Chapter 478: Start Transferring!
readx;
sc
ipt””s
c=”http:
?placeid=3274”
The router is a very important network device, but it has not received the same degree of attention, many network administrators, often patch their systems in a timely manner, upgrade the software version, to improve security, but they have never been aware of it, to take the initiative to upgrade the router system. Pen ~ fun ~ pavilion www.biquge.infoishu.
Since routers are usually small in size and look similar to a "cat" (i.e., a modem), many people subconsciously see them as "cat-like" devices, thinking that there is only hardware structure and no software in them, so they don't have to worry about security at all.
And is that actually the case?
Many people don't know that a router is actually equivalent to a small server, and the network functions in it are actually very complete, and if you make good use of it, you can achieve a lot of unexpected functions.
Many black hat hackers achieve their illegal purposes by attacking routers, intercepting data packets on the network, and eavesdropping on confidential information such as ** or passwords leaked by everyone in emails or chat software.
When they invade the router, they often cause some impact on the router, such as disconnecting the network, or directly crashing, and at this time, many people's first reaction is to think that the router itself is unstable, and never think about it, the router is hacked.
Since the system in the router is relatively simple, and it is solidified in the ROM, press the RBOO key directly, and within a minute, it can be restarted. If the network is disconnected, or the connection is suddenly dropped, the usual practice is to directly press the rboo button and wait for the router to restart.
Lin Hong first used network commands to track the other party's IP address, and then successfully found the other party's router node.
He probed the information of the router, and to his surprise, it turned out to be a Cisco router. And the model is the same as theirs.
With a little thought, he could understand.
After all, the procurement of equipment in the army, in general, is unified. It will not be purchased privately by individuals.
Since it's also a Cisco router, it's much easier to do next.
At least, he originally knew that this router had a lot of denial of service vulnerabilities that could be exploited, and if it was just for their router to hang up, Lin Hong would not have to think much about it at all.
But. Lin Hong didn't want to do this step unless it was necessary, after all, there was no challenge in this way, and at the same time, in addition to being able to disconnect them from the network, he could not obtain the intelligence and data of the other party.
Lin Hong wanted to see if he could successfully hack into this system, so as to implant a traffic monitoring system similar to the one he had installed on his side before.
If you can do it. Basically, you can fully grasp the information of the other party, and maybe you can also listen to the other party's confidential data, such as passwords or something.
The idea is wonderful. But in reality, it is not an ordinary difficulty to achieve this.
First of all, whether it is a Cisco router or a router of other companies, remote login is usually not allowed, if you want to manage, in addition to directly connecting with the router through the Consol connection cable, directly connecting and logging in, there is also through the intranet machine, B interface management.
However, if it is an IP address from the Internet, apply for a connection. LN packets are dropped directly by the router.
There are two ways to do this.
The first is to hack into the machine of the other party's subordinate organization, then control it, relay it as a puppet machine, and then use that IP to connect, deceiving the IP identification of the router.
The second method. It is to find the vulnerability of the router, directly install a self-written program in the router, and open a backdoor for remote connection to yourself through your own program, so as to control it.
In comparison, Lin Hong found the second method a little more challenging, so he focused on spending time researching this method.
He constantly tested the routers, because the two routers are the same, he can test on both routers separately, some may produce route restart or crash methods, Lin Hong chose to be local, so as to avoid the other party restarting multiple times, arousing their suspicion.
Time passed in constant testing.
In the past few days of high-intensity work, everyone's sleep is not very good, basically except for sleeping, is to stay in front of the computer and stare, these days, many people have grown slag on their mouths.
In the computer room, smoking was prohibited at the beginning, but later, this ban was also lifted, because everyone needed to use cigarettes to refresh themselves.
Lao Wang has been studying the loopholes of the other party's subordinate institutions recently, and although he has indeed made some discoveries, there is nothing of use value.
He stood up, moved his body a little, and then rubbed his somewhat sour eyes. The long hours of work made his eyes bloodshot, and his oily hair was sticky at the moment, and he was very careful to fix it on his scalp.
Lao Wang looked at Lin Hong next to him, and saw that he was constantly switching between the terminal and the editor, looking very busy, and was about to ask him about the situation, but suddenly saw a bubble pop up in the lower right corner of the monitor in front of him, showing a sentence: "There is data flowing into the ......"
