Chapter 22: Snake's Perverted Firewall

At this time, the internal chat room of the Red Guest Alliance has exploded.

The initiation of this hacking challenge was initiated by "snake", which is the number one in the international hacker organization, which means snake. This is an organization that is almost legendary, because on the FBI list, there is only the code name of this organization and the major events they have done, but there is no name of any person.

The events they did were:

In early 2001, he hacked the Thuraya satellite phone company and amassed nearly $20 million by tampering with user information and accounts.

In July 2001, 237 websites dedicated to racial equality and Black rights were taken down in a month, and vicious, cursed messages for people of color were written on the front pages of the sites.

At 2 p.m. on 18 March 2002, traffic traffic jams were caused by intrusion into the city of Washington. After successfully attracting the attention of the US authorities, the internal information of the FBI was hacked, and although it was finally discovered and retreated, it also took away part of the undercover information of Interpol. Three days later, all of the undercover agents lost contact.

In May 2003, Boeing's system data was hacked to falsify flight routes and extort money from Boeing.

On Valentine's Day in 2004, the virus of the same name was released, infecting more than 8 million computers around the world......

……

……

It can be said that this is a notorious hacker group, and it is even said that they have abandoned the spirit of hackers and used their computer technology for their own personal gain. And the group has also repeatedly spoken out in public disdain for people of color and for white supremacy. Think about the reason why they provoked this dispute this time, the reason is because they feel that they have lost face, and maybe even the beacon virus was developed by them!

With Snake's surname and their consistent reputation and technical ability, it's really not surprising that they are.

What annoys the members of the Red Guest Alliance even more is that this war letter, well, let's just say it's a war letter, is very unkind!

The first sentence of the letter translates as: Humble yellow monkey, you should feel honored to read this letter, because it is the snake that you are talking to, the legendary snake!

Isn't that annoying, you say?!

Moreover, this war letter is still hung on the homepage of the Red Guest Alliance, which means that the opponent tampered with the homepage of the Red Guest Alliance by means of intrusion - this is the greatest shame for a hacker organization!

Even if you're the world's number one hacker organization, you can't use this method, right?!

Snake said in the war book that the URL of the one they posted was where the battlefield was. From now on, Snake will challenge hackers all over the world, and in the five days from September 5th to September 10th, Yenching time, hackers from all over the world will be able to compete. Of course, what they want most is the legendary S.MMH, in the words of their battle book, that is, the two sides will compete against each other!

"It's too bullying!" Young-Aged Fat screamed frantically in the chat room: "Where's the boss S.MMH?!" Hurry up and get out! The puppets collectively wiped out these damn bastards! ”

The reason why Nian Fatty is called so is because he has already logged on to that website. After clicking on this URL, it looks like a very ordinary English interface, and there is nothing, but the real hackers know it, and this is just the first test.

First of all, you have to crack the encryption algorithm on the website, and then you can get a full picture of the website. However, this encryption algorithm is really difficult to the extreme, and just this first test has almost eliminated more than 99% of the people in the world who want to participate in the battle.

And the most perverted thing about this encryption algorithm is that it automatically transforms accordingly according to the intrusion IP. In other words, this is not a master who rushes in, cracks the password and throws it out, and everyone can enter. And even if the same person uses different broilers to enter the web page, the attack will be counted again.

Everyone who wants to come in must use their own strength to enter single-handedly.

In the Red Guest Alliance, there are only a few people with this strength, such as Blue Baby and Guan Pingchao, and the others, such as the young and fat people, can only watch the show outside.

At this time, Guan Pingchao and the others were also suffering from the surging attacks of the other party.

After Guan Pingchao entered the real page of this website, he immediately began to officially invade the server of this website. The most commonly used is to use broilers to launch DDoS flood attacks, flooding with countless garbage data streams, so that the opponent is unable to respond, so as to seize the opportunity to find vulnerabilities and then attack them in one fell swoop.

Guan Pingchao's method is just a temptation, because he knows that Snake is ranked first in the world, and naturally it is impossible to be famous. Although DDoS attacks are claimed to be the most common, civilian, and effective attack techniques, the other side should also have a way to deal with them.

Sure enough, the firewall of the other party easily screened the effective data in the huge information flow, eliminated all the garbage and invalid data, and found the true location of Guan Pingchao in a blink of an eye.

"Quick! How could it be so fast?! Guan Pingchao was surprised in his heart, thinking that this was indeed the world's No. 1 hacker organization, but he was not discouraged, because the failure of the DDoS attack was already expected by him.

determined that the other party was stronger than his own, so Guan Pingchao did not dare to be careless, while scanning the opponent's loopholes, he took a roundabout way to avoid face-to-face direct collision with the other party.

