Section 6 Buffer overflow

readx;

The following is the text of the novel (Tianqing) provided for you, please enjoy!

For the latest reading, please arrive

"You can say no. Pen | fun | pavilion www. biquge。 info" Duan Tianwolf shook his head and said.

"Huh?" Sun Yunmeng's mouth opened wide in disappointment, "I thought you must have seen something." ”

However, immediately after, Duan Tianwolf said again: "It can also be said that there is. ”

"Huh?" Sun Yunmeng raised his head and looked at Duan Tianwolf, "What the hell are you talking about?" ”

"I've seen all of these two dozen videos." Duan Tianwolf pointed to those video files, "Normally, after watching a person's videos from childhood to adulthood, you should find out what characteristics he has." But strangely, I didn't find anything special. So I said, so to speak, I didn't find anything. ”

"But ......," Duan Tianluo looked at Sun Yunmeng, "Have you ever thought that a person from the age of eight to his thirties does not exude any stable characteristics, what does it mean?" ”

Sun Yunmeng blinked his eyes and said, "This means that this person has known how to deliberately hide himself since he was eight years old. ”

"That's right." Duan Tianwolf tapped the table with his index finger, "That's it, and being able to do this, in addition to proving that this person is extremely smart, also proves another thing, that is, this person is extremely insecure and extremely suspicious. ”

Duan Tianwolf pursed his lips when he said this, "It should be said that from a certain point of view, he has a lot in common with Ling Mengdie. They are all equally suspicious. This suspicion may have been a weapon to help them get to where they are today. And this weapon is also a double-edged sword, not only to help them succeed, but also to pierce them. ”

"However, there is a problem, suspicious people are usually cautious. Once he senses danger, he will not hesitate to disconnect the network. If that's the case, aren't we all in vain? ”

"You're quite right, that's the crux of the matter." Duan Tianluo nodded, "So, we have to give him a reason to stay connected." ”

"What is the reason for this?" Sun Yunmeng asked.

"What do you think of the reason for being fake?" Duan Tianluo asked.

"Fake?" Sun Yunmeng's eyes widened, "What do you mean...... Let me lead him to attack me? ”

"Without a doubt, this is the best approach. If we had taken the initiative to contact him, with his skills, no matter how careful we were, it would have been difficult to hide from his eyes. Duan Tianwolf said, "There is only one situation in which a suspicious person's vigilance will drop, and that is when he feels that he is in control of the situation. ”

Sun Yunmeng was stunned for a moment, and said with some hesitation: "I...... Can you really fool Damon? ”

"No, don't lie, you're a fake." Duan Tianluo spread out his hands and said, "You just need to do things like before." It's just that this time it's a little deliberate. ”

Hearing this, Sun Yunmeng raised his head and laughed, "You almost forgot that I am the real impostor." Well, you say, how do I do that? ”

A day later, on November 18, 2006, Shanghai.

Dimon turned on his computer to check Ni Huilin's whereabouts on the Internet that day, and just as he was passing by a mail server, he suddenly overheard that someone was attacking the server.

If it were someone else, maybe he would have skipped it, and it was none of his business anyway, but Dimon was a naturally attentive person, and he never let go of almost any of the small situations he saw.

So, he watched secretly.

As a result, it only took a few minutes for this person to easily get the mail server down and implant a virus that turned the server into his own Trojan.

The whole process is crisp and neat, and at first glance it is the work of a master.

And what interests Dimon the most is that after the hacker has done all this, he put a few large pictures in a remote path, the content of the picture is very childish, it is a three-year-old child crawling on the ground, and this picture is accompanied by a narration - the current world is so good that a three-year-old child can become an administrator.

After doing all this, the hacker is gone.

And Damon, who watched him accomplish all this, sat in front of the computer and pondered for a moment, and a name suddenly flashed in his mind.

Judging from this person's offensive skills, it is definitely not an ordinary hacker, and hackers of this level are rare in the world. And his style of doing things is really too similar to what the Ser said.

After a moment's hesitation, Dimon rubbed his hands together and began to follow closely, tracking down the man.

"He's starting to stalk me." Sun Yunmeng turned his head and said to Duan Tianwolf, who was sitting not far away.

