Chapter 488 Compliance with international standards
readx;
Since many international organizations are very concerned about this network outage, after all, at present, such a situation is still quite rare, and since such a thing has occurred, they have to pay attention to it. Pen? Interesting? Pavilion wWw. biquge。 info
According to engineers at the security firm Renesys, the incident caused difficulties in accessing parts of the network in more than 60 countries. More than 3,500 "prefixes," or more than 3,500 blocks of Internet Protocol address space, were affected. And according to previous statistics, there are more than 333,000 prefixes on the Internet in total.
A network outage is a very serious thing. You know, a few minutes of disconnection is likely to cause hundreds of millions of dollars in losses for some companies. It is even more fatal if this is the case in the event of a catastrophe.
Therefore, many international organizations have set their sights on China, waiting for this red country to give a clear answer.
Due to this pressure, China's foreign spokesperson department finally issued a press release, saying that the network outage incident a few days ago was inadvertently caused, and teachers and students of a Chinese university were studying the router border gateway protocol, which accidentally triggered the vulnerability.
The press release said: "...... The data packets distributed by this team are 100% compliant with international standards...... The purpose of this experiment is to further deepen the understanding of certain Internet routing behaviors......"
The press release concludes by saying that the team has said that if such an experiment were to be conducted again in the future, it would take a more rigorous and prudent approach, at least to talk to the Internet operators and issue warnings beforehand.
Many organizations and institutions are not very satisfied with this explanation, but there is no way, and this matter cannot be said who is right and who is wrong, after all, this problem is caused by a bug in the Cisco router, and the user cannot be blamed.
Even if they don't trigger the vulnerability, someone else can.
However, in an interview, a senior Cisco executive said: "Although it was our company's buggy software that caused the accident, the Chinese team that conducted this experiment should be cautious." Gone are the days when such experiments should control the scope of influence and study and research on the real network. I think it's just too ...... to pay such a terrible price for experimenting with something in the future It's irresponsible... ̈"
Lin Hong's things in the army have basically been almost completed.
The upgrade and transformation of the tank fire control system has to wait for the special technicians sent by the three-color fire company to carry out the unified operation, and what he has completed now is only a prototype, and there are many functions that need to be specially optimized.
After Lin Hong and them reached an intention to negotiate cooperation, he and Lin Peng took a military vehicle specially dispatched by the 38th Army and ran all the way to the Air Force Radar Research Institute.
In this exercise, what Lin Hong did, Xu Zhizhong also heard about it from Lao Zheng, and he was naturally very happy about it, after all, he had regarded Lin Hong as his junior, the junior was excellent, and the elder naturally had a light on his face.
Lin Hong didn't stay long at the air force radar base, so they took the car directly and returned to his courtyard.
Summer, Lin Peng and other people in the company did not stay any longer, went to the airport, took a plane, and went directly back to Shanghai.
Back in the courtyard, Lin Hong saw that the courtyard had obviously been carefully tidied, there was a feeling of refreshment, some subtleties had also been carefully handled, and in some places, some bonsai had been placed, which looked a little elegant, and there were many differences from before.
Lin Hong knew that Xu Wenjing must have helped him get it during this time.
looked at the time, it was only two o'clock in the afternoon, and now, Xu Wenjing should still be at work.
Lin Hong picked up his mobile phone and wanted to call the other party and tell her that he had returned, but after thinking about it, he was afraid that it would affect her work, so he put the mobile phone back again.
He carried his laptop to his former lab, connected to the Internet, and began to surf the Internet.
These days, although they have been on the Internet, all their minds are huā on the confrontation with the Blues, and they simply have no other time and mind to do something of their own. In addition, there is another reason that there are so many people there, and they are all knowledgeable, and it is inconvenient to do personal things in front of everyone.
After Lin Hong connected to the Internet, he began to read the events and news that had happened in the computer field during this time.
This information includes what products are being introduced by hardware and software vendors, as well as what is happening in the world of underground hackers.
Lin Hong has the habit of collecting information, and only by having a comprehensive understanding of this information can he assist his judgment, and he is disconnected from the Internet, which makes him very unaccustomed to it.