The attack and defense of hackers are originally unfair, in addition to the technical gap between the two sides, the hardware configuration and the number of broilers account for a large proportion. Guan Pingchao was making a breakthrough now, but he could feel that the opponent's attack was very powerful. In the countless data streams, he almost found himself without much effort, and then pasted it up like kraft candy, so that Guan Pingchao couldn't deal with it wholeheartedly.

"Impossible, right?!" Guan Pingchao thought so in his heart, because Snake is the world's No. 1 hacker organization, it is not surprising that they have such technical strength, but the question is how can the other party deal with this kind of attack one by one?

Although Guan Pingchao is proud of himself, he also knows that his strength is not the absolute top in the world. SNKAE's war report has now spread through various channels, and judging from the intercepted data streams, at least thirty hackers or more are now attacking the server at the same time. And as the news spreads more and more, I'm afraid this number will increase!

If anyone who hacks into a server is in the hunt, how can Snake have so many people? And with five days left, don't they have to sleep?!

Thinking of this, Guan Pingchao suddenly felt that his eyes lit up, and at this time, the blue baby on the communicator also sent a message: "I have entered the other party's server, don't be disturbed by external attacks, it is just an intelligent counterattack system with the firewall developed by the other party!" ”

And so it was!

No wonder I have always felt that although the other party is fierce and bites very tightly, the technique is too simple.

A firewall capable of automatically fighting back? And it can also intelligently filter spam information, so as to determine the firewall that focuses on data flow! The first one is nothing, because many hackers now use self-compiled firewalls with a certain counter-attack function, that is, after encountering an attack, they will release information with viruses and Trojans, but generally speaking, the effect is not very large. The offensive of this firewall is naturally much stronger than that of ordinary hackers, but the technical means are achievable.

But it's very difficult to intelligently filter spam and judge it so accurately. Because Guan Pingchao is constantly disguised and changed, he can be discovered by the other party, if it is a real person, forget it, but the other party is just a software, a machine! It's hard to understand.

"The other party must be using some means that I don't know!" Guan Pingchao thought so in his heart, and continued to start disguise. Because as long as it is a program, it must have corresponding rules, maybe it is to record some personal habits, maybe it is to record some specific information of information, but there is always a rule!

Guan Pingchao felt that if he couldn't even do such a program, it would be too embarrassing. However, as one of the developers of 360 Security Guard, he is also full of curiosity and anticipation for this firewall.

Guan Pingchao began to change his tactics, because when he knew that the opponent was just a machine, it was much simpler, the main thing was to find out the rules of the opponent. This method of finding is the same as analyzing software that formulates dynamic passwords based on a certain algorithm, and requires precise analysis.

Through the analysis of information in data flow packets? This method is a dead word in the face of DDoS flood attacks! Because strong information processing can make the server run too slowly, so that opponents can take advantage of it.

Is that supposed to be the analysis through the key pieces of the information? Because although spam information is disorderly, it has obvious deceptive methods, as long as you find the pattern, it is not difficult to protect it.

Thinking of this, Guan Pingchao felt very relaxed, and felt as if he had cracked an insignificant magic trick.

So he disguised his intrusion information as well, disguised as spam, and asked to shake hands with the server.

Sure enough, after he used this method, the kraft candy information flow that had been biting him disappeared in an instant, and he should have given up as spam.

"Good!" Guan Pingchao succeeded in one move, quickly camouflaging the data flow to attract the attack of the opponent's firewall, and he quickly found a loophole to bypass it!

Succeed!

Break through the firewall, the next step is to fight for the high-level administrator privileges of this server system!

But suddenly, at this moment, countless messages seemed to be crowded from all directions at the same time, Guan Pingchao found that his work was a little sluggish, and the next second, he found that he had been kicked out of the server.

"Wouldn't it?!" Guan Pingchao was sweating, and the last attack launched by the other party was too fierce, so that he had almost no power to fight back.

Is this the strength of Snake?

At this time, Guan Pingchao found a message from the blue baby on the communicator: This is a firewall with multiple traps, I failed after breaking through the second layer, and the second layer is a camouflage trap, which makes people think that it is the server system. Once you attack, you are entering the trap of the opponent. After the second layer is broken, there is a third layer, and this is the real battlefield, but unfortunately, the other party is the world's number one hacker organization after all, and I failed.

Guan Pingchao's hand shook and accidentally knocked over the cup of milk on the table next to him.

Not even the big sister of the blue baby, do you really want to invite the s.mmh god to come out? But the question is, where is the S.MMH god?! Does he know about it?!

;