Chapter 007: Ring Logic Lock
If you want to do a good job, you must first sharpen your tools.
The same is true for hackers, if it was a previous life, Xiao Yuan had a complete set of hacking tools in his hands, from port scanning, buffer overflow attacks, remote control, to the most vicious logic bombs, everything, but now, those tools are gone.
Although Xiao Yuan is confident that even if he doesn't have any tools, he can only use the tel tools that come with windows98, and then use the vulnerabilities on the windowsnt server to enter the server, but although it is easy to do so, it may expose his current network address, and as a senior hacker, when carrying out network incursions, the first rule is to ensure his own security, and he will never allow this kind of omission.
Therefore, Xiao Yuan needed to start from scratch and write several tools for invading.
There was no programming software installed in the computer, and Xiao Yuan did not look for other compilers on the Internet, but once again called up the artifact-level tool he used very skillfully - debug, and directly used assembly language to design in it, although it was a bit troublesome, but the program made would definitely exceed the program compiled by any high-level language in terms of sophistication.
The first thing he has to write is a Trojan horse program, this Trojan program has only one function, that is, to intercept the specific network instructions transmitted from the network to the computer, and spread them according to the address specified in the instructions, this program is somewhat similar to the role of the herald, Xiao Yuan wrote this tool in order to build a network springboard, in order to achieve the purpose of hiding his real address.
Because the Trojan horse is very simple, and he has compiled this kind of thing countless times in his previous life, so, he is familiar with the road, and it took him less than an hour to make a Trojan horse program that can be implanted in other computers.
Looking at the delicate small program with only a few hundred bytes in front of him, Xiao Yuan touched his chin and smiled with satisfaction, although this program is small, but it is not simple, which uses a network transmission protocol defined by Xiao Yuan himself, so as to ensure that even if the network data stream transmitted by this Trojan program is intercepted, if you don't understand the network transmission protocol definition method of this data stream, then it is tantamount to a fantasy to analyze useful information from this data stream.
Putting this small program aside, Xiao Yuan began to compile another network scanning program, which was not complicated, so it only took about an hour and a half, using hundreds of lines of assembly code, and a rudimentary port scanner was written by him to generate an executable file.
After writing these two tools, Xiao Yuan wrote a remote control program, its role is mainly to cooperate with the Trojan program he wrote just now, send and accept network commands, view and control the remote computer, logically speaking, this program is not complicated, but because there are more functions to be realized, and it involves many network application layer protocols, so in general, it is a lot of trouble, Xiao Yuan spent more time, this program took him more than three hours to write successfully.
When he finished writing all the tools he needed and looked up from the computer screen, it was already early in the morning.
"It's hard to get started, and that's true." Xiao Yuan stretched his waist and muttered to himself, if his hacking tools were all in his previous life, in five or six hours, he would have been in and out of the network server of Jiangzhou University many times, but now, these five or six hours were all spent on writing programs, and what was written were still three very rough small programs.
After the writing is completed, Xiao Yuan's next job is to catch broilers in the network, the so-called broilers, that is, some computers or servers with vulnerabilities in the network, these computers and servers can be easily hacked and installed backdoor programs, so as to be controlled, network attacks, or set up as a springboard, here, Xiao Yuan's purpose for catching broilers is to be a network springboard.
From the security point of view, it is best to transfer the network scanner program to a broiler with better performance, but Xiao Yuan does not have a broiler in his hand now, so he can only run the network scanning software on his own computer first, fortunately, the main function of this software is to detect the computer with some specific ports in the network, rather than attacking, so it will generally not be identified as an invasion by the firewall installed in the detected computer.
When the network scanner is running, a broiler list file is generated on the hard disk, and each piece of information in this file lists the IP address of a computer or server on the network, as well as the open ports and operating system running.
Xiao Yuan let the network scanner run for half an hour, then terminated the program's scanning, and then opened the broiler list file with a notepad, and in half an hour, the scanner found more than 300 open ports from the network, and the computers with the necessary conditions to become broilers.