His super worm is still operating, but he can only collect some more common information, and those confidential information are all collected before, and many of the current systems have been upgraded to fill in the loopholes exploited by the super worm.
The Super Worm has always been a good tool for Lin Hong to save time, and with it, Lin Hong does not need to invade the past one by one to find what he needs. Now the super worm is not easy to use, but it makes him a little unaccustomed to it.
Lin Hong thought about it for a while, and decided to repair the super worm and let it resume its operation.
All he needed now was to change the vulnerability exploited by the Super Worm and replace it with a new stealth vulnerability.
Obviously, this is not an easy job.
Lin Hong first set out to study the Linux kernel code, and he browsed through the latest Linux kernel code at a glance, looking for vulnerabilities or flaws that he might exploit.
Soon, several places were marked in his mind, which were possible vulnerabilities at the Ringc level that could allow Lin Hong to run a rootkit for the Super Worm
The concept of rootkits was first seen in a security advisory report in 1994, and with the development of time, this technology has also been exposed by many hackers and become more and more secretive.
To put it bluntly, a rootkit is a very peculiar program that has a stealth function, whether it is stored as a file at rest on disk or as a process in memory, and it will not be detected by the user or security software such as firewalls.
This kind of program is the dream of many people, including computer hackers, whether white hat or black hat. In addition, the forensics personnel of some institutions or organizations are also very fond of it. After all, such a program, which can always exist in the computer without the user noticing, is simply an essential tool for secretly snooping on sensitive information, monitoring suspects for wrongdoing in real time, collecting evidence, and taking action.
After the initial completion of the superbrain system, Lin Hong's data processing and understanding of this form have improved several levels, and it is no exaggeration to say that he is now a synthesis of the human brain and the computer, and it is still pure natural and green.
Lin Hong quickly found several vulnerabilities in Inux and Unix that could make a fuss.
He didn't stop, but continued to study. After all, what he wants to infestation the super worm is not only Unix-like systems, but also Microsoft's Windows, Apple, macOS, and even some real-time embedded systems, such as satellite-controlled systems VAX/VMS and so on.
Windows has more vulnerabilities than Linux, and Microsoft has put too much effort into the graphical interface, and the result is that this type of system has been at the top of the list of "most vulnerable systems".
Lin Hong didn't use any tools to track and debug to find vulnerabilities.
Instead, it is directly from the database established before the super worm, and the previous core code of Windows is downloaded and discovered directly through the study of the code.
By the time Lin Hong found several underlying ringc0-level vulnerabilities under the Windows platform, it was already a quarter past four in the afternoon.
Lin Hong didn't continue, but opened the compiler and began to transform the super worm.
This time, in addition to making targeted modifications to the way it was infected, Lin Hong also improved the way it spreads.
Absorbing the experience of the distribution of the malformed packets, he also improved the distribution method of the worm, changing it to fragment distribution, and then reassembling it after arrival, so as to achieve a more stealthy transmission′ and bypass the detection and filtering of some security mechanisms.
Finally, the improved Super Worm was born.
After hesitating, Lin Hong still released it.
Doing this, speaking of which, he is still a little psychologically disordered, after all, this kind of snooping on other people's secrets is a disgraceful thing, which goes against the spirit of traditional hackers. By that standard, he should have been reduced to a black hat hacker.
However, the line between black and white is not very clear in the first place, perhaps black in the eyes of some and white in the eyes of others.
The black-and-white world is just an ideal state, and there is a gray area in between.
No one can tell right from wrong.
Lin Hong didn't intend to leave any name in the history of hackers, so he didn't care whether it was in vain or not, and of course he didn't want to leave any infamy, so these things were done relatively hidden.
After spreading the super worm, Lin Hong turned off the computer. After looking at the time, he found that Xu Wenjing was about to get off work, so he immediately hurriedly locked the doors and windows, and trotted towards a huā shop on the street.
Asked for a bouquet of roses, so he rented a car and went straight to the TV station.
Anyway, he is also a person who has a girlfriend now, so naturally he can't think about anything like before. These days, I have been busy with the company's affairs, and I have neglected Xu Wenjing too much, and now that I will come, I naturally have to make up for it.
Lin Hong decided to learn from those pickle girl masters, play romance and mood, send huā, date, and eat Western food, which is a must.