Chapter 27, God-level firewall
As soon as these words came out, there was an uproar!
Because anyone who knows a little about computers knows that there is absolutely no such thing as a firewall without vulnerabilities in this world. It's like a top hacker said that no matter how powerful a program is, it is written by people, and machines can never defeat human intelligence!
No matter how powerful the firewall is, it will still be vulnerable, and under the current operating system, many settings that are not really vulnerabilities can be used by hackers.
To take the simplest example, DDoS (Distributed Denial of Server Attack) is a common tactic used by hackers. This method is also very simple, by sending a large amount of spam to the other party's computer, such as a SYN attack, which is to exploit a flaw in the TCP protocol - just a flaw, not a vulnerability.
This flaw can be exploited to send a large amount of junk data, consuming the CPU and memory resources of the server. Of course, this is just an example, and for experts, DDoS, although it is a commonly used method, is also the least technical.
So just as the Deep Blue supercomputer can't play the world's national Go players, hacking is also a profession that pays attention to skills and cannot be copied.
The Snake Firewall is powerful enough, but they also have to dedicate their manpower to snipe hackers who can get into the firewall. Let's just put it this way: there is absolutely no firewall in the world that can keep top hackers out of it without anyone controlling it!
Absolutely nothing!
So when S.MMH said this, everyone thought he was crazy!
It's just a firewall, and you dare to use it to challenge snake?!
Originally, people thought that the god of S.MMH would use his own way to govern his body, and after laying a firewall on the Red Guest Alliance, he would sit in the middle and let the other party come up and attack - presumably everyone has played a game called vole fighting, that is, there are many pits around, and a person stands in the middle with a hammer, and when he sees a vole in the pit, he will go up and give it a hammer...... Everyone thinks that the god of S.MMH wants this method, so I am more or less disappointed in my heart.
Because judging from the performance of the s.mmh god, his understanding of the software is definitely beyond everyone's imagination, although I don't know whether he is an individual or an organization, but it is absolutely enough to be called a god.
Presumably, the firewall he wrote is a few points stronger than the perverted firewall of snake, coupled with his own outstanding strength and the help of the masters in the Red Guest Alliance, let alone 8 hours, even if it is 80 hours, it is impossible for snake to win.
But even if s.mmh uses this shameless method, everyone won't say anything, this is the legendary way to repay the other, who let you snake first lewd, you are obscene, you don't allow others to be obscene?!
But when he proposed this test method, he didn't know how many spectacle lenses had fallen in front of the computer, could he trust the security of the firewall he wrote so much?!
Just when everyone was suspicious, a post appeared on the forum of the Red Guest Alliance: "I'm s.mmh, please open the server and set me as a super administrator account, thank you." If there is anything inconvenient to the Red Guest Alliance, please forgive me. ”
What is quality?!
What is a great god? What makes approachable?!
With the strength of s.mmh, it is completely easy to enter the server of the Red Guest Alliance forum and obtain a super management account, which no one will doubt! But look at people? Very humble to make a request!
Quality! Pay attention to quality!
Blue Baby and several other high-level people quickly discussed it, and immediately opened the permission to let him in, and gave the super administrator permissions.
Because s.mmh said that he is Chinese, and people respect me a foot, and everyone understands the truth that I respect people. What's more, this competition is almost related to the status and prestige of Chinese hackers in the world, so it is still very important.
Chen Xu happily let Xiao Min take over the administrator of the Red Guest Alliance server, and when he thought of the old-fashioned posture he had just put on to reprimand the hackers all over the world, Chen Xu felt that he was pretending to be forced to a certain extreme! And he was still worried just now, what if the Red Guest Alliance ignored him? But thinking about this possible surname, it is also very small...... I'm standing up for them!
Just as Xiao Min was busy patching the system, Chen Xu received a communication request from the blue baby.
Who the blue baby is, Chen Xu now knows. Sister Xiao Lingran, one of China's top hackers, a professional sniper - these are all heard from Wu Yuan.
Xiang Xiaomin confirmed that his identity would not be exposed, so Chen Xu connected to the other party's communication, and saw the blue baby quickly typed a line of words: "Hello, may I ask if you are the s.mmh who cracked the Beacon Virus?" ”
It seems that they still suspect that they are impostors, but there should not be many suspicions. After all, the name can be impersonated, the technology cannot be impersonated, and Snake did not kick S.MMH out, but made him say a bunch of words, which is enough to prove - it's not that they don't want to kick, but they have a weak heart. But anyway, maybe there is more than one master in the world? Blue Baby still has to make a final confirmation.
Seeing the word "me" appearing on the screen, Blue Baby and the masters of the Red Guest Alliance breathed a sigh of relief.
Sure enough, that kind of perverted strength, it would probably be better if there was only one.
