Chapter 222: Hijacking the Cold Fire Forum

The next thing Xiao Yuan had to do was to select the host from the list and use the node tool he used to form the ring logical lock, which was actually a Trojan horse program placed in the hosts he selected.

The last time he hacked into his mother's lab server in this room, he used a manual way to place the node program, but this time he didn't plan to use it manually, and instead used another tool he wrote, which automatically selected the remote host and placed the Trojan.

The program he ran just now will automatically read the list of remote hosts generated by the network host finder, scan the hosts in the list for vulnerabilities, and try to implant the Trojan, if the Trojan implantation fails, he will automatically select the next host in the list and try to implant the Trojan again.

After the Trojan is implanted, this program will cooperate with the ring logic lock master control program, and the computer host implanted with the Trojan program is used as a springboard to implant the second node, and the ring logic lock master control program is configured on the one hand after the Trojan is implanted, on the one hand, the springboard is configured, and on the other hand, the ring logic lock is also configured, and this process will continue until a complete ring logic lock is formed, and it will automatically stop.

Xiao Yuan sat in front of the computer for a while, and when the Trojan began to implant the seventh host, he was relieved to put the running program in the background, because with the first six layers of springboard, a simple ring logic lock has been formed, and then, even if it is unlucky, the host invaded by the Trojan implant program is sitting behind a master, and if the other party wants to track him, it is not so easy, once the number of nodes of the ring logic lock reaches twelve, then he believes that hackers on the bright side of this world, Unless the other party can know the design algorithm of his ring logical lock and the encryption algorithm for data transmission between nodes, it will be a nightmare to try to trace his real address.

When the first six layers of springboard were not set up, Xiao Yuan did not dare to be careless, because at this time, the ring logic lock was not formed, even if he had used some technical means to disguise his real IP, if it was really unlucky, the person sitting in front of the computer invaded by the Trojan implant program was just similar to hotfire, or a master like Gu Wolf, or a script kid, but there was a high-level anti-tracking software in his hand, and the other party wanted to reverse track him. It is very likely that his real IP will be found, therefore, at this time, he needs to be on guard, just in case.

I have to say that at the beginning of this matter, there will be some risks, but fortunately, his luck is good, the first six layers of springboard are easy to build.

After putting the running Trojan implant and the ring logic lock master control program into the background, Xiao Yuan opened VI and wrote a piece of script code, which was used to hack into the Cold Fire Forum.

Prior to this, when he entered the Cold Fire Forum to play tickets, out of habit, he checked the operating environment of the Cold Fire Forum server, the server operating system of the Cold Fire Forum is Linux, the web server (note: the server here refers to the software) uses apache, and the database uses a completely open source and free open source database.

Linux and Apache are all open source, and they can be obtained for free from the network, so, this combination is a cheap solution, but also takes into account high performance and security, of course, if you want to use this solution well, the technical requirements for server maintenance personnel are also very high, and the cold fire forum is a hacker forum, and its general moderator hotfire happens to be a master, so, Xiao Yuan has no doubts about the security of the cold fire forum server.

And Linux and Apache are safe, and their open source is inseparable, take Apache the world's most popular web server, Apache means apatchyserver, Chinese means a server full of patches, this server software and Linux, from the beginning is open source code, all people around the world can get its source code for free, research it, develop new features, patch vulnerabilities, This is a virtuous process, and as a result, there are fewer and fewer vulnerabilities on Apache and more and more performance and stability, so much so that it has emerged, and in just a few years, it has become the most popular web server software in the world.

Of course, the so-called stability and security are relative, although Apache has very few vulnerabilities, it does not mean that it has no vulnerabilities, at least, Xiao Yuan has several vulnerabilities that Apache will only be discovered in the next few years.

The script code that Xiao Yuan just wrote was written for one of the undiscovered vulnerabilities in Apache.

Just as he was about to finish writing the script, his laptop sent an alert that the two programs running in the background were completed.

After Xiao Yuan finished the script file, he checked the record files generated by the two programs, and found that the ring logic lock had been built, and at this time, the Trojan horse implant software had been automatically closed, leaving only the ring logic lock master control program still waiting for the next instruction.

Looking at the cursor of the ring logic lock master control program waiting for the command on the black computer screen flashing constantly, Xiao Yuan's eyes narrowed, and he sighed softly, if he had to, he was really unwilling to carry out network invasion, but the so-called people live a breath, Buddha fights for a stick of incense, since the other party does not give him a normal channel to solve the problem, he can only take this extreme way.

Bang bang, Xiao Yuan typed in a line of commands, in the sound of enter, the master control program passed through the ring logic lock, and established a connection with the server of the Cold Fire Forum, and then he sent the script code he wrote to the server through the ring logic lock master control program.

