Chapter 334: Bi Sheng Makes Trouble

readx;

Seeing that someone was commenting in the conference room, Li Yun motioned to Bi Sheng not to disturb, but quietly entered the conference room. Pen × fun × Pavilion www. biquge。 Read the full text of the latest chapter

However, no matter how much you tiptoe, it will alarm the people who are meeting and discussing in the conference room, but Liu Qing, a software engineer who was talking about it, did not see Li Yun walk in.

Tang Fu and Bi Hongzhan saw Li Yun come in and glanced at him, but they didn't regard Li Yun as a careless hairy young man, as if he was an executive director who could really make decisions.

Li Yun and Bi Sheng walked in the direction where Tang Fu and Bi Hongzhan were waving, and then sat next to Bi Hongzhan.

"The original operating system,There are almost six kinds of backdoors that can be used by hackers,But when the Pangu 7 operating system was developed,Three backdoors have been circumvented,One is the password cracking backdoor、The second is the verification and timestamp backdoor,The third is the rhosts++ backdoor,The operating system in the United States still retains these three backdoors,It is also the backdoor that hackers are most likely to invade,So the only backdoor to be sealed inside Pangu7,login backdoor、Service backdoor and teld backdoor。 Liu Qing said analytically.

Li Yun listened to what Liu Qing said, but he didn't expect that Pangu 7 had already avoided three backdoors at the beginning of the early development and design, and it was quite hard, after all, all operating systems must have six back doors, and Pangu 7 was able to avoid three, which shows the strength of its R&D team.

After Liu Qing finished speaking, Su Lun continued: "We plan to rewrite a set of source code for the remaining three backdoors, and embed their architecture directly in the Pangu 7 operating system, and turn the original three backdoors into the virtual backdoors of the operating system, so that even if there is a hacker intrusion and successfully pass through the three groups of backdoors, then they are in vain, because the real operating system has no backdoor, and the source code of the heart has circumvented the backdoor, and the hacked backdoor is only a virtual system." ”

After listening to Su Lun's mosaic circumvention method, Bi Sheng, who had just sat down, said, "I'm sorry, can I interject and say something?" ”

Bi Sheng raised his hand to signal that he understood the rules, and Bi Hongzhan looked at his son Bi Sheng beside him who had something to say, and did not stop him, but let him speak.

Tang Fu saw that Bi Sheng had something to say, it seemed that there was some problem to be raised, Tang Fu and Bi Hongzhan had known each other for many years, and knew what kind of ability Bi Hongzhan's son had.

"Xiao Sheng, if you have any high opinions, just talk about it! Although you are not an employee of the Technology R&D Department, nor are you an employee of the Information Supervisory Department, you are the son of Lao Bi, and you are a network master, you are qualified to say these two points, say it! Tang Fu said.

Seeing that the boss of his department had no opinions, Hao Bin, Su Lun and Liu Qing didn't say anything, but they were a little reluctant to be so suspicious.

Bi Sheng stood up as a sign of respect.

"Who is this......?" Bi Sheng motioned for Liu Qing to say his name, and said a little ambiguously.

Li Yun looked at Bi Sheng's posture and thought to himself, when did this kid really show something, there was no ambiguity at all.

Liu Qing looked at Bi Sheng like this, a little unhappy, after all, Bi Sheng is much younger than himself, and he has not yet graduated, he is just a junior student, what qualifications do he have to question his years of experience.

Being able to participate in this kind of technical meeting also depends on the relationship between his father and Pan Gu, but then Bi Sheng's words made Liu Qing sigh to himself.

"Liu Qing, software engineer." Liu Qing sat down and introduced himself.

Bi Sheng looked at Liu Qing and said: "Liu Gong, I am not offended, just to prevent the operating system of Pangu 7 from being hacked, and I also know a little bit of knowledge of the network security information system, purely from the perspective of hackers, it may offend you." ”

After all, Liu Qing is also in his thirties, Bi Sheng said very politely.