At this time, another sentence appeared in the dialog box: "I'm sorry, please give me another five minutes, there are a lot of vulnerabilities on this server, I'm patching, let's talk back." ”
This sentence made the masters of the Red Guest Alliance blush, but it was relieved to think about it, after all, the forum of the Red Guest Alliance did not have any ultra-high-level confidentiality measures, and it only used ordinary computer room servers. Because of the different groups for which it is oriented, the Red Guest Alliance forum is not like the private forums of some hacker organizations, which are very mysterious out of the principle of absolute confidentiality. This forum is open to everyone, and it's not surprising that there are many loopholes.
In fact, Chen Xu said this just to pretend, because although the patching matter is handed over to Xiao Min, he always has to pretend, right?
Five minutes later, Chen Xu typed out in the chat box: "It's already good, well, it's only ten minutes later, ask the people of Snake and let them attack." ”
At this time, Guan Pingchao couldn't help but type a sentence in the dialog box: "Hello, please forgive me, are you too relieved about the firewall you developed?" The opponent is snake. ”
"But we're the real snakes, don't worry." The words typed by s.mmh made the people of the Red Guest Alliance laugh, and they even determined in their hearts that this s.mmh was definitely a native Chinese, otherwise how could they be so skilled in using this proverb.
However, out of an abundance of caution, the masters of the Red Guest League began to scan the server, but the results of the scan made everyone fall through their glasses.
A server that was originally riddled with holes and only needed an average level hacker to complete the invasion without defense turned into a Battlestar in five minutes?!
The TCP/IP protocol was fixed, and none of them could understand the method used;
The CMD backdoor was fixed;
The rear door was repaired after booting;
sethc.exe back door was repaired......
In addition to these common backdoors and vulnerabilities, what is even more surprising is that those uncommon backdoors that are now exploited by advanced hackers have all been fixed?!
At least when the scan is completed, the people in the Red Guest League have a feeling that the dog bites the hedgehog and can't bite it.
Is this the strength of S.MMH?!
It only took him five minutes!
Everyone in the Red Guest Alliance couldn't help but feel like a mountain was looking up...... Of course, no one doubts the offensive strength of S.MMH, because for hackers, it is harder to defend than to attack!
Hackers believe that offense is the best defense, although defense seems to be advantageous, because there is a firewall, there is hardware as a guarantee, but because no firewall can block all attacks, hackers play defensive counterattack, shrinking behind the firewall to put black guns. But if you don't fire a shot, the other side will completely push the wall like a bulldozer.
You can achieve this kind of golden bell jar iron cloth effect just by defense, imagine it, people's understanding of software and hardware is so strong, if you really attack, what will it look like?!
I'm afraid it can't be described with stormy waves!
At this time, the people of Snake finally began to attack. How fierce is the angry snake's attack? Just look at the stream detector.
The first method used by Snake is the most common and old-fashioned DDoS flood attack used by hackers, but the same attack method is used by different people, and the feeling is immediately different!
The index on the data flow detector instantly broke through 10,000, and this detector is not an official product, but a small software made by many hackers themselves to detect each other's spam information. Basically, the attack of an ordinary civilian computer is an index, and the index is tens of thousands in an instant, which means that the other party either has a powerful supercomputer, or the broiler under their control has exceeded 10,000! And the number is growing!
I have to say that although DDoS is jokingly called the most untechnical attack method among hackers, the benefits of this method are very obvious!
Powerful data streams cause servers to have to process them, which consumes a lot of memory and CPU, giving attackers a chance to take advantage of it.
But the problem is that the senior members of the Red Guest Alliance are staring at the device manager stupidly, and it shows that the server is working properly, the CPU usage is only five percent higher than usual, and the memory consumption is only one gigabyte higher.
What does this amount to? A flood attack like this is just tickling the firewall!
Although I don't understand the real principle of firewalls, there must be a special way to separate spam and ignore it, otherwise, it is impossible for any software to increase the surname of the server several times out of thin air. You know, if such a powerful flood attack had been aimed at the previous server, the server would have been washed away a long time ago!
No wonder Snake dared to say that they were going to attack China's major portals, as if they didn't take Chinese programmers seriously, it turned out to be real material.
And for s.mmh...... The people of the Red Guest Alliance have nothing to say, the better the technology, the more they feel that this person is mysterious and powerful, and that feeling is simply standing in hell and looking up at heaven!
Now everyone almost believes it, and S.MMH dares to say that it is not a lie to rely only on the firewall to block the other party's attacks. And this firewall ...... This firewall is absolutely the best in the world, and the value contained in it goes without saying, and even many of the technologies are many years ahead of the world - of course, they don't know, but they are really 80 years ahead of the world.
If China's military uses such a firewall and analyzes and absorbs the technology inside, it will be a qualitative leap for China's computer software level and network security!
The blue baby Xiao Lingran was a little silent, because she knew that one of the hacking rules was that they could not be attached to any political force. But after all, she is also a military hacker belonging to China, so she naturally knows the great significance of this firewall.
It took a long time for the blue baby to type out in the dialog box: "S.mmh, maybe my request is a bit presumptuous, but I still have to say it." Your firewall technology has been ahead of the world, I wonder if you are willing to sell to our military to strengthen the security of the military network? ”
;