"Pretend not to know about his existence, take a look around, and when he tracks down one of your super springboards, you can back-scan him." Duan Tianwolf said.

"Okay, let's take him around in circles first." After Sun Yunmeng finished speaking, he began to go around in circles on the Internet, casually wandering around various hacker forums on the Internet.

Damon really tracked him all the way, just like Duan Tianwolf at the beginning, he was quickly blocked in front of Sun Yunmeng's trump card springboard.

Unless this obstacle is cleared, Dimon will not be able to track it down. Therefore, Dimon had no choice but to remove this obstacle.

As soon as he made a move, Sun Yunmeng immediately began to react, he pretended to have just noticed that someone was tracking him, and quickly turned around and scanned Damon.

As soon as he did so, Dimon realized that the other party might have discovered his tracking.

But Dimon didn't care, anyway, he was a member of the Masked Islanders, and he wasn't afraid to fight anyone head-on.

The two sides send some special packets to each other's hosts to make the other respond accordingly. Since the response time and method of each system are different, this behavior is generally used to detect the version of the opponent's system and related information.

"What? It's actually NDS? After obtaining the version of Sun Yunmeng's host's operation system, Dimon said with some surprise.

And Sun Yunmeng immediately sent the relevant information he got to Duan Tianwolf, who was beside him, "As expected, he used a self-made system. ”

"Maybe it's the shared system of the Masked Islanders." Duan Tianluo said as he began to analyze the information sent by Sun Yunmeng.

After Dimon sighed, he began to step up to crack Sun Yunmeng's trump card springboard.

And Sun Yunmeng also began to launch an attack on Damon, as a person with a huge botnet, his first priority was of course a denial-of-service attack.

For administrators and servers in general, a denial-of-service attack is almost irresistible because it is an almost rogue method of attack. However, denial-of-service attacks aren't that scary for the best. They have a variety of workarounds.

There is no doubt that Dimon is definitely a top master, so Sun Yunmeng's attack is unlikely to paralyze Dimon immediately. He immediately began to use countermeasures to deal with the situation. In the process, the available resources of his computer system and the available bandwidth of the network drop sharply, and the response of the entire computer inevitably decreases.

And this gave Sun Yunmeng an opportunity, because he had long known that he would not be able to succeed in one blow, and he did this just to help Duan Tianluo collect more effective data about Damon's system.

It was not so much a large-scale assault as an all-encompassing, imposing intelligence-gathering exercise.

And it turned out to be a very successful intelligence-gathering exercise.

And all the data feedback that Sun Yunmeng obtained naturally arrived in front of Duan Tianluo as soon as possible.

So far, everything has been in the predetermined plan of Duan Tianwolf and Sun Yunmeng.

However, at this time, there was an unexpected factor that Duan Tianluo and Sun Yunmeng hadn't thought of - DN, who was originally sitting in the room resting, suddenly thought of a solution to a technical problem, so he immediately came to the laboratory, ready to write down his idea.

However, as soon as he went online, he saw that the "crippled Christ" was under attack.

Because the "mutilated Christ" has not yet been fully formed, for the purpose of protection, the Mask Island did not release it, but only placed it in the human team's computer for chain protection.

And now that the "crippled Christ" is under attack, it can only mean one thing - one person in the individual is being attacked.

"What's going on?" DN muttered to himself, went into the "Christ mutilated" system to check, and then he quickly saw what was going on in Damon's situation.

Soon, DN spoke to Dimon through the "Broken Christ", "You seem to be at war? ”

"yes, it's a big fight. At this time, it should be late at night in the United States, right? Why did you get up? Dimon wrote with a smile.

DN wrote: "I suddenly thought of something, so I drove to the laboratory, but I didn't expect to bump into you to fight, who is the opponent?" ”

"If nothing else, it's probably what we're looking for." Dimon said.

Hearing Dimon say this, DN was stunned for a moment, and then wrote: "There have been so many coincidences recently. ”

"yes, I think so too." Dimon wrote.

"Need my help?" DN asked.

"Don't use it for the time being, you can watch from the side now, and when it really doesn't work, you can make another move." Dimon said, "This kid must be caught this time." ”

"Okay." After writing with a smile, DN supported his chin with his hand and observed the whole battle with interest.

