Chapter 477: The Next Target

readx;

Hacking techniques actually deceive people to a large extent account for a large proportion. Pen %Fun %Cabinet www.biquge.info Hell Hacker Kevin" Mitnick is a leader in this.

Many of his invasions take advantage of people's psychological weaknesses, and by accurately grasping people's psychological loopholes, they can achieve the goal of finally succeeding in the invasion.

He called this technique "social engineering."

At the beginning, when he taught Lin Hong related techniques, he emphasized this point.

Many problems that seem to be technically unsolvable are likely to be easily solved as long as we change our thinking and start directly from the human factor.

For example, if you don't know the administrator's account and password, you may be able to pretend to be your boss and get it directly from the network administrator. Or, it is easy to find the password by directly searching for the daily garbage fragments of the network administrator and collecting his private information.

No matter how good the security of the computer is, it is necessary for the "people" to strictly abide by it, and if the "people" do not cooperate, no matter how good the security strategy is, it will be in vain.

Just like this time, no matter how tight the security measures of their server were, the other party directly disguised himself as someone from the command headquarters, and almost directly asked Liu Hui to take the initiative to send it over.

Fortunately, Lin Hong had done enough preparation before, and directly installed a traffic monitoring software on the router, and once there was a suspicious traffic transmission, an alarm signal would appear to remind him.

What Captain Qian is worried about is that if 85% of the files are transmitted, will the other party directly crack out part of the content of the battle plan according to the part of the content received?

"If they can crack some of it, we will lose a lot, and we should have deducted most of the points at the end of the exercise." Captain Qian was worried.

Lin Hong comforted: "Captain Qian, you don't have to worry about this. The battle plan itself is encrypted, the original structure has been changed, and now only part of it has been transmitted, and the probability of being able to restore the original information is very small. In addition......"

He and Lao Wang glanced at each other, and both of them had confident smiles on their faces.

"In addition to the encryption of the file itself, we also encrypted the file once, splitting the file into two parts, using an asymmetric encryption algorithm, without a decryption key, it is almost impossible to restore the information." Lao Wang said the answer for Lin Hong.

"Haha, it's yours!" The stone hanging in Captain Qian's heart suddenly fell to the ground, and he laughed heartily, "You guys are still thoughtful, without you, we would have lost this exercise a long time ago!" ”

After speaking, Captain Qian shook his head and walked towards his office, thinking in his heart, when will these soldiers under his command grow up and become masters like Lao Wang and Lin Hong.

Captain Qian doesn't know much about Lao Wang's situation, and only thinks that Lao Wang has been studying for a long time, so his technology is so powerful.

He was thinking about Lin Hong, who was young, but in terms of technology, it seemed that Lao Wang was even more powerful, and he was still thinking in his heart, why is the gap between people so big?

"Fortunately, I was on guard before, otherwise, it would have been possible for the other party to get the documents in this way." Lin Hong said as he retrieved the previous network log and analyzed it.

In fact, he can basically think of how the other party completed the entire invasion without analyzing.

The other must have known how they communicated, downloaded the bit messenger, and hacked into the computers of the Red Army command to obtain the passwords they used to verify each other's identities.

As for why Liu Hui was fooled, on the one hand, it is likely that he did not expect that the other party would also use the bit messenger to communicate with him, and on the other hand, perhaps because of his vanity, in the face of the request of the command, he did not tell everyone, but chose to do it secretly, and he didn't know how they communicated before.

Lao Wang sighed: "I didn't expect their counterattack to come so quickly, it seems that the other party is really not eating dry rice." ”

The two sides come and go, each has its own achievements, and at present, on the surface, it can be regarded as evenly matched.

However, if the worm seed that Lin Hong and the others had planted before had not been discovered by the other party, the situation would have been completely different.

Lin Hong put this matter aside and rethought the matter of worms.

Due to the secrecy of the reason for this, the worm they had designed before would go into hibernation after making a copy of the data, and it would not make any noise for a while, and they were not sure whether the worm had been discovered by the other party.

In the end, Lin Hong said to Lao Wang: "Lao Wang, I think we have to make preparations with both hands, and we can't just count on this worm. ”

Lao Wang agreed with his idea, nodded and said, "You're right, we can't just stop like this, we have to think of other ways." ”

After Lao Wang finished speaking, he continued to study the other party's loopholes.

Since the other party has revoked the Apache service, Lin Hong's overflow vulnerability cannot be exploited, so he can only find another way.

After thinking about it, Lin Hong decided to start with the router.

The router is quite important in the network, it is a necessary node, and every subnet will definitely have this device.

Due to the router this kind of equipment, it is not very widely used in ordinary families, and many people may never have come into contact with this kind of equipment, especially the more complex dedicated routers used for important occasions.

Even many programmers may have little contact with routers. In the same way, many people don't know what kind of system is running inside the router and a system that is solidified inside.

Only a professional network administrator will pay attention to and study this aspect of the content.

Even, many so-called hackers are completely unfamiliar with this part, and they only focus on servers and general operating systems.

In Lin Hong's view, in fact, routers are a major hidden danger on the entire Internet.

This is mainly because the router system is not complicated at all, and if you study it carefully, it is easier to grasp than these commonly used general operating systems on the market.

Although the system inside the router is simple, the security is not very good, and the code is not very standardized, and there are actually many vulnerabilities in it.

There is another important reason for saying that the router is a hidden danger, that is, the system update of the router, which is difficult for ordinary people to operate, and they will not notice whether the manufacturer of the router has released a new system version. And even if they know that a new version has come out, how to upgrade the system is a big problem, after all, this thing, is not like a computer, simply install the system, flash failure, it is likely to directly scrap the device.

Therefore, after the router leaves the factory, the probability of upgrading and updating it again is very small.

As a result, the network is flooded with routers with all kinds of vulnerabilities.

What Lin Hong plans to do next is to think of a way from this aspect to see if he can take down the other party's router, if he can monitor and intercept the data flow inside, things will be much easier. (To be continued.)