Chapter 48: MLGBD (Part I)

Chapter 48 MLGBD (I)

Back in his room, Zhang Yang directly opened his computer, carefully checked his computer first, and after confirming that there was no problem, Zhang Yang quickly entered the server of S big first.

Springboard, that is, broiler, generally has two ways to use, most hackers leave a backdoor in the system of this broiler or springboard, and then illegally enter, so as to achieve the purpose of using server resources. The other is like Zhang Yang, establish a super administrator account, and then use special means to hide the account, strictly speaking, aside from the illegal surname of the account itself, Zhang Yang's access to the system itself is a normal access!

For example, if you think of the entire traffic rule as a server, then some vehicles with special license plates that have certain privileges in the traffic rules are administrators of various levels. It can do this system to a certain extent while following the rules of the larger system.

Then those who hang the back door to enter the system, it belongs to the forgery of a military license plate, or a police license plate on the road, although the general traffic police dare not check, but once found, then you are unlucky.

But Zhang Yang belongs to the kind of person who first used illegal means, bribed some people, and then got a military license plate from the vehicle management office and hung it on his car, so that in addition to the process of getting this license plate is illegal, the license plate itself is a serious military license plate, and it is on the road, even if the traffic police check it, it is not afraid, and it is completely documented.

What about these two ways,The difference comes out,The second you want to use,You have to have a certain strength,But the first entry is relatively low,As long as you can enter the server,You can hang the horse and leave the back door,Convenient for you to enter next time,It's like hanging a fake license。

But the second way, if you want to hide the account of this super administrator, you can't do it without a certain strength. Both methods have their own advantages and disadvantages, and the method of hanging the horse and leaving the back door is sometimes easier to survive than the other, after all, fishing in troubled waters is much better than stealing fish in the open.

In the same way yesterday, Zhang Yang quickly turned the servers of several other universities in H City into his own broilers, and then quickly opened the official website of Baiying Security, pulled out his scanner, and Zhang Yang quickly began to scan the official website of Baiying Security.

The IP of the official website must be announced to the public, Baiying Security is not a small company, don't look at it as not famous, in fact, some domestic security companies that have received orders from political axes are almost not famous, and not being famous does not mean that there is no money. For example, most of China's top 500 companies don't know about it, right?

Since it is a company that does safety, there is no need to say much about the technical strength, even if it is worse than Zhang Yang, it will not be much worse. Soon, the results Zhang Yang wanted appeared on the scanner, which was adapted from the computer system and software conditions that would be a few years later, so there were hardly any vulnerabilities that could escape its scanning.

Soon, the server situation of Baiying Security appeared on the scanner, and the server of Baiying Security used the unix adapted operation system, this system has also been adapted many times, it is a multi-user, multi-task, multi-level (multiuser, multiproultilevel) multics operation system, mainly aimed at large server clusters.

Baiying Security also uses UNIX's system, which has several well-known vulnerabilities that were discovered later, and the rest is much easier to do with the vulnerabilities.

Looking at the several ports on the scanner, Zhang Yang was speechless for a while, but he didn't expect that the security personnel of Baiying Security were also quite insidious, and they actually opened a honeypot on the external port of the server, and there was more than one.

Honeypot is a kind of intelligence collection system in the computer field, as the name suggests, it is a decoy, that is, it mainly opens some ports that are easier for people to attack as false targets to lure hackers, so as to record all the steps of the hacker's inreach, rules, and even his IP and so on.

However, it is obvious that the security personnel of Baiying Security are very confident in their own system, Zhang Yang is not interested in these honeypots at all, and quickly sneaks into their system from several deeply hidden vulnerabilities, and Zhang Yang begins to quickly place his own virus. The virus was extracted from the firewall, and after several uses, Zhang Yang found that his virus was actually very useful.

It has a much more than current infection transmission mechanism, and it is multi-pathological, hybrid-infected, and can even record the genetic information of its own kind, and any system infected by it is like opening a small back door to Zhang Yang. So Zhang Yang simply re-enveloped the virus and wrote it, calling it an infective worm, which is a sharp weapon for invasion.

But now the active infection has been sealed by Zhang Yang, and it needs to be activated. Once the active infection is activated, I am afraid that the infected worm will spread no less than the assassin virus that Zhang Yang killed.

Soon the infective worm quickly spread to the entire Baiying security intranet, to deal with this kind of large server cluster, in fact, the virus is the best infection, because before the data spreads to the server, the large server cluster is equipped with a load balancing system, that is to say, the traffic and access data are evenly distributed to each server in the server cluster through this system.

This provides great convenience for virus infection, quickly copy all the data of their firewall and anti-virus software to their own computer inside the Baiying security server, and copy a copy of the customer information by the way, Zhang Yangcai secretly left a virus, and then quickly exited the server.

After wiping all the traces on the broiler, Zhang Yang directly began to analyze the security services provided by Baiying Security, mainly firewalls and anti-virus software.

The role of the firewall is that it is the only source of information communication between users and the public domain, as far as the firewalls on the market are concerned, except for some powerful companies or some political axe departments, ordinary firewalls are garbage in the eyes of hackers.

However, Baiying Security is a high-end customer, there are few ordinary users, and their main customer base is large enterprises, as well as government ~ government departments, so Baiying Security's firewall technology is still good. But nothing is absolute, if a firewall itself has a vulnerability, then once the vulnerability is known by hackers, then the consequences can be imagined.

Even the international security giant Symantec dare not say that there are no vulnerabilities in their firewalls and anti-virus software, let alone Baiying Security. Because all the data of Baiying Security Firewall and anti-virus software have been stolen from their servers, including the source code.

So it's easy to analyze and decompile firewalls and antivirus software, but it can take a long time to analyze such large software. Zhang Yang had to borrow some of the school's server resources, and it was not until the evening that Zhang Yang finished analyzing the entire firewall and anti-virus software.

However, it is estimated that Fang Shaoyun should almost come back, and Zhang Yang is not easy to continue.

*********

Ask for tickets