Accident, this is a complete accident, the reason why Duan Tianwolf chose this time point to start fighting with Dimon is because he knows that it is late at night in the United States at this time, and the other three members of the Mask Islander Group are asleep, so it should be too late to help Daimon.

However, the sky is not as good as the sky, it turned out to be almost perfect, and the plan of the two to sandwich Dimon alone was completely deformed because of the sudden addition of DN.

About fifteen minutes later.

Sun Yunmeng said to Duan Tianwolf: "The first trump card springboard is about to be broken, how is it on your side?" ”

"No problem, let him come over, I'll be stationed in the second super springboard now." Duan Tianwolf said.

"How much do you already know about his system?" Sun Yunmeng asked.

Duan Tian Wolf turned his head, looked at Sun Yunmeng, and said, "How could the system used by Mask Island be thoroughly studied in such a short period of time?" ”

"Then you'll look like you're okay again."

"Although I haven't studied it thoroughly, I have found a small vulnerability in this system that I can exploit to attack."

Sun Yunmeng asked curiously, "Vulnerability?" What vulnerability? ”

"Buffer overflow vulnerability." Duan Tianluo replied.

"Wouldn't it? Mask Island's self-use system, how can there be such a rudimentary loophole? Sun Yunmeng asked with a smile.

"The more complex the system, the more simple the vulnerability." Duan Tianluo replied.

Here, we need to introduce what is the so-called buffer overflow vulnerability.

Generally speaking, anyone who is a hacker knows what a buffer overflow vulnerability is all about.

In recent remote cyber attacks, buffer overflow vulnerabilities have been exploited in the vast majority, making it one of the most popular remote attacks. And the reason why it is so widespread is precisely because this vulnerability is so common, and it is easy to achieve the attacker's goal - to use an anonymous user to gain some or all control of a host!

To talk about the buffer overflow vulnerability, we first need to know what a buffer is.

Let's take an example, if you are a bookstore owner, you have thousands of books in your store, including martial arts novels, romance novels, and fantasy novels, and many readers come to you every day to rent books and read them.

At first, you may not feel anything, but when you open the store for a long time, you start to have experience, some books are borrowed by many people, and some books are rarely borrowed. So, in order to attract customers, you set up a counter dedicated to these books that many people rent.

In this case, when a customer comes, he may take it directly from this counter, without having to run all over the store, which greatly saves the customer's time. And this dedicated counter is the buffer zone.

Almost all storage devices on a computer have buffers, such as hard disks, and when we input data to our hard disk, we usually input it into the buffer first, and then write it to the hard disk until you fill the buffer.

This benefit, like the story of renting a bookstore mentioned above, can save time and avoid writing too often.

Now that you know what buffers are, what about buffer overflows?

Let's take another vivid analogy, you are a very successful company executive, you have a full-time secretary. In addition to flirting with you, helping you type papers, running errands, and helping you drink with clients, she also has to do another thing for you, which is to pour you tea.

One day, she comes to your table and pours tea into your cup. This cup can only hold 850 milliliters of water, while the teapot has a capacity of 1,500 milliliters, and normally, your little secretary will pour 750 to 800 milliliters into your teacup, which is definitely not more than 850 milliliters of raw water.

But this time, your secretary keeps pouring water from the kettle into your cup. So what will be the result? Obviously, the water will spill out of the cup.

This is the same as a buffer overflow, when the data capacity exceeds the capacity of the buffer, just like water, the data in the buffer will also overflow, which is called a buffer overflow.

There are two types of buffer overflows, one is accidental and the other is malicious. If it's accidental, it's not a big deal, it's just an application bug. But if it's malicious, then hackers can take advantage of the opportunity to run special programs, get priorities, instruct the computer to destroy files, alter data, leak sensitive information, create backdoor access points, and take control of the computer in part or in full.

In this way, maybe everyone is still a little dizzy, okay, then let's be a little more vivid, and continue the analogy just now.

Generally speaking, your little secretary pours water full, most likely due to a moment of negligence, at this time, at most, you are scalded, glaring at her dissatisfied, and asking her to wipe the table clean and finish.

This is known as accidental buffer overflows.

