Chapter 52: The Plan (II)

Chapter 52 Plan (II)

"People are security companies, how simple is it to invade, I will first look for information and see if I can start." Zhang Yang said helplessly.

"Oh, that's it, hehe, okay, then you look for information first, I'll go back and call my old man, ask him to prepare some materials for me, I'll go back to get it on National Day, and I'll come back three or four days in advance, and get your notebook for you, I'll tell you, my old man has a lot of good materials there." Fang Shaoyun smiled proudly before waving his hand and leaving.

Seeing Fang Shaoyun close the door and leave, Zhang Yang shook his head helplessly, although Fang Shaoyun just said that he didn't guess Zhang Yang's plan, he also guessed a beginning. Pan Wenlong, this kid is ruthless enough, but Zhang Yang is not good at stubble, he has already thought about it, first find out the firewall and antivirus software vulnerabilities of Baiying Group, and at the same time, Zhang Yang also got all the customer information of their company.

When the time comes, Zhang Yang will regularly steal the information of these customers, and let these customers find out, and these customers will naturally find trouble with Baiying Group after they find out, and Zhang Yang wants to sell the information of this loophole to Baiying Group! As for how much to sell, it depends on Uncle Zhang's mood.

mlgbd, look at your arrogance! Zhang Yang sneered, this is just a preliminary plan, Zhang Yang is still a little ambiguous about the Blue Domain, and after he learns the Blue Domain to the point of the Red Domain, Zhang Yang still has a plan to draw a salary from the bottom of the kettle. Don't you just rely on money? What can you do when you run out of money?

Isn't it 50,000 yuan? How much will Baiying lose at that time? Zhang Yang was not ready to use his Red Domain power so early, but there are some things that are tolerable or unbearable, but the means to hide his identity are just a little earlier. As for how to hide his identity, Zhang Yang has long had a plan.

It is impossible to do nothing on the Internet, as long as he does, he did not hide his IP at the beginning, so it is easy to make people suspicious.

If you want to hide your identity and not let anyone know, the best thing is not to show your ability in front of anyone, and keep a low profile, not to mention that the previous point of Zhang Yang has already been committed, and on the latter point, it is not a surname of Zhang Yang to keep a low profile. To be low-key means to pretend to be a grandson.

Just on the Internet, what is the meaning of pretending to be a grandson in reality, people always have to live in reality, and the flamboyant ideal is that the Internet and reality are the same, and no one can suspect that he and the identity on the Internet are the same person.

After opening the analysis results of Baiying Security's firewall and antivirus software, Zhang Yang quickly began to study, no software can be perfect, even if it was perfect at the time, then there will be vulnerabilities in the future. Even several intelligence services in the United States do not dare to say that the firewalls on their servers are perfect.

According to the results of the analysis, Zhang Yang quickly had a rough prototype in his mind, and soon Zhang Yang found a vulnerability in the Baiying Firewall, which is a vulnerability in character decoding, but this is more related to the system, because there are fewer individual users in the firewall of Baiying Group, they are all large customers, and these large customers have their own servers.

Therefore, it is also a firewall to protect IISweb, it has a number of blocking functions, such as checking the submitted HTTP requests, etc., and if there are suspicious characters in these requests, this kind of request can be blocked, but the firewall of Baiying Security cannot correctly decode some special characters of %2e, which means that many malicious requests can bypass the protection of the firewall and be passed to the web server.

This vulnerability was discovered relatively late, but this vulnerability is not what Zhang Yang needs to find, what he wants to find is a general vulnerability in the middle of Baiying's products, the so-called general vulnerability refers to the same vulnerability that exists in your series of products.

Some of these vulnerabilities are defects in the system itself, which were not found in the design, and some of them are human factors, such as Microsoft's win series and office series, there are many general vulnerabilities, whether these vulnerabilities are deliberately left by Microsoft's programmers, or the system itself, most people know it.

If you think about it, if you have a vulnerability in one of your products, it's understandable, but if this general vulnerability covers several generations of products before and after, then it's problematic. Microsoft can rely on its monopoly position not to be afraid of being discovered by users and not use its own products, but Baiying Security does not dare!

Nowadays, there are many security companies and security products around the world, if there is a common vulnerability on the product of any security company, then wait to be drowned by the user's spittle, if the loss is caused, then you are waiting for compensation.

However, general vulnerabilities are more difficult to find,After all, this thing is a big disapproval in the world,Microsoft has a general vulnerability,People can explain that there is a problem with the compatibility of software and system mosaicing,Or there are too many programs that need to be taken care of,Resulting in vulnerabilities,Although a little reluctant,But it can be explained。

But if you have a common vulnerability in an antivirus software and firewall, then you can't talk about it, what does a firewall do? It is to protect the security of user data, and now there is a vulnerability in the firewall.

After analyzing the firewall, Zhang Yang went to analyze the antivirus software. This work is not a matter of one or two days, if there is, it is the best, if not, Zhang Yang can still have a backhand.

A week may have passed quickly, and on the last night of the holiday, Zhang Yang found a total of two general vulnerabilities hidden in Baiying Security, or simply the backdoor left by Baiying Security.

The rest of the time is spent researching the knowledge of the Blue Zone, such as placing honeypots on top of one's own broiler chickens, and how to control a broiler chicken to the maximum extent through the backdoor.

When it's okay, Zhang Yang went to the anubis forum to ask for some knowledge about the blue domain, in just over two weeks, Zhang Yang's blue domain level is almost rising at a geometric rate, Zhang Yang This is completely a kind of accumulation, don't look at Zhang Yang has not been exposed to the knowledge of the blue domain, in fact, although it is divided into red domain and blue domain in the computer field, in fact, there are too many commonalities between the red domain and the blue domain.

And the blessing of Tothanatos has raised the level of Zhang Yang's Red Domain to a very high height, so that when Zhang Yang comes back to learn the knowledge of the Blue Domain again, it can no longer be described as more than half the effort.

In fact, sometimes Zhang Yang thinks about it, and he admires Thanatos, with his strength, he can quietly invade the North American Air Defense Command, copy the information in it without being discovered by the other party, but he is stunned for the sake of being foolproof, and it took five years to cultivate himself as a rookie, such a person, scheming is like his computer strength, deep and terrifying.

***************

It's late for the update, hehe, I've slept too much, everyone's tickets are smashed!!