Chapter 8: Shock to the Hacker Community
After looking at Bill Cover's source code, some of the vulnerabilities have not yet been fixed, and now is a good time to run. Pen "Fun" Pavilion www.biquge.info
These vulnerabilities are not only unknown to the US hackers, but also to Bill Gaishi himself.
That is, launching a "zero-day attack" now can invade the opponent's computer 100%.
The so-called "zero-day attack" is to exploit the security vulnerability of the software on the same day that its security vulnerability is exposed, and the discovery of the vulnerability and the attack will occur on the same day.
This means that the system cannot be fixed if the vulnerability is exploited now, because it will take at least a few weeks for the patch to be developed.
But you must know that there are so many things that Luffy can do in the past few weeks.
It was only two minutes, and under Luffy's bombardment, the opponent's computer was completely controlled by himself.
Luffy Yu checked the basic information of the other party's computer and entered the command to increase the voltage of the power supply.
It is important to know that every part of the computer has the same source of power, which is the power supply. The power supply must provide a stable, continuous current to all devices without interruption. If the power supply is unstable or low, the connected device may not function properly.
"What's going on? Why is the computer so noisy? ”
"Hard drive failure! Hard drive failure! "There was a prompt from the computer, because this was a "zero-day attack" security system and did not show a virus attack, but the temperature of the power supply had caused the hard disk to fail.
“fuak! Why is the computer so hot? ”
Immediately after that, the computer screen turned white, and wisps of white smoke came out.
"It's on fire! The computer is on fire, come and put out the fire! "The Mi hacker is just a seventeen or eighteen-year-old child, and he is at a loss in the face of this kind of problem.
At this time, a 1.9-meter-old man rushed up, and it was the boy's father who came.
At this time, I saw that the computer had begun to spontaneously combust.
The big man hurriedly took out a basin of water from the toilet and splashed it on the computer, boom! A basin of water went down, because the fire was not big and finally extinguished.
But the tens of thousands of computers are scrapped, and the boy doesn't know what to say when he looks at the scrapped computer.
"Smack!" A resounding slap in the face.
"Sam! What are you doing here, do you want to kill my whole family, you are not allowed to touch my computer from now on! ”
Dahan's face was already blue with anger at this time, the computer itself was very valuable, and it contained important documents that he had just modified, and he didn't know how many overtime hours he would have to work overnight to be rescued.
At the same time in a hidden line.
Lion: "King, the input method forum has been hacked by foreign hackers. ”
King: "I'll take a look." ”
Lion, a man named Lion, is the leader of the Chinese Hacker Alliance, known as the fifth in the world. The head of China's No. 1 hacker organization, he once led 10,000 hackers to carry out external hacker attacks.
In the foreign war, the name of Lion and the Hacker Alliance has become the symbol of Chinese hackers to the outside world, and the glory of Chinese hackers has been written.
Motto: "Don't do it!" ”
The founder of the earliest Chinese hacker organization, King, is a man like Wang, who opened the prelude to the history of Chinese hackers and is deeply loved by the hacker community. I have rarely appeared in the hacker world, and his strength is unfathomable, and it is rumored that he is not under Lion.
This line is a platform for private communication between the two, and it is impossible for outsiders to enter with Ben.
"It's just a clown who jumped off the beam and was solved by a Chinese hacker." King replied.
"Nope! Wait two minutes and you'll be able to seize permission! Who is this? King took a closer look at the record of the attack, and lost his voice.
King's words also aroused Lion's curiosity, and he also hurried to check, it didn't matter, but he was startled, who is this? It's too strong, isn't it? Seize the authority in two minutes! The server was restored in 10 minutes.
"L is L!" After seeing L's name, lion exclaimed excitedly.
“L?” King is very strange, although he has retired, but he is still very clear about the hacker's every move, but this L himself has never heard of it, and I don't know where the new god came out.
"L is the author of the five-stroke input method I asked you to use a few days ago!" Lion said.
This statement also aroused the memory of king,Wubi input method is a rare software,Including the later launch of Larry can only be described as excellent,I didn't expect the author of this software to be an excellent hacker。
After a closer look, he found that the hackers in the United States had been hacked. Wait for this offensive line! It's a "zero-day attack"! King can see through the attack at a glance, but it's not easy to find vulnerabilities that have never been discovered! The strength of this L can be seen in general.
"Master! Absolute masters! The attack method is clean and neat, leaving no trace at all, and the power supply voltage of the other party is turned up, and the computer has been scrapped! ”
"King, do you think this guy's strength is better than yours?" Lion said.
If anyone in this world knows King's strength, it is Lion, although he claims to be the first in China, but King's strength will only be higher than himself, not lower than himself.
Saying that he is the number one in China only dared to say it after King retired, he knew how terrifying King was when he was in full swing.
"I think he has the capital to fight me!" King thought for a moment.
"The capital of the battle with you!" Lion was also frightened.
There are no more than 50 hackers in this world who can fight with the king, which can be said to be the highest evaluation of a hacker!
"Have you ever used Windows?" King said to Lion.
"I've used it! It can be said that it is a very perfect system, and it can be said to be very safe from a security point of view. Lion said.
"But you have to remember that there is no absolutely safe system in this world, L is the hacked windows system!"
This sentence alone aroused lion's passion, and now there are only a handful of hackers in the Chinese hacker community who can fight with themselves, and they must know this L for a while.
lion login input method forum quickly typed a line of words.
"L, let's fight!"
The netizens who watched the forum themselves had not dispersed, and they were immediately interested again when they saw this post.
"There's another one who isn't afraid of death, L is about to clean him up."
"Look at ID, lion!"
“lion! Deity! Sit and wait for the first floor to be hacked to death. ”
"The idiot on the first floor, China's No. 1 hacker doesn't even know."
On the 1st floor, check Lion again, this L is called Ion's proud record: launched 36 hacker challenges, 36 wins and 0 defeats, China's first hacker. If this guy sees his speech, will he hack himself to death in minutes, he can only be regarded as lion didn't see it.
Of course, Lion wouldn't be as knowledgeable as such a nobody.
Luffy Yu had just cleaned up the Mi country hackers when he was proud, and suddenly such an inexplicable post appeared.
Just as he was about to respond, he found that Liu Lingyun's information was flickering wildly.
When I opened the message, it was only a few words.
"Don't Fight"