan was completely exposed under her nose, and even the current connection being cut off was definitely what she expected in advance!
Now Chen Xu's temper rose, and he thought to himself, aren't you just a little girl, even if my current strength is not as good as yours, but I can't even break through your firewall?!
Chen Xu originally had a bullish temper, otherwise he would not have persevered in virtual training now, and was promoted from a rookie to a hacker with a certain level now.
Although he is not like Margaret Thatcher, who has had to be the first since he was a child, when he gets serious, he also has a ruthlessness that does not admit defeat!
So Chen Xu immediately turned his mind to the screen, hum, if one method doesn't work, I'll change another one. I don't believe it, why can't you be a firewall?!
The mechanism of this firewall Chen Xu has almost figured out a little bit after these attacks.
This firewall must have the function of listening to QQ or other software connected to the Internet, and then record the corresponding data encoding in the firewall, once it is found that there is a data flow beyond the scope of the encoded data, it will launch an attack, and the port will be automatically closed when it encounters a flood attack.
To put it simply, this is how the firewall works, before the firewall is turned off, Chen Xu can only follow its rules if he wants to invade.
In fact, now Chen Xu is completely able to use other means to invade in another way, but looking at Zhan Jing's confident smile, he feels as if everything has been seen through by this girl. That feeling made Chen Xu very unhappy.
You must use QQ to hack this computer!
Chen Xu continued to attack, and the other party only closed one of the ports, but it did not mean that the other ports were also closed. QQ's common port is 4000-4009, so he has a wide range of options.
The method of remote assistance is obviously not working, because the firewall of the other party is very close to this aspect. And by sending files, the other party's CPU utilization rate is high, which has been done, but it is obvious that the firewall made by Zhanjing has a very low CPU occupancy, so the firewall has almost no impact.
Of course, there will still be an impact, and the response speed of the firewall is also decreasing due to the decrease in the processing speed of the system. It can be seen from the performance of the other party's data stream alone that the data streams that had disturbed Chen Xu before could no longer keep up with Chen Xu's pace, which is an excellent proof.
Chen Xu was typing on the keyboard quickly, his expression was not hideous, but he was very focused.
Data Flow Attack!
Chen Xu spent a minute writing a small program, which is a small software for data flow attacks. It can send the commands typed by Chen Xu to the opponent's host at a rate of fifty times per second, thus squeezing out the little working capacity of the opponent's firewall!
The firewall written by Zhan Jing is already very powerful, and it can be seen from the analysis of data flow that it requires very few working resources, so that the load rate of CPU and memory will hardly affect this firewall too much. Because in terms of memory, it divides itself into a region of read memory, which it uses for its own work. High memory usage doesn't affect it.
And this firewall also has a filtering feature. If there is too much spam, it will automatically choose to filter, so as to prevent DDoS flood attacks.
But Chen Xu's fingers were tapping on the keyboard quickly, he was manually typing one instruction after another, and then using the software he wrote to completely break the opponent's firewall!
Zhan Jing's expression became serious for the first time.
Because of the firewall she wrote herself, she naturally understood the mechanism.
If Chen Xu just uses spam information to fill, there is no threat at all, because the system has a detection function. But the detection function is also flawed, if Chen Xu uses a large amount of useful data to attack in turn, then the system will fall into endless operation, until the operation exceeds the load, and the other party takes advantage of it!
But there is a premise to this flaw, and it doesn't mean that you can write just two commands to put the system under this load.
But Chen Xu's writing speed is very fast now, and he can enter a command in almost two seconds and let the software run it assisted. These commands are basic commands for QQ, which can be recognized by the firewall. This kind of command is different from those garbage instructions, which are completely used to block information, and this kind of garbage command can be automatically blocked, but this kind of correct command has to be accepted.
Zhan Jing couldn't help but look at Chen Xu differently, he didn't expect his foundation to be so solid, could it be the credit of the book "Chinese Language"?
Chen Xu's expression was serious, at this time, he didn't care about Zhanjing's expression behind him at all, but was wholeheartedly immersed in the input of instructions.
At this time, he really has to thank the Chinese language and Xiao Min, who can give him such a solid basic knowledge. When the book is used, there is less hatred, because many people do not have a solid foundation!
Chen Xu's input is also very fast now, because the instructions are also very familiar, so he spent two minutes writing more than 50 commands, and then asked the software to use these commands randomly to contact the other party's computer.
This method really worked, the speed of the opponent's firewall immediately slowed down, Chen Xu forcibly broke into the core of the opponent's QQ at this time, and then used the previous method to open remote assistance, and at this time, the opponent's firewall did not respond because of too much work pressure.
But Chen Xu knew that this kind of unresponsiveness was only temporary, and the firewall was still working after all, but the processing speed was much slower. But this kind of slowness is only a matter of ten seconds and a half minutes at most, and if you can't seize this time to turn off the firewall, then all the previous work will be in vain!
More than ten seconds is enough for Chen Xu!
Chen Xu quickly entered the other party's computer, and the first thing was to open the task manager in the background to find the process where the firewall was located.
Not to mention being a hacker, even people who have some knowledge of computers can have a better grasp of the system process, so Chen Xu immediately saw that the process named .exe should be the key process of the firewall.
Chen Xu clicked Close, Damn, a dialog box popped up saying that illegal closure is not allowed?
This is a special option that many antivirus software and firewalls set up nowadays. Unless it is closed by serious means, if it is forcibly shut down by using the system process, it will refuse to be executed.
This is the setting taken to prevent hackers from forcibly shutting down the process, Chen Xu was so excited that he didn't expect it, how could Zhanjing not apply this setting?!
Then you should immediately use the normal method to turn off the firewall.
Chen Xu right-clicked through the background, and then turned off the firewall, but a dialog box popped up: "Please enter the password!" ”
Depend on!
There is still such a trick?!
But Chen Xu also slapped himself hard in his heart, this is a very normal method, right?!
Setting a password in antivirus software to prevent malicious uninstallation has always been a common method used by antivirus software and firewalls. Even with the products of the big antivirus companies, this method is completely meaningless - in short, you can simply delete the password file in your computer to solve the password. The location of the password file of antivirus software such as Kaba, Avast, Jinshan Jiangmin, etc. Chen Xu knows, although there is protection, it can be deleted as long as it is unlocked through the same unlocking software, but for this unknown firewall, Zhanjing will not store the password file in the software folder. She casually stuffed it into the corner of the C drive, where did she find it?!
What's more, time is running out.
For more than ten seconds, if this firewall can't be turned off, then Chen Xu will be kicked out. Although I was able to come in next, it was a very troublesome thing after all. And if you want to experiment with passwords, the computing speed of the computer is simply not enough!
Because the other party's computer is now very stuck, according to the settings of the software, it is to execute one command before executing the next command. However, because the computer executes commands very quickly when it is fast, it doesn't matter at that time.
But when the computer is very stuck now, it is equivalent to slowing down the computing speed of the computer countless times. Chen Xu was certainly able to test the password, but before he could test the password, the firewall had to do one more thing than kick him out.
What to do, what to do?!
Chen Xu was as anxious as an ant on a hot pot, seeing that there was not much time left, how could he uninstall this damn firewall?!
………… Phew, I just got up last night, went to watch "Transformers 2" with my friends and then came back to watch the Confederations Cup, Spain played really ugly, but the defense of the United States is really good, yesterday was enough for a world-class performance, and Italy's reinforced concrete is nothing more than that.
(To be continued)