Chapter Twenty-Eight: Punish Snake!
After this news was issued, everyone was silent, including Chen Xu.
Others think that although the request of the blue baby is reasonable, it may not be reasonable, but Chen Xu is thinking, if this technology is given to the military, will someone discover his secret?
After all, that's a technology that's been ahead of the curve for 80 years!
In fact, Chen Xu himself will not have any opinions, because this kind of firewall is just a waste for him, and he is naturally very willing to make some contributions to the country. Of course, the premise of this contribution must be to protect himself, because Chen Xu is a human being after all, and if the country wants to search for his supercomputer, Chen Xu will not agree.
Chen Xu couldn't make a decision about this kind of thing, so he asked Xiao Min: "Xiao Min, if I give the information of this firewall to others, will others see that this is technology from the future?" ”
"No, because out of the principle of confidentiality, the firewalls and vulnerability patches laid on the two websites just now and now will all be automatically uninstalled after 12 hours, and it is impossible to analyze and crack them with current technological means."
"It's not my time for this, I'm trying to give this firewall to someone else and show them the technical knowledge. Will that reveal our identity? Exposing these technologies is from the future? ”
"Probably not," Xiao Min said: "Because now I just use the information in the database to patch the systems that are commonly used now, these patches were launched no later than 2015, and the core programs also follow the current guidelines on PCs and servers, so in a real sense, there are not many things beyond this era, and others will find that these vulnerabilities are at most what they have not found after research, and they should not suspect that the computer is from the future." ”
And at this time, Blue Baby and others were also worried.
How much does it cost?
From a programmer's point of view, the value of this software is immeasurable, and if S.MMH is willing to put the firewall out for bidding by security companies around the world, God knows how crazy it will be...... Million? Million? And the unit should still be in dollars.
Although the Chinese side is not short of this amount of money, how can they be persuaded to spend such a high price to buy this firewall? After all, it's just a firewall!
More than 10 million yuan, this is not something that the blue baby can call the shots. But she was really embarrassed to quote this price, so at this time, she could only call her superiors for instructions.
But as soon as the phone dialed a number, before it was finished, it flashed on the communicator, S.MMH transmitted a compressed package to himself, a compressed package of more than 300MB.
"No...... No way?! "The blue baby quickly clicked to receive, this thing, this thing, is this thing?
But her inquiry on the communicator did not get a response - this is not Chen Xu deliberately playing a big name, because he saw more than 300 megabytes and was afraid that it would be transmitted for a while, so he went to take a shower in the bathroom of the hotel room......
In Feng Gong's words, this is really out of tune!
But the problem is that no one could have imagined that S.MMH would be so out of tune, just as no one could have thought that this guy was actually a rookie. Blue Baby sent a few words and didn't see a response, so she didn't dare to send more, because she knew that some hackers, the more skilled they were, the more eccentric they were - like Kevin #8226; Mitnik, he has been a withdrawn child since he was a child.
Snake's attack slowed down, because after discovering that the flood attack was ineffective, they began to intercept the information code, hoping to analyze what kind of means the firewall was using, so they would not attack again for a while.
Ten minutes later, the software was finished, and the blue baby clicked on it and looked at it, and immediately opened his eyes in surprise: "This is ...... All the programs of the firewall as well as the source code?! ”
Source code is the core of a program, and it is the instructions for writing a program. As long as you have the source code, it means that this program is completely exposed in front of you, whether it is the technology or writing instructions!
S.MMH is so generous?! Didn't even ask about the price?!
Comparing hearts to hearts, Blue Baby felt that it was really difficult to be so generous as herself. Because for programmers, the programs they have painstakingly researched are like their own children, especially since many things are not discovered by others at all, and may not be discovered until many years later!
Could it really be that he is the only remaining traditional hacker who is now fruitful?