But if at this time, your secretary has been bribed by someone else, she will deliberately go crazy, and the water will overflow from the cup, and your entire desktop will be covered with water, even your legs will be dripping. You are so angry that you jump up and scold your mother, and then go to another room to change your clothes.

At this time, your secretary took the opportunity to quickly change all the documents on your desk, and when you returned, what you saw was the documents prepared for you by your enemies. These documents prompt you to misjudge the current situation, so you make the decisions that your enemies want you to do, as they want you to do.

You don't feel it yourself, but in fact, you're already under the control of your enemies.

This is known as a malicious buffer overflow.

In general, the purpose of a buffer overflow attack is to disrupt the functionality of a program that has certain privileges to run, so that the attacker can gain control of the program, and if the program has sufficient permissions, the entire host will be controlled. To achieve this, the attacker must achieve the following two goals:

First, arrange the appropriate code in the program's address space.

Second, by initializing the registers and memories appropriately, let the program jump to the address space we have arranged for execution.

Two goals need two steps to complete, the first step is to put the attack code into the address space of the attacked program. The second step is to overflow the buffer of the target program and transfer the execution to the attack code.

There are many ways to do this, so I won't repeat them here.

And Duan Tianwolf found a flaw in the shared system of Mask Island. The reason why Duan Tianluo passed a simple parameter to this code can cause a buffer overflow in this system.

Because the amount of data for this parameter is so small, if it is well concealed, it is likely that Dimon will not be able to detect it. And Duan Tianwolf is likely to implant the latest Trojan horse he made into Damon's computer without knowing it, disguised as part of the system program.

It should be said that this plan is perfect.

Without DN's involvement, the project would almost certainly have succeeded.

It was precisely because of this that when Duan Tianluo briefly told Sun Yunmeng about his plan, he immediately got Sun Yunmeng's approval, "Okay, just do it, I will try my best to restrain his attention." ”

And by this time, Dimon had managed to break through the first trump card springboard and came to the second one.

"Oh my God, the Ser said that this guy is the springboard king, and he was not wrong." Dimon shook his head and said.

After saying that, he began to continue scanning the second ace springboard, however, just as he was about to scan the second ace springboard, DN suddenly sent him a message, "Hey, don't you think something is wrong?" ”

"What's wrong?" Dimon asked curiously.

DN rubbed his eyes and wrote, "I'm not sure either. However, how do I feel that this fake doesn't seem to be intentionally fighting you, but deliberately attracting your attention. ”

"Really? I don't feel anything. Dimon said.

DN smacked in front of the computer and wrote, "No, I always feel like there's something wrong." How did you meet him? ”

Dimon told DN about the situation.

After listening to Dimon's words, DN hesitated a little, "Maybe...... Am I suspicious? ”

"No matter how many things are over, the soldiers are coming, the water is flooding, the two of us join forces, even if Hongjun comes, we must be afraid of three points." With that, Dimon began to scan the second ace springboard.

Duan Tianwolf waited for him to do this, and in the process of Dimon's scanning, this springboard constantly had data fed back to Damon's computer.

Duan Tianluo sent this parameter, which was only a few dozen bytes, back to Dimon's computer in the data. The byte came to Dimon's computer, and it didn't take long to find that particular program in the system.

This parameter of tens of bytes, like a brainwashing person, turned one of the officers of the opposing party into a traitor in the shortest possible time. Ostensibly obeys superiors, but actually executes the attacker's orders.

After completing this step, Duan Tianluo immediately used this program to quickly set up a temporary account in Damon's computer and increase its privileges.

Then, Duan Tianlu, who had gained some control of the computer, immediately wrote the Trojan horse program he had prepared a long time ago into another specific program, disguised as part of the system files.

At this point, it is done.

Just like Duan Tianwolf and Sun Yunmeng originally expected, because they didn't expect this to be a trap, they didn't expect that the other party was two masters dealing with one of them, and they didn't expect that the other party could find their own system vulnerabilities in such a short time, plus a lot of energy was contained by Sun Yunmeng, Dimon didn't notice what Duan Tianwolf did.

But just because he didn't notice it doesn't mean that no one noticed.

"You've been planted with a Trojan." DN typed on the keyboard with a very serious face.

(To be continued)