Li Yun was really stunned when he looked at Bi Sheng's performance in the state,

"It's all for the Pangu 7 operating system, it's okay, you can say it!" Liu Qing said very politely on the surface, but in fact, he was very unhappy in his heart.

"Three CEOs, two engineers, then I'll get straight to the point. I won't talk about the backdoor of cracking the password, the backdoor of verification and timestamp, and the backdoor of rhosts, because this is already the backdoor of Pangu 7 that has been inherently sealed, there is no channel, and the scanner used by hackers is almost impossible to scan, so I'll start with the remaining login backdoor, teld backdoor, and service backdoor. I don't know if Liu Gong knows the intrusion steps of ordinary hackers? Bi Sheng said, Li Yun looked at what Bi Sheng said and listened carefully.

Liu Qing looked at Bi Sheng, and then said with a blank face: "I'm engaged in software development, how can I know the hacker's intrusion process?" What do you mean by this? ”

"It seems that Liu Gongzhen is a qualified software engineer, and what I said naturally makes sense. Hacking has an inherent process of hiding itself, pre-detecting the attack, taking the attack, gaining control of the target, continuing to infiltrate, and gaining access to confidential data. And the first step in this process is to hide yourself and have something to do with backdoor intrusion. Bi Sheng paused for a moment and looked at the expressions of those present.

"Hello, I'm the head of the software group, Suren. Does what you say have to do with the measures we have taken? Suren said.

"Hello, Su Gong. Hackers will use common scanners to perform task scans, looking for problematic data that can enter the backdoor, including logins. In UNIX, login is usually used to verify the password of users coming from teld. The hacker hacks the obtained source code and modifies it, so that the hacker can check the backdoor password first when comparing the input password with the stored password, and if the company employee arbitrarily types in the backdoor password, the hacker will ignore the password set by the administrator and drive straight in. This will allow hackers to gain access to any account, even root. Since the backdoor command generates an access before the real login and the blocked RHOSTS log is recorded to the UTP and TP, hackers can log in to get the shell without exposing the account. Even if the discovery team of the Information Audit Department notices this backdoor, even if it uses the 'strings' command to search for login for text messages, in many cases the backdoor password will be exposed, and the hacker will start to encrypt or better hide the password, and the discovery team will not find anything. I wonder if the newly generated source code of the virtual mosaic mentioned by Su Gong has played a role in blocking the scanner? Bi Sheng said very professionally.

After listening to what Bi Sheng said, like the words of heaven, even if Su Lun and Liu Qing understood, they were also confused, after all, the two were not professional hackers.

In addition to Su Lun and Liu Qing, Li Yun, Bi Hongzhan and Tang Fu felt that it was expected.

"Xiao Sheng has given you a problem, Su Lun, Xiao Liu, do you have any countermeasures?" Tang Fu said.

Su Lun and Liu Qing seemed to be recalling what Bi Sheng said, and stiffened for five seconds before they really reacted.

"The overall architecture of the source code and the operating system of the original Pangu 7 constitute a unified whole, the code of the original login program is cleared, and the original login program still exists in the system, forming a virtual space, this virtual space will control the time of hacker intrusion scanning, at this time the discovery group has notified the capture group, and there is an alarm instruction in the source code, which is directly issued to the analysis group, after the analysis group learns the situation, it will immediately notify the tracking group, and carry out anti-intrusion on the hacker, so that its ID is lost, The nest is gone, do hackers still have the ability to carry out the next step of invading? Su Lun answered Bi Sheng's question about the efficacy of the source code.

Provide full-text online reading, faster update and better article quality, if you think the network is good, share this site more! Thank you readers for your support!

The latest chapter of the high-speed debut martial arts master in the city, this chapter is the address if you think this chapter is not bad, please don't forget to recommend it to your friends in the QQ group and Weibo!