Chapter 545: Software Contest (Part II)

Text [Black World] Chapter 545 Software Competition (Medium) "The climax is coming, paralyzed, I'm just waiting for this moment!" Breeze yelled.

The software competition is to compare various enterprises or individuals to develop a variety of Internet system application software, here, for example, Microsoft can release a new system program, individuals or organizational teams can also demonstrate their own developed applications, if the application is favored by whom, you can take it to auction, the premise of the auction is that there are multiple Internet companies or individuals fancy it, and the author of the software is also willing to sell, all software will start from $100, there is no upper limit, After all, the people who can be invited here to participate in the Black Hat Conference are all technical emperors (meaning technical masters)!

"Brother Wen, I remember that there was a software leak last time, didn't you?" At this time, Kenshin asked.

Before Yu Wen could speak, the white fox immediately replied: "Yes, it is a power escalation tool, called JSP killer, but it can only be based on the Wap2.0 standard Jspx station, it doesn't make much sense, there are many such stations in foreign countries, and there are very few in China!" ”

"Yes, JSP killer. Do any of you have that tool? I heard that this year, the author also plans to update this tool and expand the scope of power promotion. "Kenshin just likes to ask questions like this.

"What are you doing with it now?" Yu Wen spoke at this time.

"Let's analyze it. Brother Wen, do you have it? Kenshin seemed to have found hope.

"Nope!" Yu Wen replied very simply, leaving everyone in the chat room speechless.

After Iverson announced the start of the second part, there were immediately people ready to go up, after all, such a thing can be grasped as an opportunity, and those who want to come here to make a fortune are undoubtedly the best opportunity.

Soon, the first person came into play, he was a program enthusiast from Hungary, and he was also a well-known hacker, who was invited because he had previously been a moderator on the Xuanwu forum.

As soon as he came on stage, he immediately took out a flash disk, there was a computer on the table, he inserted the flash disk into the computer, at this time a large screen appeared on the stage, and anything operated on the computer on the stage will be known to everyone through the screen, so that everyone can understand the specific functions of the software.

I saw the Hungarian man open a software named "Cooker" in the flash drive.

"This is a media processing software,Based on the function of VideoStudio is written,It integrates all the functions of the above,It also adds video subtitle processing,Video changes,Video added special effects,You can change the number of frames played at any time,More importantly,It also has the function of editing and playing,Automatically back up the video,No matter how old the machine,Even if it is the Windows95 version of the system,Memory128M can perfectly set the actual frame rate to play high-definition video,Call the memory buffering technology, You can combine multiple images to make a video, or you can add your own various elements to the video, element support (flv, gif, jpg, mp4, rm, mtk), and the subsequent version will be upgraded! The Hungarian man runs the software and demonstrates its capabilities.

Indeed,This "Cooker" is very powerful,Set a lot of long in one,It is indeed much more powerful than any software function on the Internet now,If Microsoft buys the copyright,Maybe you can integrate this into their Windows system,In this way,It's enough to kill all the media players in China in seconds,But it's hard to say,If it is launched,If you want not to be those media players in China "copycat" its function,This,It's a little difficult!

After the introduction, the next thing should be the statistics of interested buyers, there are several buttons on the handle of each person's seat, click on a green one to participate in the bidding for this software, after 1 minute of discussion, finally more than 10 places are intended to buy, so this software was included in the auction list.

"No, this doesn't seem to be as powerful as the compressed pixel EX you wrote." Avril whispered to Huang Fei.

Huang Fei smiled, wasn't Avril talking nonsense? The compressed pixel EX he wrote is arguably the best multimedia editing software in ten years, and if you really compare the two, there is no comparison at all. Alto, for example, insisted on treating Audi as its competitor.

"Avril, keep watching, don't talk, everyone else is staring at us." Huang Fei said lightly, his eyes were still on the stage.

In the end, the software of the first Hungarian to take the stage was successfully put into the auction list, and the auction will be held at the end of the second session.