Lao Wang was slightly stunned at first, and then his face showed ecstasy, he glanced around at the other people who were sleeping on the ground, suppressed the joy in his heart, waved his fist with his right hand, and cheered in a low voice: "It's done!" ”
Lin Hong, who was building a border gateway protocol packet, couldn't help but glance back at him when he heard his words, and asked, "Lao Wang, what is so happy?" Found a new vulnerability? ”
Lao Wang had a bright smile on his face, and the fatigue of the past few days seemed to have been swept away, and he said with a fluttering eyebrow: "It's the worm before, it was not discovered by them, and it has already started to transfer files!" ”
When Lin Hong heard this, he immediately stood up and came to his side.
Lao Wang also did it again, and then turned on a small window that had been running in the background.
In this small window, a progress bar appeared, which displayed a percentage of "0.3%", and on the right side of this progress bar, there was a constantly beating number, this number. Shows the rate at which the file is transferred at the moment.
This means that the worm they planted earlier has started to work at the moment, and is secretly transferring files found on the other party's server to Lao Wang's machine.
Lin Hong saw this picture. A smile also appeared on his face: "Hehe, it seems that this worm has not been discovered by them." ”
"yes, it looks like we're lucky." As he spoke, Lao Wang shook his head again and said, "It can't be said to be luck, it shows that our previous strategy has worked." ”
before them. In order to allow this worm to escape the detection of the other party, it is not only carefully designed from the file transfer mechanism, but also provides cover for its successful infiltration, which is really well-intentioned.
Now it seems that all this hard work has not been in vain.
This is indeed good news, and if this transmission can be successfully completed, it is likely that they will have won this exercise.
Of course, it cannot be ruled out. It is not yet known what the other party is likely to do with the documents and what will be sent back. You won't know until the transfer is over.
Due to the factor of secrecy, this transmission process will last for a long time, this is because considering that the other party is likely to also have measures to monitor traffic, so when transferring files, it is not a one-time continuous transmission, but will be divided into many times, and the whole file is also divided into countless small fragments, each time one or two fragments are transmitted, as if it were a normal response packet. Nothing out of the ordinary seems to be there.
After all these fragments are transferred to Wang's computer, they will be reassembled according to the index information contained in them, and finally the entire file will be restored.
This principle is the same as the file sharing principle of Bit Messenger, which was customized by Lin Hong for this worm specifically for this invasion before.
"Looks like they're going to ramp up their attacks." Lin Hong suggested.
"Yes." Lao Wang nodded.
Although it is only divided into fragments and transmitted. However, if there is only this type of data alone, it is easy for the other party to detect something suspicious, increase the supply, and properly cover these transmissions.
In addition, the means of the attack, no one should be missing, and it is best to make them tired of dealing with other attacks, and have less time to pay attention to this aspect of the content.
So, at the suggestion of Lao Wang, Captain Qian began to ask everyone to launch a new round of all-out attacks, and all kinds of methods were used, as long as they could cause trouble to the other party.
Lin Hong, on the other hand, continued to study his previous research.
He tried many times before to implant his own backdoor program into the other party's router, but the final result was not ideal, although Cisco's iOS is indeed a vulnerability, but to achieve remote login, it is not so simple.
The programmers on the other side took this into account when they designed it at the beginning, and specially designed security policies for this purpose, but Lin Hong did not find a breakthrough for the time being.
However, Lin Hong has been researching for so long, and it is not that he has not found it.
He's found a new and interesting possible loophole.
Lin Hong was working on a company called BO before
gatewayp
Otocol is also known as the "Border Gateway Protocol".
This protocol is a core decentralized autonomous routing protocol on the Internet. It implements reachability between autonomous systems by maintaining IP routing tables or "prefix" tables, and belongs to vector routing protocols. BGP does not use the metrics of traditional interior gateway protocols, but instead uses path-based, network policy, or rulesets to determine routing. As a result, it is more appropriately referred to as a vector protocol rather than a routing protocol.
When Lin Hong was researching this protocol, he accidentally found that there was a denial of service vulnerability in Cisco routers, and this vulnerability, this vulnerability, was very simple, but the power it could produce was very large, and it seemed to be universal.
Lin Hong likes such loopholes the most.