Chapter 471: The Blues' Calculations

readx;

Li Yushan, who is deep in the mountains and red leaves, checked Ding Huahui's results, and deeply agreed with this student's words, although the other party put such a server on it, but it was equivalent to not putting it. Pen | fun | pavilion www. biquge。 info They only have port 80 open, but they can't detect any information from this port.

Their defense is even tighter than their own side.

Of course, Li Yushan was also very happy to be able to meet such an opponent, after all, they came here once, if they didn't gain anything, wouldn't it be in vain?

Li Yushan looked at the other detection data again, and then made a decision: "Since the server is so difficult, let's put it aside first." Starting from other PCs, I think there are several of them that are installed with Windows, so it shouldn't be difficult to take them down and see if they can use this as a breakthrough. ”

……

Lin Hong continued to debug the Apache program, set breakpoints, and trace the code.

In fact, he can already do a lot of things with this vulnerability at the moment.

For example, the most basic point is that by forging malformed packets for submission, you can directly bypass the IP verification mechanism of the other party, make the other party's Apache program enter a state of suspended animation, and paralyze their command and control system.

However, there is no point in doing so, and after being paralyzed, they can still restart and temporarily lose access.

In addition, once this vulnerability is exploited, it cannot be ruled out that the other party will find it, and it is very likely that the other party will consider using the latest Apache version directly, or find a way to plug this vulnerability.

Lin Hong wants to do it in one step. Directly maximize the value of the exploitation of this vulnerability and lay the foundation for the victory of this information confrontation exercise.

He continued to analyze the code, which is rarely the case.

If he were to hack into other systems on his own, he would choose the easier way to reach the target directly through the lowest level of vulnerabilities, which is fast and convenient. It is also possible not to attract the attention of the other party.

But now it's a drill, and with so many people watching, he doesn't want to be too frightened by the world. I don't want to be too much higher than everyone else.

Lao Wang is still writing his worm program, although it is only a rewrite, but the changes are a little bigger.

To reach the goal. Not only must you infect each other's programs and hide your traces, but you must also have upload and download capabilities, which involves file transfer protocols. Although Lao Wang is familiar with the technology of these parts, he feels a little tricky to integrate these contents.

The minutes just ticked by.

The two sides kept testing each other and then doing some innocuous flood attack or something.

There were masters on both sides, the defense was tight, and a few days went by without much progress on either side.

Ouyang Chuchu went back in the evening of the exercise. It's not far from the Blues base and it's easy for her to get back and forth.

Lin Hong is now participating in the exercise, and he has no time to deal with her. She hurried back to summarize what she had learned from Lin Hong this time, and then wrote a report to their research center. The recommended research center began to focus on the LINX system and established cooperation with Lin Hong's company.

During this time, Lin Hong and Lao Wang basically spent time together, eating together, working together, and even in the same dormitory. The two of them got along more familiarly.

For the case of Lao Wang. Lin Hong also understood something, so he admired this middle-aged man in his early forties more and more.

In fact, Wang only began to formally study computers at the age of 38, and before that, he had been doing opto-mechanical design and industrial control software design, mainly in contact with mechanical equipment.

It was by chance that he was able to get his hands on computers, and then he was out of control and began to teach himself. Later, I saw a report on computer viruses in a magazine, and plunged headlong into the field of anti-virus research, and in just two or three years, he became one of the top experts in this field.

At the beginning, Lao Wang wrote all kinds of virus killing tools for free for others to download and copy, and later found that such killing tools were too scattered to download and copy one by one, so he simply integrated these killing tools into a software, and formed his current company's flagship product - an antivirus program that can kill more than a dozen viruses at the same time.

Lao Wang's story is indeed a very inspirational story.

Many people feel that they are too old to learn the emerging just and technology of computers, even if they can't learn well, Lao Wang refuted their inertia and interface with facts, proving that as long as there is a heart, even if people who have never been in contact with computers before, they can become masters in a period of time.

As soon as Lin Hong and Lao Wang returned to the computer room after breakfast, they heard everyone talking about it.

"Something seems to have happened." Lao Wang was slightly stunned.

At this time, Xiao Jiang walked over quickly: "Lao Wang, Comrade Lin Hong, you are here, the captain said that after you arrive, you will go to his office." ”

Captain Qian's office, which is actually a single room next door, was simply cleaned up and a desk was placed as a temporary office, which is usually used for private conversations.

Lin Hong and Lao Wang didn't know what was going on, and they came to Captain Qian's office a little inexplicably, and their faces were not very good-looking when they saw him.

Lao Wang: "Captain Qian, are you looking for us?" ”

Captain Qian nodded: "Our machine has been captured by the Blues. ”

His words made Lin Hong and Lao Wang look at each other, which was very surprising and strange at the same time.

"You mean...... They took over our servers? Lin Hong asked suspiciously.

Lao Wang also said: "Our server only opens port 80, and sets up very strict permission verification, the other party should not be so smooth, is their technology so strong?" ”

Captain Qian shook his head: "It's not a server. The servers are still fine, I mean PCs. Several of our PCs were successfully hacked into by the other side, just as you were having breakfast. ”

Hearing his words, Lin Hong's heart moved, and he said, "You mean those machines with windows installed?" ”

Captain Qian's face was still not very good-looking, and he nodded.

Lin Hong wasn't much surprised when he saw this.

He had been mentally prepared for this.

Those machines with windows installed were patched by Liu Hui's half-son, and Lin Hong didn't have much hope for him at all. Of course, the blame can't be completely put on him, the Windows system itself is not very secure, and there are notoriously many vulnerabilities. Microsoft, focusing on improving the user experience and beautiful interface, has been lacking in security, or not paying much attention to it for the time being.

Lin Hong and Lao Wang both knew that these machines were an unsafe factor, but their defense was very good, even if there was a problem with these machines, it would not affect the overall situation, so they didn't care about it, after all, those who are only used to using the Windows system still have to use it, and they can't just quit this exercise.

The two of them are a little strange, Captain Qian doesn't need to be so depressed about this, right? It's just a few PCs, and if it's hacked, it's hacked, and it's not a big deal.

Then, after listening to Captain Qian's words, they suddenly realized that they secretly called each other really doing everything, which was simply too despicable.

It turned out that in the past few days, there has been no progress on either side, and the Blues seem to be in a hurry.

So, they used a ruse and deliberately complained to the referee about the Reds, saying that there was a problem with their servers and that they had violated the rules of the exercises.

So, the referee department sent someone to investigate the situation.

At this time, the Blue Army suddenly launched an attack, invading the computers with Windows operating system in the Red Army computer room one after another, and destroying the system files and making it impossible to boot.

The purpose of this is to put on a show in front of the referees and thus get extra points. After all, neither side made any progress, and the fact that they had such a small result could also highlight that they were more powerful than the Red Army. (To be continued)