The other party didn't talk about the reward, and the blue baby felt that he couldn't be so unkind, so he hurriedly asked, "What about the reward?" We can't take what you've worked so hard to research for nothing, you can put a price. ”
Hard? Chen Xu felt that if he said two words, it would be too hard, then the world would really be a group of tired people. The so-called spending is not his own money, and Chen Xu is really not distressed at all now. So he wrote very upright and awe-inspiring on the chat box: "It is my obligation and honor to contribute to the country, and there is no need to mention the matter of remuneration." ”
Seeing this, the blue baby's fingers tapping on the keyboard paused, and then erased the line of words that he had just typed with a wry smile: "I will discuss with my superiors and strive to get a reasonable price for you, which is expected to be no less than 20 million ......"
If Chen Xu knew that 20 million or more flew because of his own words, then he estimated that he would hit the wall with his head depressed at this time! This is the price of pretending! But fortunately, not knowing anything is actually a kind of happiness......
Snake is finally attacking again, this time using a normal request server connection.
Requesting a server connection normally is a means of disguise for the hackers, that is, after a scan, the snake people did not find any vulnerabilities on the server that could be exploited by them, and they could not solve the battle as quickly as possible, so they had to resort to this method - some of which bordered on shamelessness.
Why is this commonly used method shameless?
Because as I said before, a firewall is just a program, and if it is a program, it must follow certain guidelines. This normal method of requesting a server connection may not be a big deal for ordinary hackers to attack and defend, because under the supervision of a skilled administrator, the other party's intentions can be accurately detected and blocked through the data stream.
But the problem is that S.MMH said before that he only uses firewalls for defense, and he and others will never take action! So this method can be called shameless, as long as the server is deceived with fake packets, then they can successfully invade.
This is what I said before, a kind similar to TCP/IP defects, not vulnerabilities, but defects.
The web server must be open to communicate with people, otherwise a server with a disconnected network cable will not be able to invade through the network even if he is the world's top master, which is basic common sense.
And open communication, because of the exchange of data, will inevitably produce this defect. The website made by Snake before, the chaos encryption algorithm was used on the homepage, and no one was given a chance to connect to the website, so there was no way to use this method to attack. When the person who discovered the snake used this method, almost everyone cursed: "Shameless! ”
The blue baby quickly typed out on the dialog box: "The other party is now using the normal request mode to connect, aren't you worried at all?" ”
The dialog box quickly appeared: "What are you worried about? ”
This sentence really makes people vomit blood! The blue baby feels that the other party is not confident in his own technology, and to a certain extreme, he is definitely a super super electric white! Of course, she knew it wouldn't be the latter......
Super Super Dianbai was also puzzled at this time, because he really didn't understand the meaning of this sentence......
Snake uses an account to send requests, which the server simply can't refuse - if a firewall doesn't even work on the server, that's a firewall?!
By receiving and analyzing the working conditions of the server, the people of Snake vomited blood. Because the data shows that there are at least tens of thousands of IPs connecting to the server, which means that hackers all over the world are paying attention to the movements on the forum, and many people are still free to register accounts and post questions. However, the DDoS flood attack just now did not cause the slightest abnormality to the server.
So the people of snake quickly came up with a way - since the information I use for DDoS flood attacks will be blocked by you, how about I use a normal connection?
At this time, I would like to make a brief introduction.
DDoS is an attack method that uses a lot of broilers to send requests to the server, but this request is false, as if a person greets another person, stretches out his hand and hopes to shake his hand, and the server sees the other party stretching out his hand, and will politely reach out and return the salute, but at this time, the original person took his hand back again, turned around and left.
If you stretch out more hands like this, the operation of the server will naturally fall into slowness, but the problem is that the other party's firewall can easily see that the purpose of your hand is just to tease me, so I don't take it. And he can even easily judge which hand really wants to shake hands with him (that is, register a forum account, post, etc.) and which hand is malicious teasing.
But now snake has changed the way, the method they use is that my 10,000 hands are stretched out to shake hands with you, and everyone shakes hands hard twice when they shake hands, and they will shake you to the handshake!
This attack is from virtual to real! Unless all of your servers refuse to shake hands, the next words will be exhausted and crippled if you don't die!
This method is really too shameless.
Snake's people wrote a keygen and desperately started signing up for an account - it didn't matter if there was a captcha, because even if there was an error in the captcha, the server would respond: "Sorry, your captcha is wrong." In this way, more than 10,000 accounts will be registered together and attacked together in an instant, then the efficiency of the server will definitely be reduced, and they will have a chance!