Soon, the server returned a large piece of data that looked like garbled characters, and it flowed for a long time, and Xiao Yuan needed this piece of data, he saved the data to a file, and then opened another pre-designed analysis program to start analyzing this data.

The analysis process was a bit long, running for half an hour before it ended, and then the analysis program regenerated a text file.

Xiao Yuan opened the text file generated by the parser, and soon found the administrator ID of the server in it, as well as a string behind it, which was the administrator's password.

…………

As one of the largest comprehensive network technology forums in China, the Cold Fire Forum has countless hackers or enthusiasts who like network technology coming every day to conduct technical exchanges, ask questions, or chat with water, and the entire forum seems to have formed a complete virtual community.

It's been more than a month since the hustle and bustle of the Genni challenge that shook the whole network in January, and although there are still people discussing the grandeur of the challenge, it was a month ago after all, and the impact of the challenge has gradually faded.

Speaking of the people who came out of the blue, yesterday the answering maniac was one, crazy answering questions for four hours, solving nearly 50 questions, and someone made a special statistics afterwards, this guy answered not only fast, but also the accuracy rate turned out to be 100 percent, this discovery made the forum a little lively, so many people sent friend applications to the answer maniac, but except for two lucky guys, the answer maniac ignored the others.

"Maybe it's the whim of that master, who got a vest to play tickets in the low-level Q&A area." This was the consensus of almost everyone later.

During the day today, the answering maniac did not come out to the event, and the forum once again returned to calm, although there are still people who think of the answering maniac when they encounter problems that cannot be solved, but most people have forgotten about him.

Since ancient times, I have only seen new people laughing, where do I still hear old people crying, I have to say,**Most of the time, it is a species that is good at forgetting, if you want people to remember a person for a long time, or a thing, you need a little stimulation from time to time, and the answer maniac gave them a great stimulation when people were about to forget him, so that people for a long time, I am afraid it will be difficult to forget him.

He hijacked the Cold Fire Forum.

The time of the incident occurred at midnight on this day,There are a lot of night owls who like computers,So at this time, there are still a lot of online people in the forum,When they refreshed the web page at a certain time,But suddenly found that the original good home page changed all of a sudden,Under the original top feonix's apology letter and the conversation between Gu Wolf and hotfire,There was a top essence post,The font is bold,The post in red,It's particularly eye-catching,The poster is ghostyx., That is, the answering maniac.

"Come in, I'm going to say something." This is the title of the post, which is very simple, but it easily ticks people's curiosity, so many people click on this post to see what the answer maniac wants to say.

"My ID is ghostyx, you can also call me a quiz maniac, or an Internet ghost, I have one thing to tell you......"

In the post, the answering maniac recounted a fact that surprised everyone, and even made them a little angry:

He wrote an article about Linux in the Q&A area for a person with the ID of icecream, and in order to improve the level of the forum, icecream moved his article to the public section of the forum as it was, and also set a high reading and reply permission.

Because this reading permission is contrary to the original intention of the answering maniac to share this article with everyone, so, he proposed to let icecream release the permission, but was rejected by icecream, and after being rejected, the answering maniac posted his article to the public section of the forum, and did not set any permissions, which led to a significant drop in the number of clicks on icecream's post called "Linux's past and present life". So Icecream reported the plagiarism of the answering maniac to GGMM, the moderator of the public section, and GGMM rejected Icecream's request after verification.

Icecream then bribed GGMM with money, and GGMM deleted the Clicker's post and unreasonably dismissed the Clicker's request when contacted several times.

When the answering maniac recounted the facts, he gave a lot of evidence, including the question about Linux that Icecream deleted and the original text of his answer, the conversation between him and Icecream, several requests sent to the forum moderators, and the record of the forum moderators unreasonably rejecting his requests, etc., and the post with Icecream's level 9 clearance has also been removed by him.

In fact, many people know all of this even if they don't look at the records, because they have an impression of the icecream problem, and some people have even posted it under that question, so they know very well whose original article it is.

Ordinary people will feel angry when they see this, some short-tempered guys can't help but start scolding people below, while others are angry, but they can still keep calm and continue to look down.

The answering maniac didn't know about these situations at first, didn't know who reported him, and didn't know that icecream and ggmm were in cahoots, he was still looking for a normal solution, and contacted hotfire, the general moderator of the forum, but without success.

“…… The so-called people live a breath, Buddha fights for a stick of incense, I sought to solve the problem through various normal channels to no avail, I could only force Liangshan, took such an extreme measure, temporarily took over the administrator rights of the cold fire forum, checked the forum database records, only to find that behind this matter, there is such a dirty power and money transaction, for which I feel angry, and I also want to ask the general moderator hotfire, such a thing, do you know, you put feonix's apology letter high to the top, Does it make any sense to pay lip service to the freedom and equality of hackers, but turn a blind eye to such dirty behavior on their own forums? ”

In the end, the answering maniac asked such a question, which was deafening.