Chapter 481: Cyber Atomic Bomb

readx;

Since its birth, computers have been at the service of human beings, providing people with all kinds of convenience, helping and assisting people to complete their work, and providing entertainment for everyone...... And so on and so forth. Pen "Fun" Pavilion www.biquge.info

Therefore, the various functions of a computer are called services, and the powerful computer, which is used to provide various functions and services, is also called a server.

In the computer world, denial of service is not an active act, but a passive one, meaning that someone else lets the computer deny service, rather than the computer itself actively denying service.

Denial of service, as the name suggests, is the way hackers, including white hats or black hats, make the target refuse to provide services to others, and there are many ways to achieve this.

The most common is to exploit a data storm flood attack, a three-way handshake vulnerability, to fill up the server's connection stack, only to be squeezed out and unable to establish a connection at all.

On top of that, you can simply make the server hang, freeze, or become extremely slow and unable to connect.

Of course, in addition to a direct attack on the computer, attacks on other network devices can also achieve this goal.

For example, now Lin Hong is about to carry out an attack on the router, which can also make the server deny service, and the most thorough, directly disconnect the other party's server from the network.

As before, Lin Hong began to build a special data packet, but this packet is not an ordinary IP packet, but is specially used for border gateway protocol propagation.

This kind of data packet belongs to the data that directly exchanges traffic selection information between gateway hosts on the Internet, and under normal circumstances, ordinary people cannot access this kind of data packet at all, because these devices are directly used for communication between important institutions.

The packet constructed by Lin Hong is larger than the ordinary BGP packet, and the displacement between the various data formats is offset.

This is what Lin Hong did on purpose, this kind of deformed data packet. It will be propagated in fragments first, and then reassembled at the other end of the Cisco router, however, because Lin Hong deliberately set an illegal offset. When combined, there is a problem because the Cisco router does not have a mechanism for processing this data.

Lin Hong has tested before, and when encountering this kind of packet, the Cisco router will use a lot of resources to handle the situation, and it will enter a suspended state. Denial of Service.

Since he had studied this for a long time, the process of building the packet went very smoothly and quickly, and Lin Hong only took less than five minutes to carefully construct a bloated packet, and then, he copied the packet many times, and in a short time built a large number of such packets.

compared to other packets. This kind of packet is just a little fat man, and the size is much larger than other packets.

Lin Hong opened a gadget software and selected the other party's router IP. Then enter the command and start sending this data to the other party's router, just as the U.S. Air Force pilot Tibbetts pressed the "little fat man" atomic bomb drop button.

The "Little Fat Man" packets were continuously sent out of Lin Hong's computer, and the target, the Blue Army router, was more than ten seconds later, and the computer room of the Blue Army Information Countermeasures Brigade felt its power.

"Captain Zhao, our network is disconnected, and everyone can't connect to the Internet." An information confrontation officer like Captain Zhao of the Blue Army's Information Confrontation Brigade reported.

Captain Zhao has a better background than Captain Qian of the Red Army, he graduated from the National University of Defense Technology with a master's degree in computer applications. This diploma is one of the best in the entire military region.

Hearing the report of his subordinates, Captain Zhao immediately came to Li Yushan's side.

In fact, Li Yushan was still in charge of this information confrontation exercise, because after all, his level and qualifications were there, and even he, a master's student at the National Defense Technology University, could only stand aside.

Captain Zhao asked, "Teacher Li." What's going on? ”

Li Yushan has already discovered this problem and is conducting research.

"At the moment, it seems that there is a problem with the router. It may be due to the other party's attack, which causes the network to be unstable, and the router is also faulty. Xiao Ding, go and restart the router. ”

Li Yushan didn't realize it at all now, this was because the Red Army side specifically targeted the router, and his thinking was still a little inertial, and in the face of this situation, he habitually thought that it might be an unstable fault of the router itself.

However, after rookie Xiaoding pressed the reboot button of the router and waited for about a minute, Li Yushan still found that he was completely ping the IP of a different gateway, and his brows couldn't help frowning.

"Could it be that the router is broken?" Captain Zhao is also a knowledgeable person, and when he saw this situation, he couldn't help but express his judgment.

"It's possible." Li Yushan nodded with some uncertainty.

He ran to the router and checked the indicator light of the router, and the fault light on it flashed one after another, indicating that the router is not working normally.

He restarted it again, and the fault light showed normal for a while, and then it started to change color again.

When Li Yushan was about to confirm Captain Zhao's judgment, his student Ding Huahui came over at this time and reported: "Teacher Li, several subordinate units below have also reported that their networks have been disconnected. ”

"Oh?" Li Yushan couldn't help but look at Ding Huahui in surprise when he heard this, and the expression on his face was stunned, "It's all disconnected from the network?" ”

Ding Huahui nodded: "Yes, there are already two places to call." ”

As soon as he finished speaking, the phone rang again.

This time, it was the Blue Army Command who called, and there was feedback that their network was no longer available.

"This ......," Li Yushan couldn't help but be completely stunned, "Is this the other party's attack?" ”

Ding Huahui was surprised: "This is unlikely, right? How is it possible to paralyze so many backbone networks in an instant? ”

In fact, Ding Huahui didn't know that when he said this, the network of the entire military region had been completely paralyzed at this moment, including Lin Hong's own network nodes, and suddenly responded.

And, if each router is regarded as a light in the network node, at this moment, the network light of the entire North J Military Region is extinguishing at a very fast speed, and the "little fat" data packets sent by Lin Hong before are really like a network atomic bomb...... (To be continued.) If you like this work, you are welcome to come to the starting point to vote for recommendation and monthly passes, and your support is my biggest motivation. )