Chapter 224: Methods of Attack
Chapter 224, at this time, Zhan Jing said behind him: "You can try the registry." ”
"Registry?!" Chen Xu was stunned for a moment, and then said in surprise: "That's right, I was planning to do this." Well? Is there no encryption in your registry? ”
Zhan Jing smiled indifferently: "I'm surprised that you have been able to accomplish so far, the registration form is very simple, you can try it." ”
The registry is the key to a system, and how the software works in the system is completely written in the registry. Many friends who play games have experienced, that is, when the system is reinstalled, some games placed in other drive letters can not be played.
That's because the registry key value is missing, because when the registry is reset to zero after the system is reinstalled, those games that require the registry key will naturally not run.
Chen Xu immediately searched for the keyword "cc.exe" in the registry, and at the same time immediately wrote a small software, the function of this software is to search for all .exe keys in the registry and delete them.
During this period, Chen Xu was kicked out by the firewall again, but he quickly came back and brought this software over. After deleting the key key of the registry, Chen Xu clicked the right button to close the firewall - success!
There is no option to prompt for a password!
It worked!
Chen Xu quickly uninstalled the firewall, then turned off the QQ flood attack, and created a text document on the other party's desktop, typing a sentence in it: "I'm in." ”
This attack was finally completed.
Chen Xu wiped his sweat, and finally ended, although this attack and defense were not thrilling, but the process was twists and turns enough, and it made him see his shortcomings in attack and defense. Zhan Jing's set of surveys, sure enough, there is still a considerable level.
Looking around, Wu Yuan Zhongzi said that they were still fighting hard, and they became the fastest as they wished, but this made Chen Xu feel a little disappointed in his heart - because he felt that his level had improved a lot, but it seemed that he was getting farther and farther away from Zhan Jing.
This is not to say that his strength has improved, and at the same time, Zhan Jing is also improving, and the speed of progress is much faster than him. But in the field of hacking, the more you learn, the more you find yourself small and ignorant.
The main reason is that the gap between Chen Xu and Zhan Jing is too big now. The so-called leopard in the tube can be seen. From this firewall, Chen Xu can see the difference in strength between the two sides, and although he is already very proficient in learning the Chinese language now, he is not at that level if he wants him to make such a firewall.
And it's clear that Zhanjing has reservations in the end.
The lack of encryption of registry information is a clear indication of this. It's not that the registry's information can't be encrypted to take protection, it's just that Zhan Jing didn't do it, apparently she left a leeway. And if she did...... What to do?
I'm afraid that for a while, Chen Xu can't do anything. What's more, this is just an attack on the firewall entirely, and no one is presiding over this attack. If there is a master in charge, it will be a different situation.
And Chen Xu can feel that Zhanjing's firewall is not her most proud work. If it's really this girl who goes all out, how big will the gap between herself and her be?!
Although Chen Xu's strength is not good now, his eyesight has been exercised. Zhan Jing's strength is almost not under any domestic master he has ever seen, recalling the battle with Snake, Chen Xu has such a feeling in his heart...... Her strength may be on par with those people in the snake!
Genius beauty hacker?
Chen Xu was also taken aback by his own idea, it is said that Zhan Jing's strength cannot be so strong. And if she has such strong strength, why would she come to college to spend time? You must know that Snake is already the world's number one hacker organization on the surface - although the world's number one is very watery.
Is Zhanjing's technology that high?
Chen Xu only vaguely felt that he didn't have a real evenly matched conversation with Zhan Jing, so he couldn't estimate her true level. But the man's senses—the kind of thing that doesn't know if it's the sixth or seventh sense—told him that Zhan Jing was definitely not that simple.
Chen Xu's rapid completion of the task—it took him a little more than twenty minutes in total—put a lot of pressure on Zhong Ziyu and Wu Yuan, as for Gao Xiaojie...... You can completely ignore this girl, she is so anxious that she is almost crying now, but she can't even get in the door.
This is the gap, Wu Yuan and Zhong Ziyu have a foundation, and Gao Xiaojie and Chen Xu began to formally learn programming and hacking at the same time. But Chen Xu has Xiao Min's guidance anytime and anywhere, but although Gao Xiaojie has Zhan Jing, a very clever master, she has to start from the basics of this master's requirements for apprentices - this is like the authentic cultivation method of Xuanmen, which is very difficult at first, but there is no danger of going mad. The achievements of the future are also much greater than those who have climbed up through crooked means.
But now, this girl can only be depressed.
In the end, after waiting for more than ten minutes, Zhong Ziyu completed the task with great effort, he used the method of Trojan horse implantation, and finally disguised a Trojan horse and opened the back door to enter. But according to Zhong Ziyu's own words, this Trojan horse was still made at an early age, and he has not yet been able to solve it at that level.
Wu Yuan is even slower, he doesn't have the strength of Chen Xu, and he doesn't have a master like Zhong Ziyu, so he is even slower. It took more than half an hour after Chen Xu to complete the task, and he still relied on Zhan Jing's suggestion.
Basically, this is the end of this investigation, as for Gao Xiaojie, well, there is no need to wait for her, she herself is also depressed and gave up. Sitting there looking at Zhan Jing pitifully, like a poor puppy.
Zhan Jing smiled helplessly: "Xiaojie, wait a minute, your situation is more serious, I will tell you later." She looked at Chen Xu: "To be honest, your performance today is really beyond my expectations." It's not just that you're the first to breach the firewall, it's because of the way you attack it. A solid foundation, rough and simple but very practical offensive means...... Are these all taught to you in the Chinese language? ”
Chen Xu nodded, the foundation is naturally taught in Chinese, and the problem of attack methods belongs to his personal style, which is also related to Chen Xu's way of learning. Because no one had taught him before, his attack method was particularly single, and Chen Xu himself was also a smart person, so he actually found a way suitable for him in this single attack method.
