Chapter 473: Stop Responding

readx;

While Lin Hong and Lao Wang were writing the worm code, bad news came one after another. Pen? Interesting? Pavilion wWw. biquge。 info

There are also several computers in this computer room that have also been tricked, either restarted, or suddenly unable to access the Internet, especially those against the opponent's machine detection or attack more frequently.

Lao Wang took the time to go over there to take a look, and found that the IP used by the other party turned out to be their own side.

The network of the Red Army side is not only this machine room, but also some subordinate units, or superior units, but the documents of the operational command are placed here.

Now it seems that the other party must have eliminated some points of the subordinate units, obtained their permissions, and then used those machines as a springboard, bypassing the filtering rules based on IP verification, and successfully carried out attacks on some machines.

Fortunately, the communication scheme they use is based on Bit Messenger, and the security of this software is naturally very robust, and it is difficult for the other party to detect the existence of this software unless it is directly connected to the computer remotely.

However, because they are already on guard, even if they disguise themselves as subordinate units and ask for the transfer of files, they will definitely not succeed for them.

In order to transfer files, it is not only as simple as IP verification, but also the password they have set in advance. And this code will change every once in a while, contact directly by phone.

Due to the existence of Bit Messenger, basically, they have eliminated the possibility of the other party secretly stealing the documents. Unless they breach the server, there's nothing they can do about it.

This may also be the reason why the other party is becoming more and more anxious.

They had some doubts before, whether the other party did not connect the server to the network at all, and this time let the referee team come to review, in fact, there is also a tentative factor in it.

The Blues may have realised that the Reds' method of communication is not the Web, nor is it FTP.

In the face of their crazy attacks, Lao Wang once again strengthened his security strategy and restricted some access rights of his subordinate institutions. Of course, it was not all sealed, but it still left them some space to make a difference. After all, there are two situations, predictable attacks and unknown attacks, and Lao Wang still feels that predictable attacks are more reassuring.

Blues Information Room ......

"Teacher Li, come and take a look at this." Ding Huahui said to Li Yushan not far away.

Li Yushan is organizing manpower to carry out a frenzied invasion and attack on the subordinate institutions of the Red Army, which is also a strategy they have formulated, since they can't get the other party's documents, let's try to get more other results. It's good for the overall grade.

Hearing Ding Huahui's words, he immediately walked over.

"What did you find?" He asked.

"If you look at this agreement, it's weird." Ding Huahui pointed to a piece of code in the monitor and said, "This is a piece of data packet information that I intercepted from a machine in the Red Army, which should be the way the other party communicates, as if it is through a real-time chat software." ”

He analyzed the packet format and felt that it was very unfamiliar, and he had never seen it before.

Li Yushan looked at it for a while. He lifted his black-rimmed glasses, and said with some uncertainty: "I seem to have seen this protocol format somewhere......"

He searched his mind carefully for a while. Finally, he gave a fist and high-fived, saying, "I remember!" It's a foreign software protocol, and that software is called bitmassager. ”

As he spoke, he directly opened the browser, visited the official website of Bit Messenger, and said, "This is the software." A student told me about this software before, and I took a look at it at the time. ”

After opening the website, he directly turned to the section about the description of the communication protocol, and then compared the content with the format of the data packet intercepted by Ding Huahui, and its structure was indeed very similar.

"Looks right! That's what they're using! Ding Huahui said. I quickly took a quick look at the content on the website.

In the end, I had to shake my head helplessly: "This software is too perverted, how can there be such software?" ”

"I just looked at it and didn't dig deeper, so it looks like I'm missing out on something good." Li Yushan also carefully read the detailed introduction of this software this time, and found that he had missed a very good software.

At the time, his student just casually mentioned it. So he searched for the site, and the headline was exaggerated, as if to brag about how secure he was and how he could avoid any surveillance or anything like that.

Li Yushan's first feeling was that it was not credible, he directly turned to the content of the transmission protocol and looked at it, he didn't understand it very well, plus he had other important things at that time, and then he left this matter behind, and today I saw this data intercepted by Ding Huahui, and then I remembered this software again.

Now it seems that the Red Army must have used this software as a means of communication.

"Is this open source software? Study his code to see if there are any exploitable vulnerabilities. Only then did Li Yushan notice that the code of this software was open source.

Ding Huahui took a look at the historical version of the software, and suddenly a wry smile appeared on his face: "Teacher, instead of studying the vulnerabilities of this software, it is better to discover the vulnerabilities of the system." This software has been out for so many years, and it is open source, and after so many people around the world have been testing it for so long, the possibility of a vulnerability is extremely slim. ”

Li Yushan saw the long list of software versions that could not be fully displayed on the entire display, and immediately felt that he had said a nonsense.

"No wonder that 80 port of theirs didn't react at all." Li Yushan shook his head with a wry smile, "That server, it's just to confuse us, they didn't open a web service at all!" ”

Can this be said to be a violation of regulations by the Red Army?

It seems that this cannot be said, and the rule-makers of the exercise must not have expected this to happen. From the very beginning, the Red Army made itself invincible, and no matter what they did, it was impossible for them to obtain the opponent's operational data.

In this way, the strategy they are adopting now is still very reasonable, as long as they continue like this, to ensure that their servers are not allowed to be invaded by the other party, they can basically win.

Just thinking like this, I suddenly heard someone shouting, "Strange, why did our server stop responding?" ”

Li Yushan and Ding Huahui's faces changed suddenly, they glanced at each other, and immediately ran towards the server.

Li Yushan immediately clicked a few buttons on the keyboard, and found that the system had entered a state of death at this moment, without any response, and the lights on the keyboard did not turn on when the upper and lower case switch keys and number keys were pressed.