HK054 Déjà vu swallow returns to a first-class broiler
Founded in 1984 and headquartered in Tokyo, Access is mainly involved in management consulting, software development, mobile web services, and Internet browsers.
Access's flagship product, the Front browser, has a very high share of mobile devices in Vossan!
In order to use the name of supercomputer Tsubame, this network-based company applied to the Tokyo Institute of Technology for the right to use the supercomputer Tsubame.
After finding out the news, Shi Lei immediately searched for the homepage of the company's website through the Internet search engine. From the homepage of a company's website, you can know a lot of things. For example, the company's recent situation, such as the company's financial statements, and even the personal passwords of the company's members, etc., can be peeked from the company's homepage!
Shi Lei entered the homepage of Aixin Company and browsed the company's recent situation. The company's development potential is good, especially the partners of the Front browser, which are actually NTT and Sony.
After browsing for a while, Shi Lei tried to scan the vulnerabilities on the homepage of Aspire to enter the website. As a company in the IT industry, the company homepage of Aspire has its own independent server, rather than the server space provided by a rented network service provider.
After Shi Lei judged the server's system, he immediately drilled into the server from an unreleased vulnerability. The server on the homepage of Avcare stores a lot of files. Shi Lei browsed carefully and finally found something he was interested in.
The system resources of the supercomputer Yan rented by Aixin company are very small, and they have a powerful server themselves, and the reason why they rent the supercomputer Yan is just to enhance the company's popularity!
Shi Lei actually found the login account of the supercomputer Yan and the login password inside the web server of Aixin. It turned out that the company released the account and password of the rented supercomputer Yan to every senior employee of the company. Feel free to use the part of the supercomputer resources that the company rents. It's not that Axine is generous, but their own research projects, which are in need of secrecy, can't be sent to the supercomputer Yan to deal with, and they are reluctant to waste the resources of the supercomputer Yan. Therefore, let the senior staff use the resources of the supercomputer swallow at will!
Originally, this was a benefit of Aixin Company, but now it has become a convenient channel for Shi Lei to invade the supercomputer Yan!
Shi Lei browsed through the web server of Aixin Company, and after thinking about it in his heart, he decided to use the server of Aixin Company as a first-level broiler to officially prepare to invade the supercomputer Yan!
Axin's server, pretty good!
This company has five core servers, forming a server group, each core server has a computing speed of 0.2 trillion times, and the computing power of the entire server group has reached 1 trillion times per second, which is equivalent to a small supercomputer!
In 06, the world's supercomputer rankings, the 500th highest computing speed, was only 2.7 trillion times. In other words, the server group of Aixin Company is definitely in the advanced ranks in the world!
After deciding to use the server of iTrust, Shi Lei began to hack into iTrust. Since the server group of Aixin has reached the level of a small supercomputer, Shi Lei carefully controls the No. 1 server, scanning the open ports of the other server group.
Shi Lei has hacked into the web server of Aixin, but the web server is only used for the company's homepage and to store some unimportant documents. The company's core data is all stored in five core servers, composed of a server group!
The computing speed of the No. 1 server is unsatisfactory after all, Shi Lei can't help but be secretly anxious, but he is helpless! …,
While waiting for the scan results of the No. 1 server, Shi Lei fantasized about the super power of a broken notebook that can hack a satellite in science fiction. If he also has that ability to defy the sky, how good it would be!
In hacking, invading, obtaining, and controlling are different meanings. For example, if a server stores confidential documents, it is not necessary to hack into the server to obtain secrets.
There are also many permission settings on the same server, and confidential files are usually added with separate passwords. Therefore, even if a confidential document is obtained, it is not necessarily confidential and the password needs to be cracked.
As for controlling a server, that's the most difficult! It's very difficult to gain control of a server, especially a high-level server!
The performance of the premium servers is amazing, but it's also very enjoyable to use. But in the same way, the security strategy of advanced servers, server firewalls, is even more difficult to handle. And, there are security guards too!
Although Shi Lei knows about many server systems and unannounced vulnerabilities, he is not arbitrary, and he can hack whoever he wants. Every hacking attempt is bound to establish a network link. Once the web link is established, the data exchange takes place. If the security personnel of the senior server are on duty and keep an eye on the flow of data, any anomalies will be detected. For example, a server can be compared to a pool of water filled with water, and a network link can be compared to a water pipe connected outward. When the server is normal, there is no data exchange, that is, when the water pipes are not flowing outward. If the hacker secretly adds a water pipe to the loophole to drain the water, can't the security personnel on duty find the water leak?