It's like Ah Fei in Gu Long's novel, Ah Fei has never learned a sword in his life, his swordsmanship is all realized by himself, there are no gorgeous moves, but there is only one point - fast! Amazingly fast!
There is also Yang Guo's Xuantie swordsmanship, which pays attention to the heavy sword without a blade, and it is not skillful. Don't look at it as a single means, but it often represents a brave move of great wisdom and foolishness.
"Raise your hand!" Gao Xiaojie raised his hand at this time and said: "Chen Xu's attack method is too simple, he is a reckless man, he likes to smash a little fatally, I can't wait to smash the firewall with a hammer in my hand, Jingjing, you can teach him." ”
"It's not like you say." Zhan Jing shook his head slowly and said, "The cumbersome and complicated means of attack are just a means of attack. You must know that there are no two leaves in this world that are exactly the same, and there are no exactly the same means of attack. The ultimate task of hacker intrusion is to break into the opponent's computer, as long as this task is completed, then any means can be used. ”
"In my opinion, I think Chen Xu's style is very encouraging. Oh, don't look at me like that, in fact, you have to know that when hackers of similar levels are attacking and defending, the offensive means are often an important factor in determining the outcome of the game. And Chen Xu's attack method, if it is accompanied by excellent hardware and software conditions, his attack will be very strong, and in the end it will be so strong that even if the opponent's level is higher than him, he may be defeated by him. ”
"Am I such a cow?!" Chen Xu was also stunned.
Zhan Jing continued: "The heavy sword has no edge, and it is not skillful. Some hackers are cunning and changeable, but some hackers are like this. Like Kevin back then? Mitnik, the world's number one hacker. There was a saying at the time that when Mitnik attacked, no one could stop him. From this point, you will be able to see his horror. Legend has it that Mitnick controls tens of thousands of zombie computers, and his own attack program is even more domineering and ferocious, as long as he attacks, even the most top-of-the-line hardware firewall can't stop his power. ”
"You all have a certain understanding of hackers now, and you should know that many of the methods of hackers are to exploit some vulnerabilities in computers. Or rather, the rules, find the leaks as the computer rules allow. Therefore, a flood attack like Mitnik's is the simplest, most practical and most effective way to attack. In this type of attack, few people can resist it. Xiaojie, do you think this attack method is still very primitive and monotonous and useless? ”
Gao Xiaojie was speechless, she knew that her knowledge and knowledge were far from being comparable to Zhan Jing's in terms of computers. But she was a little unconvinced, and said, "If that's the case, we just need to practice the simplest way of attacking, isn't it?" What are you doing with anything else?! ”
Zhan Jing smiled and shook his head: "It's not as simple as you think. The reason why this move is fierce and unstoppable, in fact, to put it simply, the strength of the person who uses this move is too strong, so strong that he can't stop the enemy with a move. But you know, how many people are able to reach that level now? It takes an incomparably high level of strength to be able to do this. So Chen Xu, in addition to improving the efficiency and strength of your attacks, you also have a very important point, which is to get broilers, a large number of broilers. ”
A broiler is a computer that has been planted as a Trojan horse by hackers, which may be servers or ordinary civilian computers. A hacker will have some broiler chickens at their disposal to use, either as a springboard or as an attack on others. So broilers are also known as zombie computers.
The appearance of broilers is actually an irony, because every broiler is a computer, which occupies a network cable. Therefore, when the hacker is attacking, he will order all his broilers to start attacking the target, sending some spam messages to block the network, causing the other party to operate under load, and so on. But for a hacker in the traditional sense, hacking into someone else's computer is itself a violation of hacking principles.
But if there is no broiler, a person's power is very small on the Internet, and it is easy to be caught by others. Therefore, many unscrupulous hackers use various means to obtain broilers, and while obtaining broilers, they also use their broilers to create greater profits for them, such as stealing users' passwords!
This is how the once infamous "Grey Pigeon" Trojan was born.
There are many varieties of the Grey Pigeon, and anyone with a certain foundation in programming can improve it through the source code to create a new Trojan horse to release.
At that time, almost all computers in China were infected with this gray pigeon Trojan horse and became the broiler of hackers. This kind of broiler can not only make it convenient for hackers to attack, but also steal information from computers, such as online games, QQ accounts, etc., creating additional value for hackers.
But this kind of hacking can no longer be called hacking.
So now, when hackers can't do without broilers, this paradox-like phenomenon has finally been set by ethical hackers on the Internet to set a rule:
Trojans that obtain broilers are not allowed to be leaked, and the source code is not allowed to be used by people with intentions.
The Trojan horse is a good surname Trojan horse, does not monitor the keyboard, does not listen to the password, will not cause any harm to the system, will not steal any information from the other party.
It is forbidden to use broilers to maliciously attack others.
It is forbidden to use broilers for profit.
These guidelines are to comply with the development of computers to the greatest extent on the basis of not violating the traditional principles of hackers.
Because a hacker without a broiler can't even protect his own security, he violates the general outline of the hacker principle: the first point of attention for hackers, to protect their own safety.
Therefore, these rules are issued under the conditions of the general outline of hacker principles, which can be regarded as a kind of keeping pace with the times.
Zhan Jing said: "If you have 100 broilers, then you can also have your 100 broilers attack the computer just now, then you can break through the firewall faster." And you have to know that my firewall is actually not very high, especially because the hardware conditions on the home machine are too poor. Nowadays, many servers are equipped with anti-DDoS flood attack systems, which are 10G 10G hardware firewalls. With the power of a computer, that kind of attack is just a tickle for others. ”
"The key to determining the outcome of the hacker battle is technology, hardware, software, and broilers!"
(To be continued)