Chapter 476: The Blue Army's Counterattack
readx;
In the computer, there are a lot of ports, many of these ports will respond to the packets sent by the outside world, which can be described as "answering all questions", and some, even not only replying to a signal, but many, this principle has been used by hackers to use the amplifier for packet flood attacks. Pen? Interesting? Pavilion wWw. biquge。 info
Human wisdom is vividly reflected in the field of computers, people will not let go of any possible use of the factors, can have vulnerabilities, basically over time, will be excavated.
In fact, there are all kinds of loopholes in every field and industry, such as legal clauses, contracts, contracts, but there has never been a field that can be as universal as the computer field.
That is, smart people all over the world are staring at the same thing for research. This may also be the reason why computer vulnerabilities are specifically raised and discussed, and even computer security has become a science and discipline.
After Lin Hong told everyone the principle, he returned to his seat.
He knew that the other party would soon find a countermeasure and set up a specific security filtering mechanism to filter their fake IP packets to solve the attack.
Although he still has many ways to make the other party's system crash and restart, he has not continued, his goal has been achieved.
The reason why they continued to attack their servers before was just to disturb people's eyes, and if they were not overwhelmed, Lin Hong could not guarantee that the other party would not be able to detect the existence of the worms they had written.
Through these different ways of attacking, you can disrupt their line of sight, hide their true purpose of attack, and provide cover for the worms.
Lao Wang also saw it at this moment, Lin Hong must have hidden his true strength, this level of attack, he didn't pay attention to it at all, he was completely free to advance and retreat, and he was at ease.
It's just that the strength he has shown has made everyone stunned and admired, I don't know what height this kid's true strength level has reached?
Lao Wang looked at Lin Hong's pampered and humiliated appearance, and couldn't help but feel a sigh of old feeling in his heart.
It's not okay to be old, this young man looks like he's in his early twenties, but his attainments in this field are already unfathomable.
It was hard for him to imagine that there were people of such a high level in the country.
"Three-color fire company......" Lao Wang repeated these words in his mouth, and couldn't help but look forward to this company in his heart.
I don't know if this young man will be able to build this company into IBM, Microsoft, Apple...... What about such an international giant?
"Lao Wang, if nothing else, our program should have been successfully executed."
Lin Hong checked the status of the other party's server and found that it had returned to normal, but he didn't know if the other party was checking the first attack at the moment, or studying the next two attacks.
"Well done!" Lao Wang sincerely praised again, "Lin Hong, you really surprised me so much. With you, our Red Army confrontation detachment is already destined to be the winner! ”
Lin Hong touched his nose and said with a smile: "Lao Wang, don't think too highly of me, I just happened to study in this area, good luck, hehe!" ”
Lao Wang shook his head, obviously not believing in this so-called luck, but he didn't say anything more. Some words are enough to say once, and some words cannot be said too clearly, just know in your heart.
Regarding their successive results, Captain Qian naturally smiled from ear to ear, and ran to the office without listening, obviously giving feedback to the above, this is the moment when they raise their eyebrows, and naturally have to report in detail.
After a while, Lao Wang suddenly said: "The other party has closed port 80 on the server." ”
Lin Hong was slightly stunned, typed in a command, and tested the server of the Blue Army, and sure enough, port 80 no longer existed.
Lin Hong pondered for a moment, and then said uncertainly, "Could it be that they have already discovered that overflow vulnerability in Apache?" ”
"This ......" Lao Wang pondered for a while and shook his head, "It's hard to say. It's also possible that they don't feel that the web service is very secure and shut it down. But according to the rules, they should have a different way of communicating......"
Thinking like this, Lao Wang carefully tested the server again.
"Sure enough!" He continued, "Port 21 has been opened, and it seems that the FTP service has been opened. ”
In the middle of the exercise, the other side changed the web communication to FTP transmission, that is, their subordinate units and headquarters must use FTP software to upload and download files and data transmission with them.
"I'll see if there's any vulnerability to exploit."
Lin Hong said and tried to connect to that port, but, as expected, the connection was quickly cut off, showing that there was no permission. So Lin Hong forged the server IP of a subordinate unit of the other party and continued to try to connect, but this time there was a response, but the prompt needed to enter the account and password.