The No. 1 server slowly scanned out the Aixin company, and the port of the server group was open, and Shi Lei was so grateful for the flowers. After finding a suitable port, Shi Lei directly used the web server of Aixin to simulate the internal communication of Aixin and request access to the server group.
After the server group received the request from the web server, since both parties belonged to the internal company of Aixin, the firewall of the server group did not block the request of the web server, and Shi Lei successfully infiltrated the server group through an unpublished vulnerability through the normal request!
After entering the server group, Shi Lei did not act rashly, but began to spy on the firewall composition of the server group. If you don't get rid of the firewall, I'm afraid that Shi Lei has just started to clean up the permission group, and the firewall will send out an alarm!
Shi Lei used the No. 1 server to analyze the firewall while manually spying. Aixin's firewall is obviously not a popular product on the market, but a customized firewall system commissioned by a network security company.
To borrow a phrase from the hacker world, a free firewall has zero defense effect!
It took nearly two hours for Shi Lei to basically figure out the situation of the firewall. The firewall of iCredible is actually provided by Norton!
In his previous life, Shi Lei deliberately studied Norton's firewall, and Shi Lei was extremely familiar with each of their products. Although the firewall of Atrust is a customized product of Norton, its source code is also based on the Norton series.
Shi Lei is inside the server group, writing malicious programs, preparing to puncture the firewall and make the firewall ineffective!
The best way to break down a firewall is to grasp the vulnerabilities of the server system, enter the server, and destroy the firewall from inside the server, just like Shi Lei.
After all, the external defense of the firewall is very strong, but the internal defense is relatively weak!
After spending about ten minutes, Shi Lei compiled a malicious Trojan against the Norton Firewall, and then started to destroy the firewall from the inside. The specially customized Norton Firewall still can't get rid of the Norton mode, and it is strangled from the inside by a malicious Trojan horse written by Shi Lei! …,
The function of the firewall was gradually replaced by malicious Trojans, and the whole process was silent, not attracting the attention of the security personnel on duty at all.
After a malicious Trojan kills the Norton Firewall, it fails to detect the signature code of the Norton Firewall and begins to self-destruct and clear itself from the server.
Shi Lei put his hands on the keyboard with a triumphant smile. He didn't expect that it would go so smoothly and get the Norton Firewall!
After typing a few lines of code on the keyboard, all the authorized users within the server group of Aixin Company were listed on Shi Lei's computer screen.
On the surface, the server group has only three super-privileged users and more than a dozen users with large and small privileges at all levels. Shi Lei cautiously continued to type the code and injected it into the permission authentication system of the server group.
After a while, two accounts were displayed on the monitor again, and the permissions of these two accounts were still above the three super permission users on the surface!
"Nima, who is as insidious as Brother Shi, likes to hide real super privileged users!" Shi Lei showed a disdainful expression on his face.
Hiding real super privileged users is a common trick on premium servers. If a hacker hackers invade a high-level server and obtain a super-privileged user on the surface, they will start to do anything and establish their own super-privileged user, and it will be exposed in an instant!
Shi Lei found out the real super users who were hidden in Aixin Company, but he didn't touch these two super users, nor did he establish his own super users. Instead, they started writing code to take over from the original permissions system in the server group system.
If you use the original permission system in the server group system, you can create a super permission user, even if it is hidden. Once the super user of Aixin Company checks the permission user group of the server, the newly created super user will also be exposed, which is equivalent to the exposure of intrusion.
Therefore, Shi Lei needs to establish a new permission system to replace the original permission system in the server group. In the new permission system, the two hidden superusers on the surface are still the highest permissions. But in fact, Shi Lei will set up a more advanced super authority user and hide it in the system.
Due to the use of the new permission system, even if the original two super permission users thoroughly check the situation of the server, as long as they do not find that the permission system has been replaced, they will not be able to find Shi Lei's hidden super permission users. Under normal circumstances, the security personnel on duty will not suspect that the system has been replaced.
Because, the job of replacing the system is definitely the most difficult of the highest, and only a top-level hacker in the world like Shi Lei can do it!
————————————————————————————————————————————
PS: It's still a little short of the recommended ticket goal, but Shanshan believes that it can be reached!
Ask for a recommendation ticket~ Friends who haven't collected it yet, you can collect it! Ask members to click and help Shanshan to click on the list!
Ask for tips, ask for comments, ask for replies in the book review area~!
In addition, only one person won the lottery in the last small event, and there was a couple number left, if anyone needs it, post in the book review area, let's open another small event, this time take an eight-digit Tencent number, or a seven-digit YY number! If necessary, the book review area will roar~
——
【Reward thanks】Wakaba cherry blossom blowing snow, tip 588
,