Seeing the other party using this method, all the people who paid attention to the data monitor couldn't help but raise their hearts to their throats, this method is despicable and despicable, but it does work! Moreover, it is a problem that all firewalls cannot avoid at the moment - for example, the pressure that the server can withstand is limited, just like readers and students often find that the starting point is convulsive, on the one hand, the reason is that there are too many people, resulting in too much pressure on the server to bear, so the opening is slow or even the web page can not be opened at all!
(Well,Speaking of which, I'll give you an opinion.,Students who use the starting point on their own computers can add the URL of the starting point girl's channel to the collection.,Because the server of the female frequency and the main station is different.,The female frequency traffic is small.,So often the main station convulsions or even hang up.,There's no problem with the female frequency.,The opening speed is very fast.。 In this way, if you encounter a slow speed of the main station in the future, you can go on the female frequency, so that there will be no situation where the web page cannot be opened for half a day - of course, if you drive the thunderbolt yourself to the maximum speed in the next thing, you find that the starting point is slow, this has to find the reason from your own computer first...... )
This is a naked conspiracy, not a conspiracy! The conspirator, even if he understands the other party's plan, can't stop it, that's what it means.
At this time, some people couldn't help but say, s.mmh god, hurry up, the other party is too shameless!
Some people immediately shouted in the chat room that everyone should stop posting on the forum now, and that the traffic on the forum should be reduced.
Some people scolded snake for being too shameless, because the server they used on that website must be the best and most powerful, and it can withstand a very powerful traffic attack, but the s.mmh god just casually found the server of the Red Guest Alliance, which is not a powerful website, and it is too shameless to use this method.
But again, hacker wars are not fair.
However, as administrators, Blue Baby and others soon found out in the background that although the other party submitted tens of thousands of requests to register accounts in just a few minutes, the current memory consumption and CPU consumption of the server not only did not increase, but decreased slightly!
What's going on?!
The other party is obviously using Yangmou, and it has already had a conversation with the server, but tens of thousands of conversations were sent at the same time, and the server would have crashed in normal times, but now it seems that there is nothing at all.
"He is strong, he is strong, the breeze blows on the hills, he is horizontal, and the bright moon shines on the river."
Just when everyone was amazed, the homepage on the Red Guest Alliance website "Dao, Kedao, Very Dao." Name, name, non-name", such a line appeared.
This is the peerless martial arts in Jin Yong's novel "Heaven and Dragon Slayer", a passage in Jiuyang Divine Skill, which means that no matter how strong you are, I am like a breeze blowing over the hills, and the bright moon is reflecting the river, "He is ruthless and he is arrogant, and I am full of true anger." (Well, by the way, I recommend "Jiuyang Shengong" written by Yindang's thick cucumber.) )
This passage was typed by Chen Xu, although it is pretended, but it is actually a true portrayal of this data exchange model developed by Chinese reading, and it is also the first sentence of the programmer as an introduction.
This mode of data exchange is different from today's flawed TCP/IP protocol, where a lot of data processing is placed on the server, which can easily cause the server to crash due to excessive stress.
For example, before SWF, that is, flash embedded video, many domestic video websites were most occasionally bankrupt because of too much investment in the server, because if you watch videos online, the pressure on the server is not a little bit, many people watch movies at the same time, and the server is really finished.
Today's video websites have adopted the P2P model, that is, the audience watches movies online, and downloads and saves the movies into temporary files at the same time, and is also uploading, which greatly reduces the pressure on the server and disperses to the user's computer and network.
And that's what this processing model is.
Instead of placing all operations on the server, they are distributed to each user's computer. Snake used tens of thousands of broilers to register accounts, and when the server felt too much pressure, it would disperse the data to each computer to read and run, so Snake added tens of thousands of accounts to the Red Guest Alliance Forum, but it didn't have any effect on them.
When the people of Snake found out about this, they were amazed and crazy at the same time.
Wouldn't this work either? So what else?!
It's not that snake is only this technology, but because hackers attack and defend nothing more than the above, deceiving the server, looking for vulnerabilities, or simply using equipment and traffic to completely overwhelm the other party!