In the response message, no information about the FTP server was revealed, which should be deliberately hidden by the other party to prevent the other party from discovering the type and version number of the FTP software, so as to exploit the corresponding vulnerability.
Lin Hong tested several FTP-specific commands, as well as several vulnerabilities, including common ones and those that were not published, and found that there was no response.
"It seems...... The FTP software they use has not yet been disclosed, and it is likely that the other party wrote the software themselves. Lin Hong said thoughtfully.
"Hmmm! There is a possibility. Lao Wang nodded, and also tried a few commands, "Their permission control is very strict, they don't respond to any commands, they should be written by themselves as you said." ”
It's not very difficult to write an FTP software, and all they need to do now is simply upload and download, and many advanced features are simply not needed. And the simpler the function, the higher the security, and the level of the other party is not low, and you may have written similar software yourself before.
"I don't know if they found out about the worms." Lao Wang is a little unoptimistic at the moment.
"Can't rule out this possibility, after all, the other party is not a mediocre hand, perhaps, they saw through our next two attacks, in order to cover the first time?" Lin Hong was also a little unsure.
This situation was completely unexpected by the two of them.
As they spoke, the speaker on the other side of the server suddenly heard the sound of a "Didi" alarm.
Lin Hong was stunned for a moment, and immediately ran over there.
He saw that in the server's display, there was a red box with a huge "warnning" written on it.
"What's going on?" Lao Wang also ran over.
"This is a security alert that I set up earlier, and if there is a large amount of data propagation at the gateway within a certain period of time, this kind of alert will appear."
Several other people also gathered around.
Lin Hong's face was solemn at the moment, he immediately canceled the alarm, and then checked the traffic at the moment.
After seeing the data transfer record, he couldn't help but be slightly stunned and asked, "Who is transferring the file?" ”
He saw that at the moment there was a bit messenger file transfer format data flowing.
Hearing his words, everyone began to observe the situation around them.
"I'm passing something to Command, what's wrong?" Liu Hui responded at this moment.
"Terminate immediately!" Lin Hong shouted loudly.
Liu Hui was stunned for a moment when he heard this, and his face suddenly turned red.
Before he could fight back, Lin Hong spoke again: "You are passing documents to the Blue Army, stop it for me immediately!" ”
Liu Hui was stunned again, and before he could make a move, an officer next to him immediately ran to his computer and clicked the cancel button, terminating the file transfer this time.
The progress of the file transfer was stuck at 85 percent, and the officer couldn't help but breathe a sigh of relief when he saw this, and said to everyone: "Eighty-five percent, it's not finished yet." ”
When the others heard this, they broke out in a cold sweat.
"What's going on? What's going on? ”
Captain Qian, who learned the news, immediately rushed over.
"It can't be!" Liu Hui's face was on the face at this moment, red for a while and white for a while, he stiffened his neck and said, "I verified the identity of the other party before passing the documents!" ”
Seeing him like this, Lin Hong didn't blame him much, he sighed and said, "On everyone's computer, it is forbidden to keep backups of files in the server. In addition, if you want to transfer any files, you must first apply to the captain, and it is forbidden to transfer files privately. ”
Lin Hong's tone was not heavy, but he used two "forbidden" in a row, and he also invested a lot of time in this exercise, and he also had feelings, and he didn't want to lose the exercise inexplicably because of the human factor.
Liu Hui ran to the server without giving up, looked at the monitoring records, and when he saw the real IP address of the other party, he sat on the chair with a disgraced face.
"This ...... How do they use Bit Messenger......" he muttered.
He knew exactly what was going on.
After Captain Qian learned about the situation, he was also afraid for a while, if Lin Hong hadn't found out early, this exercise might have ended like this.
He had to reiterate the two items that Lin Hong said before, so that everyone could pay attention to them.
"It's drill time, anything can happen!" Captain Qian emphasized, "I hope everyone will be extremely vigilant and don't give the other party the slightest opportunity!" ”
After speaking, Captain Qian came to Lin Hong's side and asked, "Comrade Lin Hong, 85% of the files have been transmitted, is it possible for them to obtain the contents of it?" ”