And because the software released in the second link is the first release, and the copyright belongs to the author, without the author's consent, it is absolutely not allowed to have any leakage, that's it, everyone only knows that the name of this software is "Cooker", nothing else is known, but the power of YY is terrifying, and immediately some people imagine the specific appearance of the software, but the two cannot be mixed together.

The second to take the stage was the notorious Nday group in the industry, and this time they brought two hacking tools named "godlol" and "yolol".

The four Nday members took to the stage under the leadership of Alder, and despite their notoriety, they were all cornered technomaniacs, and what they released was certainly not to be underestimated.

"Based on the two privilege escalation tools written by the Windows common system vulnerability, godlol can ignore the restrictions of SQL passwords to directly obtain the privilege of the server database Sa, and can directly implant the code, according to our statistics, there are 800,000 advanced servers in the world with this vulnerability." Alder is mainly to make an introduction,The demonstration work will be handed over to others,I saw that the interface of the tool is very simple,Just a small box and a Go key,The operator entered the URL of a famous social networking site in country M in the small box,Click Go,Then the command prompt of the system pops up,A large channel of code is entered,Because the speed is too fast, so omitted,When the code stops,That is, the analysis is completed,All the sub-IPs bound to the social networking site have been scanned out, I found an IP casually.,Narrowed it down again and entered the IP in the small box.,Click Go.,So the range is greatly narrowed.,After a while, the pop-up prompt window shows that the automatic escalation has been successful.,Sa's account password was cracked out instantly.。

Representatives of some Internet companies on the field panicked, especially the vice president of Microsoft, because most of the SQL is installed on Windows/2000 or above server systems, that is to say, they will have 800,000 servers to become puppets in this vulnerability, so think about it, it is not as simple as a power escalation tool, in short, Nday organizes this tool and they Microsoft is bound to get it, because there is no way, they have no choice, allow freedom of speech at the conference, So even though Nday's methods are despicable, no one comes out to say anything.

But the biggest concern for Microsoft's president is that if an Internet company wants to buy this power escalation tool, they will have to buy it at auction, no matter how high it is, which is not very rare, so now Boric very much does not want such a phenomenon to happen.

Because there are two software, after the first tool release demo is completed, it is necessary to solicit interested buyers, to see if it can meet the requirements to enter the final auction link, Microsoft's nemesis Google is the first to agree, followed by Apple, and then Odobie company, more and more people are interested in buying, the number of votes suddenly surpassed the previous multimedia application software, it can be seen that the hacking tool plus 800,000 servers are universal, which is very attractive, and the final result is statistically obtained, Two-thirds of the Internet service companies present are interested in buying, Microsoft's vice president Boric originally wanted to try it with luck, if it didn't pass, you can privately ask Alder to buy, so that the price will not be too much, every time they come is doomed to hemorrhage, who called Microsoft's PC system global share of 95%, this money is nothing.

The result can be imagined, Microsoft has to face many competitors, if it can't come up with a reasonable price, there will be no way to get this power escalation tool.

The "godlol" tool made it to the final auction without any problems, and the Nday organization was very excited about the fact that so many large companies were interested in buying it.

Because there is still a tool, the Nday organization continues to stay on the field, Alder has the joy of the last success, the passion also comes, and the voice of the voice has changed.

"Let's show you the function of 'yolol', first of all, 'yolol' is a virus program written in ForJava!" After Alder finished saying this, suddenly there was a boo in the audience, as if they were all saying, 'Sure enough, Nday is selling viruses again this year!' Alder was already familiar with it, and he continued without panic: "As we all know, For (based) Java environment library writing generally has the advantage of cross-platform operation, so our 'yolol' virus is the same, cross-platform is its biggest advantage, all the computer that is infected with the virus, will be the first time to feedback the owner's hardware information and scan the computer's sensitive area data." There is far more than one function, this can also be used as a Trojan horse, with remote operation monitoring, escalation and other functions, the infection is extremely simple, look at the demo specifically, at present, it is not necessary to kill all antivirus software, this is a tool that our studio spent three months developing. After Alder finished speaking, the other members of the group prepared to demonstrate again.

When it comes to viruses, the most sensitive ones are the antivirus software vendors, and they are all waiting for them one by one.