If none of the above fails, the only last resort is to use viruses.
But to be honest, I really don't have confidence.
Even the Beacon Virus has been cracked by this master, are these things in their hands useful?
It's just that half of the time has passed, and whether it works or not, you have to try it.
After a short discussion, Snake finally decided to release a virus that had been researched for a long time - named "The Terminator".
The hidden surname of this virus may be far less than that of the Beacon Fire virus, but the destruction and transmission of the surname are much greater. When the computer and server are infected with this virus, the virus will desperately start to attack the third party connected to the network and create a large amount of spam data in the computer or even destroy the original data.
It can be said that this virus was created to destroy, this is a virus that belongs to hackers, and it is a virus that is spurned by hackers!
Snake spread the virus quickly, and the method they used was similar to the Seven Wounds Fist, which hurt themselves first and then others! They actually implanted the virus into tens of thousands of zombie computers under their control and detonated it, and for a while, the "Terminator" virus broke out wildly on the Internet!
"! snake crazy?! The blue baby sister was the first to discover this crazy attack virus, and she burst out in anger, and then sent a message to s.mmh: "Snake's people actually used a virus with a very attack surname to attack the server, and the infection and attack surnames of this virus are extremely strong, and many computers have been poisoned at the moment!" I didn't expect them to be so crazy?! ”
At this time, Chen Xu in front of the computer also got a report from Xiao Min: "Found a virus called 'Terminator', this virus is highly contagious, and will delete the data in the user's computer, it is one of the most malicious viruses in the early 21st century, and the information in the infected user's computer will be cleaned." ”
"MB!" Chen Xu is also on fire now, really on fire.
Although it is Dianbai, he also knows the harm of this virus after reading the introduction, once it breaks out, how many people will cry at their computers? Don't talk about anything else...... He still has a collection of dozens of G A-movies in his own computer! Some are even out of print! Who are you crying for if you lose him?!
Soon there were people in the chat room who shouted that they had been poisoned, that all their data had been lost, and that many members who were browsing the Red Guest Alliance's homepage and following the battle had been poisoned. The virus was like a mad dog, it couldn't get into the firewall, so it desperately drilled through the cracks and spread to many people's computers.
Chen Xu is really popular now, for the sake of a reputation, he actually used such a method, don't the people of snake know the consequences of the spread of the virus?!
The homepage of the Red Guest Alliance suddenly appeared with this line:
"Snake, I didn't expect you to resort to such extreme measures, it seems that I was wrong.
For hackers like you, who have fallen into the game, it is a huge mistake to have such powerful technology, and it is a sad thing for the computer world.
It seems that you have not yet cherished the opportunity I have left for you, and you have been wrong again and again.
What you have done in the past, and the virus that spreads this malicious virus today, has made it impossible for the world to forgive you.
Maybe I don't have the power to judge you myself, but the judiciary does, and what you do is enough for you to spend the rest of your life in prison to repent and forgive. ”
This passage appeared quite inexplicably, and the people of Snake suddenly had a bad premonition in their hearts.
In the next second, a list appeared on the web page:
The members of Snake are:
Dr. Carmello, a senior engineer at Microsoft, is the founder of Snake......"
……………………
This chapter is nearly 6,000 words, plus the morning's update is 9,000 words!
Do you still say that I am not kind? Do you say that I deliberately hung everyone's appetite? Are you a little satisfied with this paragraph?
If you support, all recommended tickets will be delivered!
Also, the brothers who are worried that this book will be on the shelves soon. Xiaoice will first say here that this book will basically be on the shelves in the early morning of April 1, that is, first book a monthly pass for next month.
Well, as for the brother who is holding the monthly ticket in his hand now, if you don't have a place to vote, Xiaoice introduces a good brother's book to you.
"Immortal Police", ISBN 1135736
This author is Xiaoice's hardcore buddy, if you think it's cool to watch recently, give face, please move to vote.
Tomorrow's list, the update time is as follows - one shift in the afternoon, one shift at 11:40 in the evening, and after 12 o'clock, the data is cleared to zero and continues to be updated. Xiaoice rushes to push the weekly double list, brothers who support, please remember to vote when the time comes!
;